@worthwatching5575 - 58 本の動画
チャンネル登録者数 573人
Hello Guys.... In this channel, you can watch videos related to Computer Science subjects and will be provided with notes. Thanks :)
Needham and Schroeder Protocol (English Version)
Presentation Layer in OSI Model || Computer Networks
Computer Languages
Session Layer in OSI Model || Computer Networks
File System || Operating System
C-LOOK Scheduling Algorithm || Disk Scheduling Algorithm
Memories in Computer
Transport Layer in OSI Model || Computer Networks
LOOK Scheduling Algorithm || Disk Scheduling Algorithm
Computer Generations
Components of Computer
C-SCAN (Circular SCAN) Scheduling Algorithm || Disk Scheduling Algorithm
Computer Fundamentals
Network Layer in OSI Model || Computer Networks
SCAN (Elevator) Scheduling Algorithm || Disk Scheduling Algorithm
Data Link Layer in OSI Model || Computer Networks
Physical Layer in OSI Model || Computer Networks
Shortest Seek Time First (SSTF) Scheduling Algorithm || Disk Scheduling Algorithm
First Come First Serve (FCFS) Scheduling Algorithm || Disk Scheduling Algorithm
Disk Storage Structure and Disk Scheduling
OSI Model Overview || Computer Networks
Deadlock Recovery || Operating System
Computer Networks Basics (Part 2)
Deadlock Detection || Operating System
Computer Networks Basics (Part-1) Elaboration
Solution of Example of Banker's Algorithm || Banker's Algorithm || Operating System
Kerberos
Computer Networks Basics (Part-1)
Banker's Algorithm Examples || Operating System
Banker's Algorithm || Deadlock Avoidance || Operating System
Needham and Schroeder Protocol
Deadlock Avoidance || Operating System
Learn Mathematics Concept from Lil expert :)
Digital Signature
Hash Function
Asymmetric Cryptography
Deadlock Prevention || Operating System
Methods of handling Deadlock || Operating System
Transposition Techniques
Polyalphabetic Cipher
Resource Allocation Graph || Deadlock || Operating System
Deadlock || Operating System || Lecture 2
Deadlock || Operating System || Lecture 1
Memory Management (Part 10)|| Thrashing || Operating System
Playfair Cipher
Monoalphabetic Cipher
Memory Management (Part 9)|| Page replacement || Operating System
Memory Management (Part 8)|| Demand Paging || Operating System
Memory Management (Part 7)|| Virtual Memory || Operating System
Memory Management (Part 6)|| Segmentation || Operating System
Caesar Cipher
Introduction to Cryptography || Encipherment || Symmetric Cipher
Introduction to Security || OSI Security Architecture|| Distributed Systems
Memory Management (Part 5)|| Paging || Operating System
Memory Management (Part 4)|| Paging || Operating System
Memory Management (Part 3)|| Operating System
Memory Management (Part 2)|| Operating System
Memory Management (Part1) || Basics