- 70
- 1 675 193
Simply Made
India
Приєднався 21 гру 2016
The main purpose of this channel is to make exam topic so easy to understand and remember. To Provide the simplest notes possible.
Schrodinger equation | time dependent and time independent Schrodinger equation
#btech1styear #engineeringphysics #quantummechanics #quantumphysics #quantumtheory #rgpv1stsem
#schrodingerwaveequation #schrodinger #schrodingerequation
Schrodinger time dependent wave equation
Schrodinger time independent wave equation
#schrödinger #schrodingerscat
#schrodingerwaveequation #schrodinger #schrodingerequation
Schrodinger time dependent wave equation
Schrodinger time independent wave equation
#schrödinger #schrodingerscat
Переглядів: 149
Відео
Operators in quantum mechanics | operators in quantum physics | operators rgpv
Переглядів 134Місяць тому
#btech1styear #engineeringphysics #quantummechanics #quantumphysics #quantumtheory #rgpv1stsem #operatorsinquantummachenics #quantumoperators
Wave nature of particles | de broglie hypothesis | quantum mechanics rgpv engineering physics
Переглядів 181Місяць тому
In this tutorial i will explain 2nd topic of quantum mechanics Wave nature of particles RGPV wa #btech1styear #engineeringphysics #quantummechanics #quantumphysics #quantumtheory #rgpv1stsem #debrogliehypothesis #debroglie
Introduction to quantum mechanics | Quantum mechanics Introduction Btech 1st year
Переглядів 491Місяць тому
This tutorial is targeted for rgpv first year students. Topic is explained in most easy way. Engineering physics Quantum mechanics Quantum physics #introductiontoquantumphysics #engineeringphysics #rgpv1stsem #btech1styear #quantumphysics #quantummechanics #quantumtheory
software piracy | Pirated software | software piracy in cyber security
Переглядів 32 тис.Рік тому
software piracy types of pirated software softlifting pirated software different forms of software piracy software piracy in cyber security internet piracy software counterfeit software piracy in cyber crime software piracy for exams software piracy in rgpv
cyber terrorism | cyber terrorism in cyber security
Переглядів 47 тис.Рік тому
cyber terrorism cyber terrorism in cyber security cyber terror digital terrorism online terrorism terrorism in cyber world cyber security tutorial cyber terrorism rgpv
Connection oriented and connection less service Part 2 | Reliable and unreliable service Lecture 10
Переглядів 7 тис.2 роки тому
In this lecture we will learn about types of connection oriented and connectionless service connection oriented and connectionless service can be reliable or unreliable
Connection oriented and connectionless service | part 1/2 lecture 9
Переглядів 15 тис.2 роки тому
In this lecture we will learn about connection oriented and connection less service with example I will provide a detailed explaination of this topic with easy notes connection oriented vs connection less service example of connection oriented service and connectionless service explain in detail in computer networks connection oriented vs connectionless service For more please subscribe to my c...
components of computer network | lecture 8
Переглядів 9 тис.2 роки тому
In this lecture we will learn about components of computer networks host/nodes server client network hardware device software components - protocols operating systems network components
Goals of computer network | Lecture 7
Переглядів 11 тис.2 роки тому
In this video we will learn what are the goals of computer networks, why do we create computer networks in very easy and understandable way.. computer networks and goals goals - computer networks goal of computer network computer networks goals
Attacks on wireless network
Переглядів 24 тис.2 роки тому
attacks on wireless network wireless network attacks explain wireless network attacks in computer networks
Phishing techniques | phishing techniques in cyber security | lecture 37
Переглядів 28 тис.2 роки тому
In this lecture we will continue with phishing attack we will learn about different phishing techniques attacker use to trick individual different phishing techniques ~ Social engineering phishing technique ~ deceptive phishing, spear phishing, whaling proxy based phishing technique man in middle attack search engine phishing
Phishing | what is phishing | explain phishing attack | Lecture 36
Переглядів 77 тис.2 роки тому
In this video we will learn about phishing attack in detail with example. what is phishing explain phishing with example explain phishing with daigram phishing in cyber security
Dos and Ddos attack | Dos attack | denial of service attack | lecture 35
Переглядів 90 тис.2 роки тому
Dos and Ddos attack | Dos attack | denial of service attack | lecture 35
Buffer and overflow | Lecture 34 part 2 | Buffer overflow attack in cyber security
Переглядів 23 тис.2 роки тому
Buffer and overflow | Lecture 34 part 2 | Buffer overflow attack in cyber security
