Clients and Servers
By Terry Bartelt
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
Hexadecimal Numbering System
By Patrick Hoppe
In this learning activity you'll review the hexadecimal numbering system.
Excel: Locking Cell References
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
An Algorithm for Converting a Binary Number to a Decimal Number
By Kevin Ritzman
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
The CLR: Overview of the Common Language Runtime
In this learning activity, you’ll explore the Common Language Runtime, or CLR.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.
JOINs (Inner, Left, Right, Full)
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
User Experience Design: What is Usability?
By Kimberly Reed
In this learning activity you'll explain how how Usability fits into User Experience Design.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
User Experience Design: Usability Testing
In this learning activity, you will learn about usability testing.
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
Customer Service Skills for IT Professionals - Soft Skills
In this learning activity you'll be introduced to soft skills, or people skills, needed by all IT professionals.