In this interactive object, learners test their knowledge of 14 geometric tolerance control symbols.
Impedance: Parallel to Series Conversion
By Patrick Hoppe
Students view the formulas to be used to convert a parallel impedance to a series impedance.
The Electrostatic Charge of a Capacitor
By Terry Bartelt
In this animated activity, learners examine the conversion of electrical energy into an electrostatic charge within the dielectric material of a capacitor.
In this animated and interactive object, learners examine how a variable voltage is obtained from a variable resistor that is wired as a potentiometer across a fixed DC power supply.
Transformer Action Demonstration
Learners view animations and video clips showing how power is transmitted from one energized coil to another.
Phase Relationships Between Line-Neutral and Line-Line Voltages
By Michael Gradinjan, Terry Fleischman
Learners view a demonstration showing that line-neutral voltages and line-line voltages are not in-phase with each other, but have a definite 30-degree relationship.
Anatomical Terminology: Relative Position
By Barbara Liang
In this interactive learning activity, learners review the terms used to describe relative position of body parts in order to have a common set of words to describe their position.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Total Resistance in a Parallel Circuit
The learner will apply the three formulas used to find the total resistance of three types of parallel resistor circuit configurations.
Basic Types of Lines Used in Engineering Drawings
By Kelly Curran, Glenn Sokolowski
In this highly interactive object, learners associate basic line types and terms with engineering drawing geometry. A quiz completes the activity.
Basic Linux Shell Commands
You'll improve your understanding of the basic shell commands.
Select the word that matches the definition or the quote.
Vulnerability Assessment & Attack Mitigation Terms
You'll focus on information relating to vulnerability assessments and attack mitigation.
Creative Commons Attribution-NonCommercial 4.0 International License.
Learn more about the license »