Buffer and overflow | Buffer overflow | part 1 Lecture 33 | Buffer overflow in cyber security
Переглядів 37 тис.2 роки тому
Buffer and overflow | Buffer overflow | part 1 Lecture 33 | Buffer overflow in cyber security
Backdoor in cyber security | Types of backdoors | Lecture 32
Переглядів 32 тис.2 роки тому
Backdoor in cyber security | Types of backdoors | Lecture 32
Types of trojan horse | Types of trojan horse in cyber security | lecture 31
Переглядів 19 тис.2 роки тому
Types of trojan horse | Types of trojan horse in cyber security | lecture 31
Trojan horse in cyber security | trojan in cyber security | Lecture 30
Переглядів 50 тис.2 роки тому
Trojan horse in cyber security | trojan in cyber security | Lecture 30
worms in cyber security | Virus and worms | Lecture 29
Переглядів 22 тис.2 роки тому
worms in cyber security | Virus and worms | Lecture 29
types of virus | virus in cyber security | Part 2 | Lecture 28
Переглядів 16 тис.2 роки тому
types of virus | virus in cyber security | Part 2 | Lecture 28
virus in cyber security | what is virus | Virus | Lecture 27
Переглядів 22 тис.2 роки тому
virus in cyber security | what is virus | Virus | Lecture 27
Spyware | Spyware in cyber security | Spyware in detail | Lecture 26
Переглядів 31 тис.2 роки тому
Spyware | Spyware in cyber security | Spyware in detail | Lecture 26
keylogger | key logger in cyber security | types of key loggers | Lecture 25
Переглядів 44 тис.2 роки тому
keylogger | key logger in cyber security | types of key loggers | Lecture 25
Password cracking | Password cracking techniques | Lecture 24 Part 2 of 2
Переглядів 17 тис.2 роки тому
Password cracking | Password cracking techniques | Lecture 24 Part 2 of 2
Password cracking | Password cracking in cyber security | Lecture 24
Переглядів 39 тис.2 роки тому
Password cracking | Password cracking in cyber security | Lecture 24
Proxy server and anonimizer | Lecture 24 Part 2
Переглядів 21 тис.2 роки тому
Proxy server and anonimizer | Lecture 24 Part 2
Proxy servers and anonimizer | Part 1 | Lecture 23
Переглядів 35 тис.2 роки тому
Proxy servers and anonimizer | Part 1 | Lecture 23
Nature of criminality | Lecture 21 | Exams
Переглядів 9 тис.2 роки тому
Nature of criminality | Lecture 21 | Exams
you have explained it very well 😊
Mem notes pdf provide kijiyena please
2 din baad exam
Useful video. Great job! 👍🏻
Mam app ki pen bhut achhi hai
Ma'am apka voice use kiya gya hai apko pta h ? Ek gaane me use kra h strike maar do unpe 😜
Ladke Convict
more power to you mam! make more videos like this
Part 2 kab ai ga software piracy ka😢😢
Mam simple notes provide kare please
mam rgpv ki site hi http hai..😂
Bhaiya or badnaam nah krro yarr bhopal ko 😢😅😂
Reym 😂
Chatra client 😂
what a explanation mam ! your notes and teaching method is outstanding . thank you so much < ab pakka me kl exam me pass ho jauga >
what a explanation mam ! your notes and teaching method is outstanding . thank you so much < ab pakka kl exam me pass ho jauga me >
ma,am be like : ur end moment exam savior is here
Ab pass hojayege 😁
Your content is good but you might forget to upload the whole video.... most of the videos are half
Sister I am also from indore 🙌
Mam aapki voice or bhi achhi lagte ja rhi hai mujhe 😊
Mohit kal paper hi kya?
Ha bhai
Mam aapki playlist random order me hai aur bhot sare videos hi nhi hai
Please app enginnering ke 6th 7th 8th sem ki video bhi upload kre all subjects ki please
@@_mini_vikky_verma_8007 mene 6th sem k computer networking k upload kre hai kuch videos ... m continue krungi
❤️✨
mene like krdiya h
great content and lectures!!
legend are watching 14 hrs before exam
Mam aapki voice bahut achhi lagti hai 😅😊
mam all notes are great mam i wanna ask one thing ki aapka koi aur channel bhi hai ji jidhr aap padhati hai ya koi platform
Mam aapki voice bahut achhi hai 😊
Nice 🎉🎉
Nicely explained
mam aapke notes ki pdf share kardijiye
You must get paid for your hard work. This is really helpful for us.
Thankyou mam yor videos are very helpful ❤. Are u from jabalpur?
Thank you so much ma"am in advance 😆😆, Very simple language ->> ye Hackers bahut bure log hote hai🤭
Attacker bhopal me hai😂
Bhai kl paper hai pdh le 😂
@ScrollwithHarsh070 she kha , kounse clg se ho?
note,s mil sakta hai kya mam
medam ji ek course ko pura complete karne ka try Karo Half -half lecture dalke kuch bada nahi kar paaoge❤
mam pdf send kar do
Maam mera paper he parso kya app apne notes bej sakti he muje please 🥺
Theek hai 😅
ma'am i understand your content but i want to donate some money so plzz give me your upi id the i wish you shoud buy new pen
Advantages or types kyu nhi share kar the ho ap
Mam Can you Read my Cmt if you get then plzz do it as soon as possible becz my exam is on this 13th so it'll help me and my frnds and we (me and my frnd) are grateful for you 😊
Mam isme bich k topics bhi daal dijiye
13 exam
us moment😂😂😂
Mem face revel kab kar rhe ho app 😃