155 тысяч подписчиков
716 видео
12. Attribution, Attribution Theories in Organizational Behaviour |OB|
6. Finding Rank By Echelon Form Example Problem-1 (4*4 Matrix) |M1|
#54 S/MIME - Secure MIME protocol - Functions, Services |CNS|
#48 Secure Shell (SSH) Protocol & its Working |CNS|
26. Communication - Process & Types Of Communication in OB |OB|
Aneka Cloud Platform - Architecture & it’s Services with Diagram |CC|
4. Asymptotic Notations - Big Oh, Omega, Theta, Little Oh Notation |DAA|
#41 X- 509 Authentication Service - Certificate and its Elements |CNS|
#28. RSA Algorithm - Asymmetric key cryptography |CNS|
Arrays In PHP - Definition , Types Of Arrays with examples & For Each Loop |Web Technologies|
ACCENTURE TFA EXPERIENCE |cleared in 1st attempt| |Java Modules|
Groups VS Teams, Types of Groups & Teams in OB |L 37||OB|
#13 Factory Method Design Pattern - Creational Patterns |DP|
#44 Secure Socket Layer (SSL), SSL protocol stack, SSL Record Protocol|CNS|
#33 Message Authentication & Authentication Functions in Cryptography |CNS|
#25 Inventory Control and Objectives of Inventory Control |MS|
27. Interactive Communication & it’s Uses in OB |OB|
#34 MD5 Algorithm ( Message Digest 5) Working and Example |CNS|
Strings & String Functions in PHP | Web Technologies |
Quick Sort Algorithm - Concept, Code, Example, Time Complexity |L-7||DAA|
#45. SSL Handshake Protocol, SSL Change Cipher Protocol, SSL Alert Protocol |CNS|
#5 Software Engineering - A Layered Technology - 4 layers |SE|
INFOSYS 2021 RECRUITMENT DATE, TIME & PAPER PATTERN
33. Effects Of Stress & Strategies To Cope Up with Stress in Organizational Behaviour |OB|
#9 Frequent Patterns - Example, Market Basket Analysis |DM|
#37 Digital Signature In Cryptography |CNS|
Dynamics Of Informal Groups - Roles and Rules in Informal Groups|L 39||OB|
#32 Knapsack Algorithm with Example- Asymmetric key cryptography |CNS|
#3 Data Warehouse Components |DWDM|
Divide and Conquer Algorithm - General Method |Lec-5|DAA|
#1 Introduction To Data Mining, Types Of Data |DM|
#11 Concept Learning As Search With Example |ML|
6. Ethics and biggest ethical issues in Organizational Behaviour |OB|
#19 Bayesian Classification - Bayes Theorem, Naive Bayes Classifier |DM|
#64 Intruders - Types, Intrusion Detection Systems (IDS), Types of IDS |CNS|
Empowerment - definition and Types of empowerment in OB |L 36||OB|
15. Impression Management & its Techniques in Organizational Behaviour |OB|
How To Upgrade From TCS Ninja to TCS Digital after joining the company
#39 Elgamal Digital Signature - Example & Working |CNS|
#7 Process Framework - the 8 Umbrella Activities |SE|
#4 Data Warehouse Architecture - 2 tier, 3 tier, 4 tier Architectures |DWDM|
#14 Multiprocessor scheduling and Real Time Scheduling |Operating Systems|
#21 IDEA ( International Data Encryption Algorithm )- Block Cipher Algorithm |CNS|
#35 Capability Maturity Model Integration(CMMI)- Level 0 to Level 4 in Contemporary Management |MS|
#19 Advanced Encryption Standard ( AES ) Algorithm - Block Cipher Algorithm |CNS|
1. Electrical Circuit Elements - Resistance, Inductance, Capacitance |BEE|
1. Introduction To Organizational Behaviour, Nature & Scope Of OB |OB|
#41 Maximum Likelihood & Least Squared Error Hypothesis |ML|
#23 Types Of Data In Cluster Analysis |DM|
#6 Integration Of Data Mining System with A Database or Data Warehouse |DM|
Binary Search Algorithm - Concept, Code, Example, Time Complexity |L-6||DAA|