Akhil Trivedi

Difference between Flowchart and Algorithm

Difference between Flowchart and Algorithm Difference between flowchart and algorithm is the same as the difference between a movie and its story, or the difference between a fiction novel and the story, or the difference between a comics or the story. Algorithms and flowcharts are two different tools used for creating new…

Difference Between LAN, MAN and WAN

LAN, MAN, And WAN Difference A computer network is a system in which multiple computers are connected to each other to share information and resources. Computer networks are categorized into three basic types based on their size, distance coverage, data…

Difference Between Kernel and Operating System

Difference Between Kernel and Operating System(Tabular Form) Difference Between Kernel and Operating System.operating system is a software package that communicates to the hardware and application.kernel is the lowest level of the operating system. Differences between kernel and operating system comparison…

Difference Between TCP/IP and OSI Model

Difference Between TCP/IP and OSI Model(Tabular Form) Difference between TCP IP and OSI Model. TCP/IP is a communication protocol that allows for connections of hosts to the internet. OSI, on the other hand, is a communication gateway between the network and the end-users. TCP/IP refers to Transmission…

Security Goals

Security Goals in Cryptography and Network Security The main Goal of  Security is to protect data or information which is being transmitted and achieve the Confidentiality Integrity & Availability of the data. Following are the main goal of information security. Confidentiality…

Security Attacks In Network Security

Security Attacks Security Attacks an attack is an action that comprises the information or network security. There are two types of attacks:  Passive Attack  Active Attack Passive Attack: The attacker only monitors the traffic attacking the confidentiality of the data.…

Asymmetric Key Cryptography

Asymmetric Key Cryptography Asymmetric key cryptography is also called a public key cryptography. In Asymmetric key cryptography two keys are used, one for encryption and other for decryption. Asymmetric key cryptography involves the use of two keys one is a…

Symmetric Key Cryptography

Symmetric Key Cryptography Symmetric key cryptography also called as Secret key cryptography or Symmetric cipher models. Symmetric key cryptography a single key is used for encryption as well as decryption Sender encrypts plain text using shared secret key and the resultant…

Working with JSON

A common use of JSON is to read data from a web server, and display the data in a web page. Objects in PHP can be converted into JSON by using the PHP function json_encode() in reverse you can use json_decode()…