STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Seven Barriers to Listening
By Therese Nemec
The learner will identify common barriers to effective listening.
Routers
By Terry Bartelt
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
What is the .Net Framework?
By carlfranklin
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Financial Statement Analysis
By Lynette Teal
Learners read the definitions of working capital, current ratio, quick ratio, return on equity, accounts receivable turnover, and inventory turnover.
SEO - Promoting your Website
By Kimberly Reed
This learning object explains new, free, and traditional ways to market your website.
CreateJS Cardioid
By Brett Sheleski
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
Digital-to-Analog Converters
In this animated activity, learners examine how an electronic converter changes digital signals to analog signals. Sections of a synthesizer are identified, and the operation of a D/A converter is demonstrated.
Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Strings in the .NET Framework
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
The Physical and Physiological Problems of Too Much Stress
By Jim Lewis
Learners are shown the effect that too much stress can have on various parts of the body.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Cash Flow Crunch
By Julann Jatczak
Students read about cash flow problems and review suggestions for dealing with them.
User Experience Design: Fitts Law
In this activity, you'll learn how Fitt's Law applies to user experience design.
IT Stress Management - Root Cause
By mikhailvmatc
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
The Accounting Equation
Learners examine the accounting equation and view examples of how account items and figures are included in each part of the equation.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
Variables in Computer Programming (JavaScript)
In this learning activity you'll review what a variable is, how to use variables in JavaScript, and how the computer works with variables.