Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
By Dawn Rohm
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
DDoS - Distributed Denial of Service Attacks
By Joseph Wetzel
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
Customer Service Skills for IT Professionals - Controlling the Conversation
By Kimberly Reed
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
Visual Studio: Creating a New VSTS Repository
By Brian Foote
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
By Brett Sheleski
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
How the Ethernet Works
By Terry Bartelt
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
User Experience Design: Fitts Law
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: Developing Personas
In this learning activity, you'll be introduced to what personas are, explore how to create one, and understand why they're important.
User Experience Design: Usability Research Methods
In this learning activity, you'll be introduced to three common usability research methods.
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.