In this learning activity you'll examine how network address translation works.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
By Terry Bartelt
In this learning activity you'll examine how a large computer network is configured.
RC Time Constant
By Tim Tewalt, Patrick Hoppe
In this animated object, learners observe the voltage on a capacitor at various time constants when it either charges or discharges. Students then answer questions in the categories of Identify, Compare, and Compute.
Students follow step-by-step directions on how to make mathematical calculations for a Wheatstone bridge.
Peptide Bond Formation
By Richard Wilkosz
In this animated object, learners examine the formation of peptide bonds through dehydration synthesis.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
IT Networking: Prior Knowledge Internet Game
Match the vocabulary word with the correct definition
Information Technology Semester 1 Review
Quarter Assessment (DAP Review)2019-2020
Recap of most of the terms and topics covered in NET107.
Personal Information Vocabulary
Vocabulary for talking about self and filling out forms.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »
Give your new group a name.