By Terry Bartelt
In this animated activity, learners examine how an electronic converter changes digital signals to analog signals. Sections of a synthesizer are identified, and the operation of a D/A converter is demonstrated.
Comparing Analog and Digital Signals
Learners compare animations of analog and digital data signals. A short quiz completes the activity.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Firewall: Network Address Translation/Port Address Translation
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how network address translation works.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Denial of Service Attacks
By Joseph Wetzel
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
IT Project Management: Agile Scrum
By Kimberly Reed
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Visual Studio: Connecting to Team Foundation Service
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
CRC – Cyclic Redundancy Check
By Dawn Rohm
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
An Overview of IT Project Management
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.