By Terry Bartelt
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
By Barbara Liang
Learners read how nanotechnology is creating new jobs in emerging industries while making others obsolete. This colorful and animated activity also looks at the types of products being created through the use of technology and how educational institutions have responded.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Visual Studio: Connecting to Team Foundation Service
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
The Cell Membrane and Nanotechnology
In this animated activity, learners examine nanotechnology applications that are based on cell membrane structure and function.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Nanosolutions to the Water Problem
Learners read about how universities, government agencies, energy companies, and nanotech firms are working together to use nanotechnology to help produce clean water for consumption.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
IT Project Management: Combined Methodologies
By Kimberly Reed
Explore how to combine Waterfall and Agile methodologies for your next software development project.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.