Understanding HTML Pathing
By Jay Stulo
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
By Barbara Liang
Learners read how nanotechnology is creating new jobs in emerging industries while making others obsolete. This colorful and animated activity also looks at the types of products being created through the use of technology and how educational institutions have responded.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Social Engineering Attacks
By Joseph Wetzel
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
By Terry Bartelt
In this learning activity you'll examine how a large computer network is configured.
Nanotechnology: In the Beginning
By Weldon Faull
Learners listen to a lecture given during the early days of nanotechnology titled, “There’s Plenty of Room at the Bottom.” Dr. Richard Feynman made the presentation to the American Physical Society on December 29, 1959. Animation makes this lecture fun to absorb.
IT Project Management: Agile Scrum
By Kimberly Reed
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Firewall: Gateway Servers
By Joseph Wetzel, Douglas Tabbutt
In this animated object, learners examine how a gateway server operates.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
CRC – Cyclic Redundancy Check
By Dawn Rohm
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Nanosolutions to the Water Problem
Learners read about how universities, government agencies, energy companies, and nanotech firms are working together to use nanotechnology to help produce clean water for consumption.
Learners observe animations showing how data is converted between serial and parallel flow.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Computer File Types and Drives: Skills Check 2
By Dar DeBruin-Hein
In this interactive object, learners identify computer file types, disk drives, and various file commands.
Internet Components: Skills Check 3
In a series of interactive exercises, learners identify the parts of a URL, a Web site, and an e-mail memo. Students are given their score at the end of the activity.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Comparing Analog and Digital Signals
Learners compare animations of analog and digital data signals. A short quiz completes the activity.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.