>>1470ill spoonfeed this for you:
No vpn/tor: your isp knows what ip/domain you are connecting to, if the traffic is encrypted in transit (tls, https) they cannot know what data you are sending/receiving, just where it's going
ex.
http: example.com - 93.184.216.34 , if you visit a certain page or file your isp will know what that page was
https: soyjak.party 104.21.233.123, your isp will only see you are connecting to the website, not what page you are on
VPNs basically shift the trust from your isp to the vpn host. all connections from your computer to the vpn are encrypted in transit, so your isp will know you are connecting to a vpn, but nothing else. the vpn on the other hand can see as much as the ISP can.
tor is a vpn with extra steps, you plan a route with 4-6 nodes (i forgot how many) and you "layer" encryption of your data several times so the intermediary nodes only know where it's coming from and where it's going. If you are visiting a clearweb (non .onion) the last node (exit node) will know what clearnet site you are visiting, but they don't know WHO is visiting it. your isp will see you are connected to the tor entry node (all tor node IPs are publicly listed) unless you use a bridge (not publicly listed entry node)
if you are visiting a hidden service (.onion), not even the person running the hidden service knows where connections are coming from since there are no "exit" nodes
tldr: your isp knows what vpn you are connected to but not what you are doing with it (unless the vpn host snitches and tells them on request)
they can see if you are connected to tor but not where you are going and it's difficult by design to correlate tor traffic to an individual, unless you are retarded and have poor operation/info security
tldrtldr: look it up or ask your local ai overlord