Tic-Tac-Technology
Amp up your learning experience in Information Technology! During this game, players attempt TRUE/FALSE questions to complete rows, columns, and diagonals by drawing three O's or three X's in the spaces of nine grid squares.
TIC TAK
tic tak
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
The Tar Utility - Linux
You'll receive a crash course on the tar command and its options.
The Responsible and Ethical use of ICT
After completing the readings and video you should now have a better understanding on the topic. Use your knowledge to play this memory matching game and match the definitions with the words.
The Indexing Process
This baseball game will help you to test your knowledge on the indexing process for to locate content and catalog information on your PC.
The Future of Training and Development
Training & Development
The Dynamic Host Configuration Protocol (DHCP) Review
For Servers
The CPIO Utility - Linux
You'll receive a crash course on the CPIO utility.