Learners view the seven segments of an Ethernet frame and the types of information each represents.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Cross-Site Scripting Defined
By Joseph Wetzel
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Peer-to-Peer Operating Systems
By Terry Bartelt
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
GD&T: Geometric Characteristic Symbols
By Glenn Sokolowski
In this interactive object, learners test their knowledge of 14 geometric tolerance control symbols.
Orthographic Projection #1
In this interactive and animated object, learners examine orthographic projection and the Glass Box Theory. Front, side, and top view development is demonstrated with pictorial views of each object to help develop 2D to 3D visualization skills.
Brain Exercise: Visualization #1
In this interactive object, learners practice their 3D visualization skills by identifying the correct isometric view of an object. Front, side, and top orthographic views are shown.
Brain Exercise: Visualization #3
Learners develop 3D visualization skills by examining front, side, and top orthographic views of objects. Using this information, students select the corresponding isometric view of each object.
In this game, you'll practice memorizing facts about RAM standards.
Hacker Categories and Terminology
You'll be introduced to categories of attackers who target computer systems and networks.
Vulnerability Assessment & Attack Mitigation Terms
You'll focus on information relating to vulnerability assessments and attack mitigation.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »