- 161
- 142 184
Eupheus Mnemon
India
เข้าร่วมเมื่อ 10 ต.ค. 2019
Welcome to Eupheus Mnemon. Here you can find video lectures on different subjects related to Computer Science education. The entire content is ideal for graduate, undergraduate and postgraduate students like BCA, MCA, Diploma, B.Tech, and M.Tech. Suggestions to improve the content of this channel are highly appreciated.
Thank You
Enjoy Learning...
Thank You
Enjoy Learning...
C program to convert Infix to Postfix
In this video, I will explain the program that converts a given infix expression to its equivalent postfix expression.
#infix
#postfix
#infixtopostfix
#infix
#postfix
#infixtopostfix
มุมมอง: 2 823
วีดีโอ
Setting Priority to Arithmetic Operators - User Defined Function
มุมมอง 932 ปีที่แล้ว
In this Program, we will learn how to set priority to arithmetic operators
C Program to Check a character is alphanumeric or not
มุมมอง 7762 ปีที่แล้ว
In this C code, I will explain how to check whether a given character is alphanumeric or not.
Enter a charcter in lower case and print it in upper case.
มุมมอง 522 ปีที่แล้ว
#CprogramLab #Cprogram
C program to find the area of a rectangle
มุมมอง 592 ปีที่แล้ว
C program to find the area of a rectangle #area #rectanglearea #cprogram
C Program to add two numbers
มุมมอง 542 ปีที่แล้ว
C Program to add two numbers #AddTwoNumbers #CProgram
PUSH and POP Operation on STACK
มุมมอง 4823 ปีที่แล้ว
In this video, I will explain the push and pop operation. #push #pop #stack #stackoperation
Unit-3 Lecture-20 Functions in C PART-3
มุมมอง 863 ปีที่แล้ว
In this video, I will explain the terminologies associated with a function. Calling function The function which calls other function is known as the calling function. Here the main() function is acting as the calling function because it calls the function addition(). Called Function The function which is called by other function is known as a called function. Here addition() function is the cal...
Unit-3 Lecture-19 Functions in C PART-2
มุมมอง 743 ปีที่แล้ว
In this video, I will write a simple program to add two numbers using a function. #FunctionsinC #Function #FunctiontoAddTwoNumber
Unit-3 Lecture-18 Functions in C PART-1
มุมมอง 1373 ปีที่แล้ว
In this video, we explain the basic concept of functions in C with a simple real-life example. #functions #functionsinC #Cprogram
Introduction to Wireless Network
มุมมอง 1.5K3 ปีที่แล้ว
#MobileCommunication #WirelessNetwork #BaseStation
Unit-3 Lecture-17 continue statement
มุมมอง 443 ปีที่แล้ว
This video contains a simple description of the continue statement used in the C programming language. #continue #break #Cprogram
Unit-3 Lecture-15 Factorial of a Number Program using for loop, while loop, and do while loop
มุมมอง 7723 ปีที่แล้ว
Unit-3 Lecture-15 Factorial of a Number Program using for loop, while loop, and do while loop
Unit-3 Lecture-14 for Loop in different Style
มุมมอง 1103 ปีที่แล้ว
Unit-3 Lecture-14 for Loop in different Style
Unit-3 Lecture-7 switch statements in C Part-2
มุมมอง 713 ปีที่แล้ว
Unit-3 Lecture-7 switch statements in C Part-2
Unit-3 Lecture-4 Nested if-else statement
มุมมอง 1353 ปีที่แล้ว
Unit-3 Lecture-4 Nested if-else statement
Unit-3 Lecture-3 Selection with if-else statement
มุมมอง 953 ปีที่แล้ว
Unit-3 Lecture-3 Selection with if-else statement
Unit-3 Lecture-2 Selection with if statement
มุมมอง 1163 ปีที่แล้ว
Unit-3 Lecture-2 Selection with if statement
Great video, easy explanation! Thank you
Thank you sir
Great explanation!!
very informative, thank you
sir please give a program source code.
good explation please watch i
can you provide this slides?!
well explain...
كس امكم على الاكسنت الزق ياهنود ياشراميط
DLL is responsible for device to device or hop to hop or node to node delivery(uses MAC address and MAC address table), NL is responsible for Network to Network delivery(uses IP Address and Routing table), TL is responsible for process to process delivery(uses port number)
need program pdf
Super sir 🎉
Thankyou sir!!
Fantastic 💯
Does it consider arithmetic symbol as a alphanumeric?
U explained రియల్లీ well
Hi, do you have a website or where I can reach you for online classes?
Thanks for your comment. Sorry I don't have any website or I am not teaching online as well. You can comment your doubts and I will reply as soon as possible.
this is exactly what you explained in indirect tcp also sir😅,then what is the difference?
there is no snooping by foreign agent in indirect tcp so if packet is lost then correspondance node wont get any ack
Thank you very much
This is the best resource I've seen on IPsec! Thank you!
Very well explained 🤘🏻🤘🏻
you the best man, very clear and concise
well explained sir
By far the best video on this i have ever seen, this is really nice and well explained.
Thanks for watching....
VERY useful.Thank you!!!
Thanks for watching
This was very helpful. Thank you so much sir!🙂
Thanks for watching
I want this fopic in tamil explanation
👌🏻👌🏻
Well taught!!
Thanks for watching.
Sir what is the difference between traditional ip and mobile ip!?
Thanks for commenting. Pls watch the Mobile IP Part-1 video. I have explained why Mobile IP is needed. The link is here: th-cam.com/video/ykhc6z-Vu_E/w-d-xo.html
@@eupheusmnemon5228 after completing the first part I came to this second part!! Actually I referred a lot vedio for this topic but I understand yours properly ..wired connection concept is nothing but a traditional ip!???
DIT?
Amazing lecture sir
Thank You very much...
It helped me a lot , Thankyou sir !
Thank You Very much
Tqqq sooo much sir... This is really helpful to my final exam tomorrow.. Thanks alot sir
Thanks for your wonderful message. Keep watching.
👌 👍
Hi sir
Hello
Very nicely explained 👍 In New ip header what are the ip address being used?
Thanku sir for this tutorial
Thanks for your msg. Keep watching
Sir plz make more videos plz sir 🙏
Thanks for your reply, please find the other videos in this link: th-cam.com/play/PLnomZtxknXYRIlxNnhhblqvqaMqfxjh7s.html
Your teaching skill is superb
Thanks Anmol for your beutiful comment. This motivates me to create more content. Keep watching.
@@eupheusmnemon5228I have search for Bluetooth, but I didn't get it.
@@Otakuvfx07 Please find the complete list of video here: th-cam.com/play/PLnomZtxknXYRIlxNnhhblqvqaMqfxjh7s.html
Bluetooth: th-cam.com/video/_HaBWskQkVU/w-d-xo.html
Bluetooth: th-cam.com/video/1kZj-kNZTFY/w-d-xo.html
vey good job u just saved my life!! this video deserves 1M like
Thanks for your wonderful comment. A great motivation for me.
thank you so much! you explained it so well, been confused for hours about the different combinations of ipsec
Thanks a lot for your comment. Keep watching
Thank you so much sir This was informative Short smart and informative 👌 👍
Thanks for watching! inspiring msg.
Ans is 1111111110110100
1111111110110100
Ans-1000000001001011
Range for 16 bit word in 2s complement will be -32768 to +32767 2s complement representation for +75 is 00000000001001011 And for -39 it is 111111111101101
1s complement of -75 in 16 bit word will be 1111111110110100
Signed magnitude representation for -75 will be 1000000001001011
1000000001001011