Firewalls: Packet Filters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll create a packet filter.
Dynamic Host Configuration Protocol
By Terry Bartelt
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
An Overview of the Raspberry Pi
By Joseph Wetzel
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Firewall: Network Address Translation/Port Address Translation
In this learning activity you'll examine how network address translation works.
In this learning activity you'll examine how a large computer network is configured.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Computer File Types and Drives: Skills Check 2
By Dar DeBruin-Hein
In this interactive object, learners identify computer file types, disk drives, and various file commands.
Internet Components: Skills Check 3
In a series of interactive exercises, learners identify the parts of a URL, a Web site, and an e-mail memo. Students are given their score at the end of the activity.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
Nanosolutions to the Water Problem
By Barbara Liang
Learners read about how universities, government agencies, energy companies, and nanotech firms are working together to use nanotechnology to help produce clean water for consumption.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
An Overview of IT Project Management
By Kimberly Reed
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
Visual Studio: Creating a New VSTS Repository
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
How to Send an E-mail Message
By Beth Baar
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.
In this interactive learning object, the student matches the names of software with their definitions and categorizes computer terms according to the appropriate software.
Nanotechnology: In the Beginning
By Weldon Faull
Learners listen to a lecture given during the early days of nanotechnology titled, “There’s Plenty of Room at the Bottom.” Dr. Richard Feynman made the presentation to the American Physical Society on December 29, 1959. Animation makes this lecture fun to absorb.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.