
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1908 Articles for Differences

3K+ Views
Both SVG and PNG are types of image formats to store images. SVG is a vectorbased image format where an image is represented by set of mathematical figures, whereas PNG is a binary image format that uses lossless compression algorithm to represent images as pixels. Read this article to find out more about SVG and PNG file formats and how they are different from each other. What is SVG? SVG stands for Scalable Vector Graphics. It is a type of image file that uses vector graphics to display images, rather than the traditional raster graphics used by most image ... Read More

6K+ Views
JPEG and GIF are types of image formats. JPEG uses lossy compression algorithm where the image may lose some of its data, whereas GIF uses lossless compression algorithm where there is no data loss. GIF images support animation and transparency. Read this tutorial to find out more about JPEG and GIF image formats and how they are different from each other. What is JPEG? JPEG stands for Joint Photographic Experts Group. JPEG is a raster image format. It uses the ".jpg" or ".jpeg" file extension. It uses a type of lossy compression to reduce file size, which means that some ... Read More

9K+ Views
In asymmetric multiprocessing, all the processors are not identical and they follow a master-slave relationship; whereas in symmetric multiprocessing, all the processors are identical and they share the main memory. Read this tutorial to find out more about asymmetric and symmetric multiprocessing, and how they are different from each other. Let's start with a basic overview of asymmetric multiprocessing. What is Asymmetric Multiprocessing? Asymmetric multiprocessing is the use of two or more processors handled by one master processor. All CPUs are interconnected but are not self-scheduling. It is used to schedule specific tasks to a CPU based on priority and ... Read More

19K+ Views
A printer is an output device that produces information or computer outputs on a paper. Depending upon the technology used, printers are classified into two categories namely, Impact Printers and Non-Impact Printers. An impact printer is one that operates by striking a printing head (made up of metal or plastic) against an ink ribbon, whereas a non-impact printer is one that prints characters and graphics without direct physical contact between the printing head and the paper. Read this tutorial to find out more about Impact and Non-impact Printers and how they are different from each other. What is an Impact ... Read More

7K+ Views
The primary difference between holography and photography is that holography is a technology used to create three-dimensional (3D) images of an object, whereas photography is one that creates two-dimensional (2D) images of a three-dimensional object. Read this tutorial to find out more about Holography and Photography and how they are different from each other. What is Holography? Holography is a technique to generate 3-dimensional images using interference and diffraction of light. It uses a coherent and monochromatic source of light. A hologram is needed to regenerate an image. In other words, holography can be defined as the process of wave ... Read More

2K+ Views
IPSec is a suite of protocols that provides security services during communications between networks. It supports network-level peer authentication, data origin authentication, data integrity, data encryption and decryption. It is often used to create a VPN.SSL is a networking protocol that provides a secure connection between a client and a server over the internet. It works at the transport layer. It is often used to secure the communication between a web browser and a web server.Read through this article to find out more about IPSec and SSL and how they are different from each other.What is IP Security (IPSec)?IPSec is ... Read More

2K+ Views
EIGRP stands for Enhanced Interior Gateway Routing Protocol. It is used to share information between routers lying in the same region. It can be easily implemented in small as well as large networks.OSPF stands for Open Shortest Path first. It is used on variable-length subnet masking (VLSM) and discontinuous networks. It is a classless routing protocol.Read through this article to find out more about EIGRP and OSPF and how these two protocols are different from each other.What is EIGRP?EIGRP is an advanced distance-vector routing protocol for automating routing decisions and configuration on a computer network. Cisco Systems designed the protocol ... Read More

3K+ Views
Bandwidth and Throughput are frequently used terms in telecommunications and sometimes we tend to use them as synonyms, but there's a subtle difference between these two terms.Bandwidth refers to the data capacity of a channel. It is defined as the total amount of data which can be transferred over a network in a specific period of time. Throughput, on the other hand, refers to the exact measurement of data transferred in a specific time period. It is also termed as "effective data rate" or "payload rate". Every network connection has a throughput, which explains how bits are transmitted across a ... Read More

11K+ Views
When a user presses the power button on their computer, it initiates the process known as "booting, " which loads and starts the operating system. Booting can also be thought of as a series of actions where the ROM of the computer is accessed in order to load the startup instructions. After that, the operating system is loaded from the disc that is now being used to boot the computer.A primary option for the boot disc is frequently the local hard drive. The process of booting the computer is finished when the operating system is loaded; at this point, the ... Read More

7K+ Views
Spoofing is an identity theft where a person tries to use the identity of a legitimate user. Phishing, on the other hand, is a phenomenon where an attacker employs social engineering methods to steal sensitive and confidential information from a user. Spoofing and phishing are both forms of cyber-attacks aimed at tricking you into disclosing your personal information. Both methods will be used by a criminal to gain your user names, passwords, and maybe more. Despite the fact that their final aim is the same, their techniques are not. Read through this article to find out more ... Read More