
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Kiran Kumar Panigrahi has Published 392 Articles

Kiran Kumar Panigrahi
1K+ Views
Have you ever seen http:// or https:// in a browser's address bar while surfing a website? In a nutshell, both of these are protocols that allow a web server and a web browser to communicate about a certain website. But, what are the features that distinguish these two? Well, the ... Read More

Kiran Kumar Panigrahi
11K+ Views
What is Routing? The process of determining a path for traffic inside a network or across or across different networks is known as routing. Routing occurs in a wide range of networks, including circuit-switched networks like the public switched telephone network (PSTN) and computer networks like the Internet. Routing is ... Read More

Kiran Kumar Panigrahi
964 Views
Both Firewall and Antivirus are security tools that protect the computer systems as well as the network infrastructure from virus, worms, Trojans, and other such cyber-threats. Firewalls scan and evaluate the data packets before they enter into a network, and then they either allow or deny the data packets based ... Read More

Kiran Kumar Panigrahi
2K+ Views
A Malware is a malicious program that is used by attackers to perform illegal operations on a user's machine, such as stealing personal information, corrupting system/network, encrypting data for "ransom" or deleting the data, etc.An Adware is a program that displays Ads during its execution. Developers get money from this ... Read More

Kiran Kumar Panigrahi
1K+ Views
Both these terms "cybersecurity" and "network security" are related to security measures that organizations employ to protect their data, systems, and network infrastructure from online threats. However, cybersecurity is used in a much broader sense, while network security is a subset of cybersecurity. Read through this article to find out ... Read More

Kiran Kumar Panigrahi
20K+ Views
When we surf the Internet, a two-way communication takes place between our web browser (client) and a web server (server). To regulate this communication, there are some protocols among which the most common one is the HTTP protocol, where the browser sends an HTTP request to the server and then ... Read More

Kiran Kumar Panigrahi
1K+ Views
When we surf the Internet, the webpages that we see and the contents that we download generally come from the "surface web". This is the part of the world wide web that is accessible to all with an Internet connection. The Surface Web is huge, but in reality, it covers ... Read More

Kiran Kumar Panigrahi
3K+ Views
A VPN connects a private network to another public network, which allows users to transmit and receive data as if their computers were connected to the private network physically.MPLS is a routing technique that is used to improve the speed and control of the network traffic. It speeds up traffic ... Read More

Kiran Kumar Panigrahi
2K+ Views
What is USB?A Universal Serial Bus (USB) is a communication interface that allows devices to communicate with a host controller such as a computer system. It links peripheral devices including digital cameras, mice, keyboards, scanners, printers, media players, flash drives, and external hard drives to a computer.A USB may be ... Read More

Kiran Kumar Panigrahi
7K+ Views
Channel allocation techniques are used in radio resource management for wireless and cellular networks to distribute bandwidth and communication channels to base stations, access points, and terminal devices.The objective of channel allocation is to maximize system spectral efficiency in bits/s/Hz/site through frequency reuse while maintaining a high level of service ... Read More