Social Engineering Attacks
By Joseph Wetzel
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
What is an Algorithm?
By carlfranklin
In this learning activity, we’ll learn what an algorithm is.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Cash Basis Accounting
By Julie Dilling
In this interactive object, learners read a brief summary of the principles of cash basis accounting and then check their knowledge of transactions in a drag-and-drop exercise.
SEO: Analytics
By Kimberly Reed
In this activity, you will explore what web analytics are and how to use them for site optimization.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
User Experience Design: Usability Research Methods
In this learning activity, you'll be introduced to three common usability research methods.
Debugging: Breakpoints
In this learning activity we will discuss breakpoints: what they are and how to use them.
The Accounting Definition
By Lynette Teal
Learners examine the accounting process of recording, classifying, summarizing, interpreting, and communicating.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Angular JS
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
IT Stress Management - Volunteerism
By mikhailvmatc
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
Attributes of a Class: Fields and Properties
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
The Accounting Equation and Account Classification
Learners examine the accounting equation and classify accounts into the appropriate categories in drag-and-drop exercises.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Database Data Types
By jamiecchavez
In this activity, you'll learn about the different data types associated with databases.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
The CLR: Overview of the Common Language Runtime
In this learning activity, you’ll explore the Common Language Runtime, or CLR.
Problem Solving: Using a Run Chart
By Mitch Vesaas
You'll understand how to use a run chart to describe a manufacturing problem.
The Debits and Credits of Accounting
Learners read an explanation of the debits and credits of accounting as they relate to T accounts and the accounting equation. Illustrated examples are provided.
Value Stream Mapping: Drawing a Current-State Map
By Kaye Krueger
Learners follow step-by-step instructions for creating a current-state map to identify how materials and information flow.