By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
Firewalls: Packet Filters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll create a packet filter.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Dynamic Host Configuration Protocol
By Terry Bartelt
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
Firewall: Network Address Translation/Port Address Translation
In this learning activity you'll examine how network address translation works.
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
By Brett Sheleski
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
User Experience Design: User Experience Testing
By Kimberly Reed
In this learning activity, you'll be introduced to user experience testing.
Hexadecimal Numbering System
By Patrick Hoppe
In this learning activity you'll review the hexadecimal numbering system.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
By Dawn Rohm
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Visual Studio: Connecting to Team Foundation Service
By Brian Foote
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Visual Studio: Creating a New VSTS Repository
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.