By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
Achieve Persistence on the Web
By Joseph Wetzel
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Window and Desktop Elements
By Dawn Matott
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
Firewalls: Packet Filters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll create a packet filter.
By Terry Bartelt
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
By Dawn Rohm
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
User Experience Design: User Experience Testing
By Kimberly Reed
In this learning activity, you'll be introduced to user experience testing.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Routers: Logical Addresses
By Joseph Wetzel, Jeff Sonnleitner
In this learning activity you'll examine how logical addresses work. The IP address is the logical address assigned to a connection by the ISP or network administrator.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Dynamic Host Configuration Protocol
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
Finding Factorials with Recursion
By Brett Sheleski
In this activity we will discover when recursion is the best solution for your computer programming task.
In this learning activity you'll examine how a large computer network is configured.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.