Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
In this learning activity we will discuss breakpoints: what they are and how to use them.
DDoS - Distributed Denial of Service Attacks
By Joseph Wetzel
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Customer Service Skills for IT Professionals - Soft Skills
By Kimberly Reed
In this learning activity you'll be introduced to soft skills, or people skills, needed by all IT professionals.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
Customer Service Skills for IT Professionals - Controlling the Conversation
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
Customer Service Skills for IT Professionals - Communication
In this learning activity you'll be introduced to the communication model and how it impacts your work as an IT professional.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
By Brett Sheleski
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
CRC – Cyclic Redundancy Check
By Dawn Rohm
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
By Terry Bartelt
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Clients and Servers
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Bandwidth Capacity Techniques
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
In this learning activity you'll explore bandwidth.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Attributes of a Class: Fields and Properties
By Ryan Appel
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.