IT Project Management: Agile Scrum
By Kimberly Reed
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Async and Await
By Joseph Wetzel
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
The Ethernet Frame
By Terry Bartelt
Learners view the seven segments of an Ethernet frame and the types of information each represents.
Hexadecimal Numbering System
By Patrick Hoppe
In this learning activity you'll review the hexadecimal numbering system.
Excel: Locking Cell References
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
An Algorithm for Converting a Binary Number to a Decimal Number
By Kevin Ritzman
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Subtracting Binary Numbers by Adding the 2's Complement
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
By Brett Sheleski
Window and Desktop Elements
By Dawn Matott
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
User Experience Design: Prototyping
In this learning activity, you'll explore the basics of prototyping for user experience design.
User Experience Design: Usability Testing
In this learning activity, you will learn about usability testing.
Strings in the .NET Framework
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.