In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
In this learning activity you'll be introduced to soft skills, or people skills, needed by all IT professionals.
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
In this activity, you'll learn about the different data types associated with databases.
In this learning activity, you'll discover and then follow established rules when naming database objects.
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
In this learning activity we will discuss breakpoints: what they are and how to use them.
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
In this learning activity you'll examine how a large computer network is configured.
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
In this activity we will discover when recursion is the best solution for your computer programming task.
In this learning activity you'll examine how network address translation works.
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity you'll create a packet filter.
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
You will learn four steps for good goal setting.
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
In this learning activity you'll review the hexadecimal numbering system.