The Accounting Cycle
By Lynette Teal
Learners examine the 10 steps of the accounting cycle. The cycle begins with the analysis of source documents and ends with the post-closing trial balance and interpreting the financial information.
Referential Integrity
By jamiecchavez
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Sexual Harassment: The Three Types
By Therese Nemec
In this learning activity, you'll identify the three types of sexual harassment.
The You View
By Jennifer McIntosh, Barbara Laedtke
Learners will write effective business messages that incorporate a second-person point of view and focus on the benefit to the reader. This approach is often used to create positive messages, neutral messages, and inquiry messages in business settings.
Financial Statements: What Are They? What Do They Mean?
By Beth Baar
Learners read about the most common forms of financial statements including balance sheets, cash flow statements, and profit and loss statements. A brief quiz completes the activity.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Analog and Digital Converters
By Terry Bartelt
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
5S
By Kaye Krueger
In this interactive object, learners assess their knowledge of 5S, a process for attaining a safe, clean, neat arrangement of the workplace where everything has a specific location and unneeded items are eliminated.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Accrual Basis Accounting
By Julie Dilling
Learners reinforce the matching concept in accrual basis accounting through a drag-and-drop exercise.
IT Project Management: Waterfall Methodology
By Kimberly Reed
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Litigation Flowchart
By Jody Cooper
In this interactive object, learners follow the litigation process from the filing of a court case through the filing of an appeal. Learners’ choices will move the case in different directions, based on the actions of the parties and the Court. A quiz completes the activity.
SEO - A Brief Overview
This learning activity provides an overview of Search Engine Optimization, or SEO.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Cycle Time and One-Piece Flow
By G. Dean Witman, CFPIM, C.P.M., Lean Six Sigma Black Belt
In a series of three interactive exercises, learners explore the relationship between process cycle time and defect detection, and between process cyle time and smaller batch sizes. The techniques of lean/JIT are applied to achieve the continuous improvement (kaizen) goal of reducing inventory by pursuing one-piece flow.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Routers: Acronyms
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
Intro to Outlook
By Jenner Reinke
Explore the Microsoft Office Suite, which is so much more than just email.
Customer Service Skills for IT Professionals - Controlling the Conversation
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Asymmetric Encryption: How It Works
By jheathma
In this learning activity you'll explore public key encryption and conclude with a short quiz.