Normalization – 3rd Normal Form
By jamiecchavez
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Debugging: Immediate Window
By carlfranklin
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Routers: Logical Addresses
By Joseph Wetzel, Jeff Sonnleitner
In this learning activity you'll examine how logical addresses work. The IP address is the logical address assigned to a connection by the ISP or network administrator.
IP Addressing and Subnetting
By Terry Bartelt
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Achieve Persistence on the Web
By Joseph Wetzel
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Go-Back-N ARQ
By Dawn Rohm
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Firewall: Gateway Servers
By Joseph Wetzel, Douglas Tabbutt
In this animated object, learners examine how a gateway server operates.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Bandwidth
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
Secure Data Erasure
By Baeten
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.