Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
Learners read how nanotechnology is creating new jobs in emerging industries while making others obsolete. This colorful and animated activity also looks at the types of products being created through the use of technology and how educational institutions have responded.
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Learners view the seven segments of an Ethernet frame and the types of information each represents.
In this animated activity, learners examine nanotechnology applications that are based on cell membrane structure and function.
Learners view animations showing how hubs and switches work in local area network configurations.
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
In this interactive learning object, the student matches the names of software with their definitions and categorizes computer terms according to the appropriate software.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Learners listen to a lecture given during the early days of nanotechnology titled, “There’s Plenty of Room at the Bottom.” Dr. Richard Feynman made the presentation to the American Physical Society on December 29, 1959. Animation makes this lecture fun to absorb.
This learning object offers a brief summary of the impact of nanotechnology on automobile tires. Learners look at the future of cars, especially the safety and future of automobile tires.
Learners read about how universities, government agencies, energy companies, and nanotech firms are working together to use nanotechnology to help produce clean water for consumption.