Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Kiran Kumar Panigrahi has Published 389 Articles
Kiran Kumar Panigrahi
13K+ Views
Communication, in general, is the process of transferring data from a source to a destination by using any of the available modes such as audio, video, text or even signals, etc. This communication may be straightforward between one sender and one receiver or it may include multiple senders and receivers. ... Read More
Kiran Kumar Panigrahi
1K+ Views
Both VPN and Proxy are used to connect to a remote system where one can access the host system from a remote location. However, VPNs are superior than Proxy servers because a VPN can protect your privacy and security by routing your traffic via a secure VPN server and encrypting ... Read More
Kiran Kumar Panigrahi
16K+ Views
Both Substitution Cipher and Transposition Cipher are traditional techniques used in cryptography to encrypt a plaintext into ciphertext in order to prevent it from getting tampered. Read through this article to find out more about Substitution cipher and Transposition cipher and how they are different from each other.What is Substitution ... Read More
Kiran Kumar Panigrahi
12K+ Views
Data Compression refers to a technique that allows a large file to be reduced to a smaller-size. It also allows decompressing the compressed file back into its original form.Lossy compression restores the large file to its original form with some level of loss in data which can be considered negligible, ... Read More
Kiran Kumar Panigrahi
16K+ Views
Both MD5 and SHA1 are hashing algorithms. MD5 is simple and fast, but it does not provide good security. SHA1 is complex as compared to MD5 and it provides greater level of security.Read through this article to find out more about these two hashing algorithms and how they are different ... Read More
Kiran Kumar Panigrahi
7K+ Views
IPv4 and IPv6 are internet protocol versions, with IPv6 being an upgraded version of IPv4. There are several differences between the IPv4 and IPv6 protocols, including their functionality, but the most important difference is the quantity of addresses (Address space) that they create.Read through this article to find out more ... Read More
Kiran Kumar Panigrahi
9K+ Views
In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can ... Read More
Kiran Kumar Panigrahi
3K+ Views
A SAN is a network of storage devices that can be accessed by multiple servers or computers. It provides a shared pool of storage space. Each computer on the network can access the storage on the SAN as though they were local disks connected directly to the computer. SAN uses ... Read More
Kiran Kumar Panigrahi
11K+ Views
A cluster computer refers to a network of same type of computers whose target is to work as one collaborative unit. Such a network is used when a resource-hungry task requires high-computing power or memory. Two or more same types of computers are clubbed together to make a cluster and ... Read More
Kiran Kumar Panigrahi
12K+ Views
Cloud computing refers to a client-server computing framework where resources are managed in a centralized fashion. It is provided as a pay-per-use service. Cloud computing makes the system all-time accessible.Grid computing refers to a network of the same or different types of computers whose target is to provide an environment ... Read More