Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.
In this animated object, learners examine how a gateway server operates.
Learners view animations showing how hubs and switches work in local area network configurations.
Learners view the seven segments of an Ethernet frame and the types of information each represents.
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Learners read about how universities, government agencies, energy companies, and nanotech firms are working together to use nanotechnology to help produce clean water for consumption.
In this learning activity you'll examine how network address translation works.
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity you'll create a packet filter.
In this learning activity you'll examine how a large computer network is configured.
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
In this learning activity you'll review the differences between identification, authentication, and authorization.
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Explore how to combine Waterfall and Agile methodologies for your next software development project.
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.