Page 26 - CA 165 ver 1.0 Class 10
P. 26
DIFFERENCE BETWEEN POP3 AND IMAP
Basis for
Comparison POP3 IMAP
To read the mail, it has to be downloaded The mail content can be read before
Read
first. downloading.
The user cannot organize mails in the The user can organize the mails on the
Organize
mailbox of the mail server. server.
The user cannot create, delete or rename The user can create, delete or rename
Modify
mailboxes on a mail server. mailboxes on the mail server.
A user can search the content of mail
A user cannot search the content of mail,
Content for specific string of character before
prior to downloading.
downloading.
HTTP AND HTTPS
Hypertext Transfer Protocol (HTTP) is a protocol that enables transferring data over the web. Hypertext
is the way of creating documents that can be displayed on the web and which helps to establish a
link between themselves and cross links to other pages on the web. HTTP has been the most widely
used protocol for data transfer over the web. The data that is exchanged using HTTP isn’t secure as it
navigates plain text (not in coded or encrypted form) i.e., anyone between the web browser and server
can compromise or breach the data.
Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is
sent between the host browser and the connected website. The ‘S’ at the end of HTTPS stands for ‘Secure’.
It means all communications between your browser and the website are encrypted and secured. HTTPS
is often used to protect highly confidential online transactions like online banking, online shopping, etc.
Some of the differences between HTTP and HTTPS are as follows:
HTTP HTTPS
The address bar URL begins with “http://” The address bar URL starts with “https://”
It is unsecure. It is secure mode for exchanging data.
There is no encryption of data. Data is encrypted in HTTPS.
It does not require any certificate. It needs SSL (Secure Socket Layer) certificate.
REMOTE LOGIN PROTOCOLS
It refers to operating an application or software or database of a network or server from a remote
location. For example: Accessing the data or resource of a computer that is placed in an office
network, from a remote location at home. Remote access can be set up using a Local Area Network
(LAN), Wide Area Network (WAN) or even a Virtual Private Network (VPN) so that resources and
systems can be accessed from far off location or remotely.
24 Touchpad Computer Applications-X

