Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Peer-to-Peer Operating Systems
By Terry Bartelt
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
By Joseph Wetzel
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
SEO - A Brief Overview
By Kimberly Reed
This learning activity provides an overview of Search Engine Optimization, or SEO.
SEO - Promoting your Website
This learning object explains new, free, and traditional ways to market your website.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
In this activity, you will explore what web analytics are and how to use them for site optimization.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.