The IP Address Format
By Terry Bartelt
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Understanding HTML Pathing
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
FTP - What You Need to Know
By Joseph Wetzel
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Dynamic Host Configuration Protocol
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
IT Stress Management - Root Cause
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
In this learning activity you'll examine how a large computer network is configured.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
Visual Logic Basic Programming: Using Flow Charts
By Jason Vosters
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.