In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
In this learning activity, you’ll explore the Waterfall model and its application to software development.
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
In this learning activity you'll explain how how Usability fits into User Experience Design.
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
In this learning activity you'll review the hexadecimal numbering system.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
In this learning activity you'll explore public key encryption and conclude with a short quiz.
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.