Clients and Servers
By Terry Bartelt
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Components of a Computer Workstation: Skills Check 1
By Dar DeBruin-Hein
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
Authentication versus Authorization
By Joseph Wetzel
In this learning activity you'll review the differences between identification, authentication, and authorization.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Data Manipulation Language
By jamiecchavez
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
The Cell Membrane and Nanotechnology
By Barbara Liang
In this animated activity, learners examine nanotechnology applications that are based on cell membrane structure and function.
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Digital-to-Analog Converters
In this animated activity, learners examine how an electronic converter changes digital signals to analog signals. Sections of a synthesizer are identified, and the operation of a D/A converter is demonstrated.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
A Nano-Introduction to Nanotechnology
In this animated object, learners read about the uses of nanotechnology. The sciences, engineering, electronics, and other disciplines converge in nanotechnology. Examples are given for applications in manufacturing, biomedicine, and environmental science. Concerns about possible environmental effects are discussed.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Routers: Acronyms
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.