Hexadecimal Numbering System
By Patrick Hoppe
In this learning activity you'll review the hexadecimal numbering system.
Value Types and Reference Types in the .Net Framework
By Jay Stulo
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
By Joseph Wetzel
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Finding Factorials with Recursion
By Brett Sheleski
In this activity we will discover when recursion is the best solution for your computer programming task.
CRC – Cyclic Redundancy Check
By Dawn Rohm
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Customer Service Skills for IT Professionals - Soft Skills
By Kimberly Reed
In this learning activity you'll be introduced to soft skills, or people skills, needed by all IT professionals.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Instantiation: Constructing an Object
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
User Experience Design: Developing Personas
In this learning activity, you'll be introduced to what personas are, explore how to create one, and understand why they're important.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
The Ethernet Frame
By Terry Bartelt
Learners view the seven segments of an Ethernet frame and the types of information each represents.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
An Algorithm for Converting a Binary Number to a Decimal Number
By Kevin Ritzman
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.