Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Records Management: Applying ARMA Rules to Business Filing
By Kim Olson
In this interactive object, learners apply their knowledge of the Association of Records Managers and Administrators (ARMA) filing rules by organizing and filing records alphabetically, numerically, and by subject.
Introduction to Ethics
By Elizabeth Jones
The learner will identify the three general types of ethics.
Communication: The Writing Process
The learner will identify the three steps in the writing process and the elements in each step.
Future-State Mapping
By Kaye Krueger
The learner reads an explanation of all of the elements that comprise a future-state map. A map is shown.
Routers: Logical Addresses
By Joseph Wetzel, Jeff Sonnleitner
In this learning activity you'll examine how logical addresses work. The IP address is the logical address assigned to a connection by the ISP or network administrator.
The Professional's Guide to Telephone Etiquette
By Dar DeBruin-Hein
Learners listen to effective techniques to successfully interact with customers via the telephone. They also submit their own suggested replies to customers in various scenarios. Topics include general telephone etiquette, dealing with angry callers, working with confused or unsure customers, and managing voicemail. A quiz completes this customer service activity.
Network Topologies
By Terry Bartelt
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Records Management: An Introduction to Filing Rules and Indexing (Screencast)
In this screencast, learners read an explanation of the file rules and indexing that have been developed by the Association of Records Managers and Administrators.
Distinguishing Leadership and Management Activities (Screencast)
By Ann Heidkamp
In this screencast, students read about the key differences between management and leadership activities. They will review typical supervisory activities as either management or leadership.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
A Model for Initiating Conflict Resolution (Screencast)
In this screencast you'll identify and write assertive "I" statements that focus on BCF (behavior, consequences, and feelings).
Components of a Computer Workstation: Skills Check 1
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
Variables in Computer Programming (C#)
By carlfranklin
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Variables in Computer Programming (JavaScript)
In this learning activity you'll review what a variable is, how to use variables in JavaScript, and how the computer works with variables.
Intro to Outlook
By Jenner Reinke
Explore the Microsoft Office Suite, which is so much more than just email.
What is Supply Chain Management?
By Kerrie Marquardt
In this learning activity, you will learn what supply chain management is, four main links that make up the supply chain, and explore examples of how effective supply chain management works.
Cycle Time and One-Piece Flow
By G. Dean Witman, CFPIM, C.P.M., Lean Six Sigma Black Belt
In a series of three interactive exercises, learners explore the relationship between process cycle time and defect detection, and between process cyle time and smaller batch sizes. The techniques of lean/JIT are applied to achieve the continuous improvement (kaizen) goal of reducing inventory by pursuing one-piece flow.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
DDoS - Distributed Denial of Service Attacks
By Joseph Wetzel
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Referential Integrity
By jamiecchavez
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Time Management Matrix
Explore what time management is, how to use a time matrix, and how to put it all together and use our new time management skills to accomplish more during your days.
Problem Solving: Using a Decision Matrix
By Mitch Vesaas
The learner will understand how to use brainstorming and a decision matrix to find the best solution to a problem.
Three Tips for Better Conflict Resolution
By VickyWeiland
In this learning object, you will learn the three tips to better resolve conflict with others.
Sexual Harassment: The Three Types
By Therese Nemec
In this learning activity, you'll identify the three types of sexual harassment.