Clients and Servers
By Terry Bartelt
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
User Experience Design: What is User Experience Design?
By Kimberly Reed
In this learning activity you'll explore an overview of User Experience Design and recognize how User Experience Design (UXD) can make you a better designer.
An Algorithm for Converting a Binary Number to a Decimal Number
By Kevin Ritzman
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
An Algorithm for Converting a Decimal Number to a Binary Number
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Normalization – 1st Normal Form
By jamiecchavez
In this learning activity you'll explore and practice the first step in normalizing a database.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
CreateJS Animation
By Brett Sheleski
A use of the CreateJS JavaScript Library to perform a looping animation.
Window 10 and Desktop Elements
By Dawn Matott
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
What is the .Net Framework?
By carlfranklin
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
IP Routing
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Authentication versus Authorization
By Joseph Wetzel
In this learning activity you'll review the differences between identification, authentication, and authorization.
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
SEO - Promoting your Website
This learning object explains new, free, and traditional ways to market your website.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Hexadecimal Numbering System
In this learning activity you'll review the hexadecimal numbering system.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
IT Stress Management - Time Management
By mikhailvmatc
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.