By Barbara Liang
Learners read how nanotechnology is creating new jobs in emerging industries while making others obsolete. This colorful and animated activity also looks at the types of products being created through the use of technology and how educational institutions have responded.
By Terry Bartelt
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
IT Project Management: Agile Scrum
By Kimberly Reed
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
The Cell Membrane and Nanotechnology
In this animated activity, learners examine nanotechnology applications that are based on cell membrane structure and function.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
An Overview of IT Project Management
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Visual Studio: Creating a New VSTS Repository
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
How to Send an E-mail Message
By Beth Baar
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.
Computer File Types and Drives: Skills Check 2
By Dar DeBruin-Hein
In this interactive object, learners identify computer file types, disk drives, and various file commands.
In this interactive learning object, the student matches the names of software with their definitions and categorizes computer terms according to the appropriate software.
Nanotechnology: In the Beginning
By Weldon Faull
Learners listen to a lecture given during the early days of nanotechnology titled, “There’s Plenty of Room at the Bottom.” Dr. Richard Feynman made the presentation to the American Physical Society on December 29, 1959. Animation makes this lecture fun to absorb.