Gate Smashers

Videos from Gate Smashers

Page 6 of 6 β€’ 137 total videos

12:42

Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks

Gate Smashers
1.9M views
10:43

Understanding Network Topologies: Mesh, Star, Bus & More | Lec-5 Part-1 πŸ”—

Gate Smashers
1.2M views
8:23

Asymmetric Key Cryptography Explained with Examples πŸ” | Network Security Basics

Gate Smashers
547.8K views
6:14

Understanding Symmetric Key Cryptography in Network Security πŸ”

Gate Smashers
663.8K views
7:39

Cryptography in Computer Networks | Hindi Tutorial on Information Security πŸ”

Gate Smashers
1.2M views
7:52

SJF Preemption Scheduling Question Explained πŸ•’

Gate Smashers
952.8K views
10:30

L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System

Gate Smashers
2.1M views
16:23

L-2.7: Round Robin (RR) CPU Scheduling Algorithm with Example

Gate Smashers
3.6M views
13:37

SJF Preemption Scheduling Algorithm Explained πŸ•’

Gate Smashers
2.7M views
9:14

L-2.4: Shortest Job First (SJF) Scheduling Algorithm Explained with Example | Operating System

Gate Smashers
3.1M views
10:34

L-2.3: First Come First Serve (FCFS) CPU Scheduling Algorithm with Example

Gate Smashers
3.5M views
10:31

L-2.1: Process Scheduling Algorithms – Preemptive vs Non-Preemptive CPU Scheduling in OS

Gate Smashers
2.2M views
8:59

CPU Scheduling Times Explained πŸ•’

Gate Smashers
1.2M views
12:13

Lec-40: Network Layer – Responsibilities and OSI Model Overview

Gate Smashers
1.1M views
7:57

Mastering LRU Page Replacement Algorithm in Operating Systems πŸ“˜

Gate Smashers
1.7M views
24:49

L-4.4: Deadlock Handling and Prevention Techniques in Operating Systems

Gate Smashers
1.5M views
12:21

L-4.1: Deadlock Concept, Examples, Necessary Conditions, and the Dining Philosophers Problem in Operating Systems

Gate Smashers
2.3M views