In this learning activity you'll review the differences between identification, authentication, and authorization.
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Explore how to combine Waterfall and Agile methodologies for your next software development project.
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
In this interactive object, learners identify computer file types, disk drives, and various file commands.
In a series of interactive exercises, learners identify the parts of a URL, a Web site, and an e-mail memo. Students are given their score at the end of the activity.
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.