Complete Computer Knowledge Portal

Saturday, September 5, 2015

Difference between Mail and E-mail

Electronic mail is a method of exchanging digital messages from an author to one or more recipients. Email operates across the Internet or other computer networks.
The mail or post is a system for physically transporting documents and other small packages, as well as a term for the postcards, letters, and parcels themselves.

It uses Electronic address to send or receive messages.
Physical Address is used to send or receive messages.
No Specific route is followed
Specific Route is Followed
Uses Digital Stamps
Physical Stamps are used
Very Much Cheap
Costlier than Email.
E-Mails are delivered in very short duration from seconds to minutes.
Delivery is slow and may be in days or months.

Monday, February 9, 2015

Difference Between Microprocessor and Micro Controller

Micro controller
It is Multipurpose, Programmable device that accepts digital data as input from external input unit, processes it as per instructions in its memory, and provides results as output at external output unit.
It is a Self Contained System with a processor core, memory, and peripherals and can be used as embedded system.
Software Protection
Software Protection is less achieved in Microprocessor based systems.
Micro controllers offer more software protection by locking the on chip memory and is made protected from external circuit.
Input/output Devices
Keyboard, Mouse, Screen, disks, printers etc.
Switches, Relays, LEDs, LCD Displays, radio Frequency devices ,Sensors
High, Because Devices like memory, disks, and interfaces are connected externally and has to be purchased separately.
Decreased net cost of the embedded system as a whole, Because no needs to connect external devices like Read/Write Memory, Timers etc., unless you desire to create something beyond the limit.

Difference between Burst Mode and Cycle Stealing Mode of DMA

Burst Mode of DMA
Cycle Stealing Mode of DMA
It is the DMA data transfer technique in which no. of data words are transferred continuously until whole data is not transferred.
It is the data transfer technique in which one data word is transferred and then control is returned to CPU.
Data Transfer
Data transfer Continues until whole data is not transferred.
Data is transferred Only when CPU is idle.
This is very fast data transfer technique and is used to transfer data for fast speed devices.
It is the slow data transfer technique as data is transferred only when CPU is idle
CPU Utilization
Low CPU Utilization because CPU remains idle until whole data is not transferred.
High CPU utilization because data is transferred when CPU has no task to perform.

Difference between LED and OLED Display

Acronym for
Light Emitting Diode
Organic Light Emitting Diode
It is a flat panel display that uses array of light emitting diodes as video display.
It is also a type of LED in which organic compound is used as emissive electroluminescent layer to emit light when electric current is supplied to it. These OLEDs are self illuminating.
LED displays can get extremely bright and have slight advantage.
OLED display can also produce brighter displays but shining OLED pixels to maximum results in reduced pixel life.
Hard Material is used as substrate and can not be used to make flexible displays.
OLED can be fabricated on plastic substrates and can be used for making roll up display and can be embedded in cloths in future.
Black Level
LED displays rely on LED backlights behind an LCD panel and can no produce dark blacks even with advanced dimming techniques that dim LEDs. Hence, LED Displays suffers to produce dark levels.
Dark blacks are the important factor to achieve excellent picture quality allowing higher contrast and richer colors and resulting more realistic images. OLED reigns as the undisputed champion, When it comes to black levels.

Difference Between Wi-Fi and Wi-Max

Acronym for
Wireless Fidelity
World Interoperability for Microwave Access
It is a wireless technology that allows any electronic device to exchange and transfer data wirelessly.
It a wireless technology which delivers carrier class, high speed wireless broadband at low cost and covering large distance than Wi-Fi.
IEEE Standard
IEEE 802.11
IEEE 802.16
It is basically an implementation of wireless Local Area Connection within a small building, a college, or an institutional building.
It is a wireless broadband metropolitan technology whose objective is to interconnect houses, buildings, or even hot spots to allow communication between them or with other networks.
Can be implemented by using low cost access pints.
Wi-Max technology requires costly infrastructure.
Frequency band
2.4 GHz to 5 GHz
Licensed/Unlicensed 2 GHz to 11 GHz
Channel Bandwidth
Wi-Fi 802.11b= 25 MHz
Wi-Fi 802.11 a/g=20 MHz
Adjustable 1.25 M to 20
Full/Half Duplex
Half Duplex
Full Duplex

Wednesday, July 30, 2014

Difference Between Cloud Computing and Grid Computing

Grid Computing
Cloud Computing
It is a collection of heterogeneous Computers from different locations to achieve a common goal.
It is the delivery of computing as a service rather than a product, where resources, software, and information are provided to Computers and Other devices as a utility.
It makes use of heterogeneous Computers to run.
It makes use of Homogeneous computers to run.
Focused on
Intensive Calculus
Standard and intensive cloud.
Not Much Reliable
Less than Grid
Research Community
Grid is distributed and has multiple user communities and is grouped in virtual organization.
It has generally one research community and a common group of system administrators that take care of entire domain.

Thursday, June 5, 2014

Difference Between Linux and Windows

It is an Operating System developed by Microsoft and  named Windows on November 20, 1985 as a graphical operating system shell for MS-DOS
Linux is a Unix Like Operating System introduced by Linus Torvalds and was first released on 5 October 1991.
License Type
Proprietary Commercial Software and must have to be Purchased before using Windows OS.
Except Red Hat all versions are free and are distributed under GNU GPL License.
File System Supported

Ext,Ext2, Ext3, Ext3, ReiserFS, FAT, ISO 9660, UDF, NFS, NTFS, JFS, XFS, Minux
and GmailFS

Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1 etc.
Red Hat, Suse Linux, Debian, Knoppix, Ubuntu etc.

Wednesday, June 4, 2014

Difference Between HTML 4 and HTML 5

HTML 4.01
HTML 5.0
Doctype Declaration
Three Types of <!DOCTYPE> declarations are used in HTML 4.01 and that are:
i) HTML 4.01 Strict
ii) HTML 4.01 Transitional
iii) HTML 4.01 Frameset
There is Only one type of <!DOCTYPE> declaration in HTML 5 and that is <!DOCTYPE html>only.
Plugin Requirement
External Plugins are required to play audio and video files on HTML 4.01.
HTML 5 does not require any external plugin to play audio and video files.
Accept, Accept-charset, Action, Enctype, Method, Name, Target.
Accept-charset, Action, Enctype, Method, Name, Target, Autocomplete, Novalidate.
Input Types
Button, Checkbox, File, Hidden, Image, Password, Radio, Reset, Submit, Text.
Button, Checkbox, File, Hidden, Image, Password, Radio, Reset, Submit, Text, Color, Date, Datetime, Datetime-local, email, Month, Number, Range, Search, Tel, Time, Url, Week
Automatic Validation
Not Supported in HTML 4.01 and is achieved by other Scripting Languages.
Automatic Filed Validation is Supported in HTML 5.0

Sunday, June 1, 2014

Difference Between DBMS and RDBMS

Acronym for
Data Base Management System
Relational Data Base Management System
Data is stored in flat file oriented System and no relations are used.
It provides facility to create relation between tables.
Dr. E.F. Codd Rules
Only 3 rules, Out of 12, are followed by DBMS. (from Rule 0 to Rule 12)
Minimum 6 rules, Out of 12, are followed by RDBS. (from Rule 0 to Rule 12)
Data Security
It can’t implement constraints in Tables and has less Security. The ACID (Atomicity, Consistency, Isolation and Durability) property of the database is ensured by Programmer.
It can implement the integrity constraint for the purpose of holding ACID (Atomicity, Consistency, Isolation and Durability) property of the database and is much securing than DBMS.