Twisted Pair Cable Noise Immunity
By Terry Bartelt
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Clients and Servers
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
FTP - What You Need to Know
By Joseph Wetzel
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
What is an Algorithm?
In this learning activity, we’ll learn what an algorithm is.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
By Brett Sheleski
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Bandwidth Capacity Techniques
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
User Experience Design: Fitts Law
By Kimberly Reed
In this activity, you'll learn how Fitt's Law applies to user experience design.
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.