Gate Smashers
Videos from Gate Smashers
Page 6 of 6 β’ 137 total videos
12:42
Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks
Gate Smashers
1.9M views
10:43
Understanding Network Topologies: Mesh, Star, Bus & More | Lec-5 Part-1 π
Gate Smashers
1.2M views
8:23
Asymmetric Key Cryptography Explained with Examples π | Network Security Basics
Gate Smashers
547.8K views
6:14
Understanding Symmetric Key Cryptography in Network Security π
Gate Smashers
663.8K views
7:39
Cryptography in Computer Networks | Hindi Tutorial on Information Security π
Gate Smashers
1.2M views
7:52
SJF Preemption Scheduling Question Explained π
Gate Smashers
952.8K views
10:30
L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System
Gate Smashers
2.1M views
16:23
L-2.7: Round Robin (RR) CPU Scheduling Algorithm with Example
Gate Smashers
3.6M views
13:37
SJF Preemption Scheduling Algorithm Explained π
Gate Smashers
2.7M views
9:14
L-2.4: Shortest Job First (SJF) Scheduling Algorithm Explained with Example | Operating System
Gate Smashers
3.1M views
10:34
L-2.3: First Come First Serve (FCFS) CPU Scheduling Algorithm with Example
Gate Smashers
3.5M views
10:31
L-2.1: Process Scheduling Algorithms β Preemptive vs Non-Preemptive CPU Scheduling in OS
Gate Smashers
2.2M views
8:59
CPU Scheduling Times Explained π
Gate Smashers
1.2M views
12:13
Lec-40: Network Layer β Responsibilities and OSI Model Overview
Gate Smashers
1.1M views
7:57
Mastering LRU Page Replacement Algorithm in Operating Systems π
Gate Smashers
1.7M views
24:49
L-4.4: Deadlock Handling and Prevention Techniques in Operating Systems
Gate Smashers
1.5M views
12:21
L-4.1: Deadlock Concept, Examples, Necessary Conditions, and the Dining Philosophers Problem in Operating Systems
Gate Smashers
2.3M views