Learners view animations showing how hubs and switches work in local area network configurations.
Instantiation: Constructing an Object
By Jay Stulo
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Denial of Service Attacks
By Joseph Wetzel
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
IT Project Management: Waterfall Methodology
By Kimberly Reed
In this learning activity, you’ll explore the Waterfall model and its application to software development.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Hacker Categories and Terminology
You'll be introduced to categories of attackers who target computer systems and networks.
Commonly Used Linux Acronyms
You'll test your familiarity with some commonplace Linux acronyms.
Access Point Devices
You'll familiarize yourself with various access point devices.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »