- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Kiran Kumar Panigrahi has Published 425 Articles
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
8K+ Views
A Fact Table contains a combination of attributes from completely different dimension table. It helps the users understand and analyze the business dimensions that would help improve the business processes. Fact tables are also known as Reality tables.Dimension tables, on the other hand, help a Fact Table gather the dimensions ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
4K+ Views
Multimedia integrates different forms of content such as text, audio, video, graphics, etc., to form a single presentation. We come across so many different forms of multimedia element on almost every webpage or App that we open. Multimedia is definitely heavy than the traditional static text-based content, but any form ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
Both Client-Server and Peer-to-Peer networks transfer data from a source to a destination with minimal loss in transmission. Both these networks establish a communication channel through which data transmission takes place, however the channel remains dedicated in case of a Client-Server network, which is not the case with Peer-to-Peer networks.Read ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
9K+ Views
Communication, in general, is the process of transferring data from a source to a destination by using any of the available modes such as audio, video, text or even signals, etc. This communication may be straightforward between one sender and one receiver or it may include multiple senders and receivers. ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
954 Views
Both VPN and Proxy are used to connect to a remote system where one can access the host system from a remote location. However, VPNs are superior than Proxy servers because a VPN can protect your privacy and security by routing your traffic via a secure VPN server and encrypting ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
9K+ Views
Both Substitution Cipher and Transposition Cipher are traditional techniques used in cryptography to encrypt a plaintext into ciphertext in order to prevent it from getting tampered. Read through this article to find out more about Substitution cipher and Transposition cipher and how they are different from each other.What is Substitution ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
10K+ Views
Data Compression refers to a technique that allows a large file to be reduced to a smaller-size. It also allows decompressing the compressed file back into its original form.Lossy compression restores the large file to its original form with some level of loss in data which can be considered negligible, ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
13K+ Views
Both MD5 and SHA1 are hashing algorithms. MD5 is simple and fast, but it does not provide good security. SHA1 is complex as compared to MD5 and it provides greater level of security.Read through this article to find out more about these two hashing algorithms and how they are different ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
5K+ Views
IPv4 and IPv6 are internet protocol versions, with IPv6 being an upgraded version of IPv4. There are several differences between the IPv4 and IPv6 protocols, including their functionality, but the most important difference is the quantity of addresses (Address space) that they create.Read through this article to find out more ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
8K+ Views
In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can ... Read More