Computers Articles

Page 77 of 100

How to clear old items in pivot table?

Richa Garg
Richa Garg
Updated on 10-Oct-2022 452 Views

In this article we will learn how to update the pivot table data after updating the details of source table. In many cases, whenever we update the source data as per the requirement the old data still appears in the filter of pivot table dropdown options. This may create confusion for the end user who will view the data table and pivot table. To resolve this issue we can use the following steps. Step 1− We have taken a sample data for creating the Pivot Table as following − Step 2− Now, if we update any value in the ...

Read More

How to clear filters when opening, saving or closing workbook in Excel?

Richa Garg
Richa Garg
Updated on 10-Oct-2022 3K+ Views

In this article we will learn to remove filters while opening/closing or saving a worksheet. Because whenever a filter is applied in the worksheet it gets saved along with the file and remain as is until manually removed. They filters may be misinterpreted as missing data in the worksheet. The filters can be removed automatically after applying some Visual Basic codes in the respective worksheet. The following are the VBA codes to be incorporated for this task. Clear filters while opening a workbook Clear filters while saving a workbook Clear filters while closing a workbook Clear filters while ...

Read More

Difference between Virus, Worm and Trojan Horse

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 25-Aug-2022 14K+ Views

Viruses, Worms, and Trojan Horses are types of malicious software that infiltrate a system and try to create havoc, however what sets them apart is the way they attack, spread, and replicate. Read though this article to get an overview of how a virus is different from a worm, and what exactly is a Trojan Horse. What is a Virus? A virus is malicious software (malware) made up of little bits of code attached to legitimate programs. When that software is launched, the virus is launched as well. Viruses are malicious programs that infect computer files and spread ...

Read More

Differences between InterDomain Routing and IntraDomain

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 23-Aug-2022 12K+ Views

What is Routing? The process of determining a path for traffic inside a network or across or across different networks is known as routing. Routing occurs in a wide range of networks, including circuit-switched networks like the public switched telephone network (PSTN) and computer networks like the Internet. Routing is the higher-level decision-making in packet switching networks that sends network packets from their source to their destination through intermediate network nodes using particular packet forwarding techniques. The passage of network packets from one network interface to another is known as packet forwarding. Routers, gateways, and other network hardware devices are ...

Read More

Difference between Firewall and Anti-virus

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 23-Aug-2022 1K+ Views

Both Firewall and Antivirus are security tools that protect the computer systems as well as the network infrastructure from virus, worms, Trojans, and other such cyber-threats. Firewalls scan and evaluate the data packets before they enter into a network, and then they either allow or deny the data packets based on certain predefined rules setup by the network protocols. Firewalls can be implemented both at the software and hardware levels, while an antivirus program can be implemented only at the software level. Read through this article to know more about Firewall and Antivirus and how they are different from each ...

Read More

Difference between Lossy Compression and Lossless Compression

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 22-Aug-2022 13K+ Views

Data Compression refers to a technique that allows a large file to be reduced to a smaller-size. It also allows decompressing the compressed file back into its original form.Lossy compression restores the large file to its original form with some level of loss in data which can be considered negligible, while lossless compression restores the compressed file to its original form without any loss of data.Read through this article to find out more about Lossy and Lossless compression techniques and how they are different from each other.What is Lossy Compression?Lossy compression is a type of data encoding and compression that ...

Read More

Difference between FTP and TFTP

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 22-Aug-2022 5K+ Views

FTP is used for copying files from one host to another host location. FTP works on Port 20 and 21. Port 20 is used for data and Port 21 is used for connection control.TFTP is lighter than FTP and is used when a file transfer functionality is needed without FTP features. It works on Port 69 and follows the UDP protocol.Read through this article to find out more about FTP and TFTP and how they are different from each other.What is FTP?FTP stands for File Transfer Protocol. It is a client/server protocol for sending files to and from a host ...

Read More

Difference Between Hub and Bridge

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 22-Aug-2022 6K+ Views

Both Hubs and Bridges are network connecting devices and both of them broadcast data to every node on a network. Hubs operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Bridges connect various devices in a network.A bridge operates at the data link layer to connect multiple networks. It can read the outmost section of a data packet to tell where the message is going. A bridge can be programmed to reject packets from a particular network, so it can be used to reduce ...

Read More

Difference between Spoofing and Phishing

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 11-Aug-2022 8K+ Views

Spoofing is an identity theft where a person tries to use the identity of a legitimate user. Phishing, on the other hand, is a phenomenon where an attacker employs social engineering methods to steal sensitive and confidential information from a user. Spoofing and phishing are both forms of cyber-attacks aimed at tricking you into disclosing your personal information. Both methods will be used by a criminal to gain your user names, passwords, and maybe more. Despite the fact that their final aim is the same, their techniques are not. Read through this article to find out more ...

Read More

Difference between Bytecode and Machine Code

Pradeep Kumar
Pradeep Kumar
Updated on 22-Jul-2022 2K+ Views

Each computer has its own unique set of instructions, which can only be read and carried out by the machine itself once it has deciphered them. The instructions are saved in the computer as binary bit patterns, which are essentially just long sequences of ones and zeros. Therefore, the only instructions that a specific computer may carry out are those written in the language of the microprocessor it uses. The programme can be saved on a disc and then loaded into the internal memory of the computer. After that, the central processing unit (CPU) will retrieve the instructions one at ...

Read More
Showing 761–770 of 993 articles
« Prev 1 75 76 77 78 79 100 Next »
Advertisements