Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Kiran Kumar Panigrahi
Page 26 of 32
Difference between 1G and 2G protocols
After the launch of the first generation mobile network in the early 1980s, the mobile wireless communication system has gone through numerous stages of evolution in the last several decades. Because there was such a high demand for new connections throughout the world, mobile communication standards progressed quickly to accommodate more users. In this brief article, let's have a look at the features offered by the early generation mobile standards.1G ProtocolThe first generation of wireless cellular technology is referred to as 1G. These are analog telecommunications standards that were launched in the 1980s and lasted until 2G digital telecommunications superseded ...
Read MoreDifference Between 2D and 3D Shapes
2D shapes are flat with only length and breadth, while 3D shapes are solid objects with length, breadth, and height. In this brief article, we will take a look at the features of 2D and 3D shapes and identify how they differ from each other.2D ShapesA 2D shape has two dimensions, that is, Length and Breadth. 2D shapes are flat because they don't have any height or depth. Examples of 2D shapes include circle, rectangle, square, polygons, etc.Since 2D shapes don't have any height, they don't have any volume either. 2D shapes have only areas. 2D shapes are drawn using ...
Read MoreDifference between accrual and provision.
Accruals and Provisions are concepts in Financial Accounting that are used in different types of situations. Provisions are done for expenses that have not been occurred yet, while Accruals are funds kept aside to clear the unpaid dues. In this article, we will have a detailed look at how Accruals and Provisions are used in Accounting.What is Accrual in Accounting?The Accrual Principle is a concept in Accounting where the financial transactions are recorded during the same time period in which they occur, however the actual cash flow may occur at a later stage. For example, suppose a company supplies goods ...
Read MoreDifference between BlueTooth and UWB
Both Bluetooth and UWB are wireless technologies that are widely used to send and receive data wirelessly using radio signals. Bluetooth is a wireless technology that is used to connect devices in short range, whereas UWB is wireless network technology that can carry an extensive range of frequency bands while using very little power.Go through this article to find out more about the features of Bluetooth and UWB and how they are different from each other.What is Bluetooth?Bluetooth was created under the IEEE 802.15.1 standard, which is used for wireless communication via radio transmissions. Bluetooth was first introduced in 1994 ...
Read MoreDifference between BlueTooth and Zigbee
Both Bluetooth and ZigBee are wireless technologies that are widely used to send and receive data wirelessly using radio signals. Bluetooth is a wireless technology that is used to connect devices in short range, whereas ZigBee is wireless technology standard for personal area networks that uses low-power digital radio waves.Go through this article to find out more about the features of Bluetooth and ZigBee and how they are different from each other.What is Bluetooth?Bluetooth was created under the IEEE 802.15.1 standard, which is used for wireless communication via radio transmissions. Bluetooth was first introduced in 1994 as a wireless replacement ...
Read MoreDifference between Ethernet and LAN
A LAN is a computer network that is limited to a particular geographic area. Ethernet, the other hand, is a LAN network standard used in wired LAN. Go through this article to find out more about the features of Ethernet and LAN and how they are different from each other.What is Ethernet?Ethernet is a widely used LAN standard. Ethernet refers to networking technologies and systems used in local area networks (LANs) to connect computers inside a single physical space. It is defined under IEEE 802.3 standards. It is very easy to understand, implement, maintain and is a low-cost implementation. It ...
Read MoreDifference Between Go-Back-N and Selective Repeat Protocol
Go-Back-N is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1.Selective Repeat Protocol is also a data link layer protocol that uses sliding window method for reliable delivery of data frames. Here, only the erroneous or lost frames are retransmitted, while the good frames are received and buffered.Read through this article to find out how these two data link layer protocols work and what are the major differences between ...
Read MoreDifference between JSP and ASP
JSP and ASP are both server-side scripting languages. JSP is Java based and is developed by Sun Microsystems, whereas ASP is developed by Microsoft and is also referred as Classic ASP. Whenever a browser requests a JSP or ASP page, the server engine reads the file, executes the code in file and returns the HTML output to the browser.JSP is compiled, whereas ASP is interpreted. ASP.NET is a .NET based variant of ASP where the codes are compiled to improve the performance.What is ASP?ASP is a server-side scripting engine, which means the code that is written gets sent to the ...
Read MoreDifference between stateless and stateful protocols
A stateless protocol is one in which each communication is treated as a separate event, unrelated to other communications of the same type.A stateful protocol, on the other hand, is the polar opposite of a stateless protocol, in which each communication is treated as part of a broader sequence.Read through this article to find out more about stateless and stateful protocols and how they are different from each other.What is Stateful Protocol?In Stateful Protocol, when a client sends a request to the server, it expects a response; it resends the request if it does not receive one.Stateful applications and procedures ...
Read MoreDifference between Threat and Attack
From a security standpoint, threats and attacks are two critical occurrences. From the perspective of network security, it is critical to grasp the differences between the two.A threat in the realm of information security is the presence of a persistent hazard to information integrity. This might take the shape of a human, a computer virus or malware, or something else.An attack, on the other hand, is the actual act of exploiting the information security system's weaknesses.There are a number of network security dangers and attacks to be aware of, such as Information theft and fraud, putting a halt to routine ...
Read More