In this learning activity you'll examine how network address translation works.
Cross-Site Scripting Defined
By Joseph Wetzel
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
By Terry Bartelt
In this learning activity you'll examine how a large computer network is configured.
RC Time Constant
By Tim Tewalt, Patrick Hoppe
In this animated object, learners observe the voltage on a capacitor at various time constants when it either charges or discharges. Students then answer questions in the categories of Identify, Compare, and Compute.
Students follow step-by-step directions on how to make mathematical calculations for a Wheatstone bridge.
Peptide Bond Formation
By Richard Wilkosz
In this animated object, learners examine the formation of peptide bonds through dehydration synthesis.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
Hacker Categories and Terminology
You'll be introduced to categories of attackers who target computer systems and networks.
Commonly Used Linux Acronyms
You'll test your familiarity with some commonplace Linux acronyms.
Computer Port Crossword
This game will challenge your knowledge of different computer ports.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »