Twisted Pair Cable Noise Immunity
By Terry Bartelt
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
What is an Algorithm?
By carlfranklin
In this learning activity, we’ll learn what an algorithm is.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Bandwidth Capacity Techniques
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Bandwidth
In this learning activity you'll explore bandwidth.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Database Naming Conventions
By jamiecchavez
In this learning activity, you'll discover and then follow established rules when naming database objects.
IT Project Management: Waterfall Methodology
By Kimberly Reed
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
Understanding HTML Pathing
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
IP Routing
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
An Algorithm for Converting a Binary Number to a Decimal Number
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
FTP - What You Need to Know
By Joseph Wetzel
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
IT Stress Management - Root Cause
By mikhailvmatc
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Asymmetric Encryption: How It Works
By jheathma
In this learning activity you'll explore public key encryption and conclude with a short quiz.