Page 26 - CA_165_V2.0_Flipbook
P. 26
DIFFERENCE BETWEEN POP3 AND IMAP
Some of the differences between POP3 and IMAP are as follows:
Basis for
Comparison POP3 IMAP
To read the mail, it has to be
Read The mail content can be read before downloading.
downloaded first.
The user cannot organise mails in
Organise The user can organise the mails on the server.
the mailbox of the mail server.
The user cannot create, delete or The user can create, delete or rename mailboxes
Modify
rename mailboxes on a mail server. on the mail server.
Content A user cannot search the content A user can search the content of mail for specific
of mail, prior to downloading. string of character before downloading.
HTTP AND HTTPS
Hypertext Transfer Protocol (HTTP) is a protocol that enables transferring data over the web. Hypertext
is the way of creating documents that can be displayed on the web and which helps to establish a
link between themselves and cross links to other pages on the web. HTTP has been the most widely
used protocol for data transfer over the web. The data that is exchanged using HTTP isn’t secure as it
navigates plain text (not in coded or encrypted form) i.e., anyone between the web browser and server
can compromise or breach the data.
Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which
data is sent between the host browser and the connected website. The ‘S’ at the end of HTTPS stands
for ‘Secure’. It means all communications between your browser and the website are encrypted and
secured. HTTPS is often used to protect highly confidential online transactions like online banking,
online shopping, etc. Some of the differences between HTTP and HTTPS are as follows:
HTTP HTTPS
The address bar URL (Uniform Resource Locator) The address bar URL starts with “https://”
begins with “http://”
It is unsecure. It is secure mode for exchanging data.
There is no encryption of data. Data is encrypted in HTTPS.
It does not require any certificate. It needs SSL (Secure Socket Layer) certificate.
REMOTE LOGIN PROTOCOLS
It refers to operating an application or software or database of a network or server from a remote
location. For example: Accessing the data or resource of a computer that is placed in an office
network, from a remote location at home. Remote access can be set up using a Local Area Network
(LAN), Wide Area Network (WAN) or even a Virtual Private Network (VPN) so that resources and
systems can be accessed from far off location or remotely.
24 Touchpad Computer Applications-X

