In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
In this learning activity, you’ll discover the difference between a parameter and an argument.
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
In this learning activity you'll discover the const keyword and it’s uses in C++.
In this learning object you'll learn what recursion is and how to use it.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
This learning activity provides an overview of Search Engine Optimization, or SEO.
This learning object explains new, free, and traditional ways to market your website.
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
In this activity, you will explore what web analytics are and how to use them for site optimization.
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.