By Barbara Liang
Learners read how nanotechnology is creating new jobs in emerging industries while making others obsolete. This colorful and animated activity also looks at the types of products being created through the use of technology and how educational institutions have responded.
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Social Engineering Attacks
By Joseph Wetzel
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Understanding HTML Pathing
By Jay Stulo
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Comparing Analog and Digital Signals
Learners compare animations of analog and digital data signals. A short quiz completes the activity.
Learners observe animations showing how data is converted between serial and parallel flow.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
IT Project Management: Combined Methodologies
By Kimberly Reed
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Components of a Computer Workstation: Skills Check 1
By Dar DeBruin-Hein
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
Internet Components: Skills Check 3
In a series of interactive exercises, learners identify the parts of a URL, a Web site, and an e-mail memo. Students are given their score at the end of the activity.
Nanotechnology: In the Beginning
By Weldon Faull
Learners listen to a lecture given during the early days of nanotechnology titled, “There’s Plenty of Room at the Bottom.” Dr. Richard Feynman made the presentation to the American Physical Society on December 29, 1959. Animation makes this lecture fun to absorb.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
An Introduction to Motor Proteins and Nanotechnology
In this animated object, learners consider how nanoscientists are mimicking intracellular movements when building nanobots.
CRC – Cyclic Redundancy Check
By Dawn Rohm
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Nanosolutions to the Water Problem
Learners read about how universities, government agencies, energy companies, and nanotech firms are working together to use nanotechnology to help produce clean water for consumption.