
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Md. Sajid has Published 354 Articles

Md. Sajid
1K+ Views
PVC and SVC are two common types of electrical equipment used in power systems. PVC is an abbreviation for Permanent Voltage Control, and SVC is an abbreviation for Static Var Compensator. PVC and SVC are both used for voltage control in power systems, but their operating principles and applications ... Read More

Md. Sajid
1K+ Views
The acronyms PBX and PABX are used interchangeably in the telecommunications industry to represent various types of private telephone exchange systems. Private Branch Exchange (PBX) is an abbreviation for a telephone system that is utilized within a single location, such as an office building or a campus. PABX is ... Read More

Md. Sajid
27K+ Views
OST and PST are the data files used to store emails, attachments, contacts, notes, and other data using Microsoft Outlook. OST files are used to interact with the Exchange Server while offline. PST files are used to store data on your local computer. OST files are created when you configure ... Read More

Md. Sajid
5K+ Views
The NEC and IEC are two different electrical industry codes or standards. The National Electrical Code (NEC) is a US standard, whereas the International Electrotechnical Commission (IEC) is a global organization that publishes international electrical engineering standards. One of the primary distinctions between NEC and IEC is their scope. While ... Read More

Md. Sajid
9K+ Views
MSI and EXE are software installation files that are used in the Windows operating system. MSI files are primarily created for software installations and utilize the Windows Installer service, whereas EXE files can perform a number of functions, including software installation, but are not always designed for this purpose. Read ... Read More

Md. Sajid
6K+ Views
MAC (Mandatory Access Control) and DAC (Discretionary Access Control) are two access control strategies used in computer security to limit resource access. The primary distinction between MAC and DAC is how they restrict resource access. DAC enables users to regulate access to resources that they own or have access to, ... Read More

Md. Sajid
11K+ Views
KML and KMZ are both file formats used in Google Earth and other mapping programs to display geographic data. The primary distinction between the two is that KML is a file format for storing geographic data in XML format, whereas KMZ is a compressed file format that contains one or ... Read More

Md. Sajid
7K+ Views
IPSec and GRE are two protocols used in computer networking to guarantee data security and privacy. While they have certain similarities, they serve diverse functions and have unique characteristics. IPSec are used in Virtual Private Networks (VPNs) to offer safe communication over an insecure network like the internet. GRE is ... Read More

Md. Sajid
724 Views
Hoists and cranes are two different types of machinery that are used to lift and move big items. While they have certain commonalities, they also have considerable variances. A hoist is a mechanism that lifts or lowers a load by wrapping a chain or rope around a drum or lift ... Read More

Md. Sajid
1K+ Views
FLA and SWF are two file formats that are utilized by Adobe Flash software. FLA is the file type used to store the editable source file for a Flash animation project, whereas SWF is the file format used to deliver the animation's final result, which can be played in a ... Read More