In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
In this learning activity, you’ll discover the difference between a parameter and an argument.
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
In this learning activity you'll explore an overview of User Experience Design and recognize how User Experience Design (UXD) can make you a better designer.
In this activity, you'll learn how Fitt's Law applies to user experience design.
In this learning activity you'll explain how how Usability fits into User Experience Design.
In this learning activity, you'll be introduced to what personas are, explore how to create one, and understand why they're important.
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
Learners view animations showing how hubs and switches work in local area network configurations.
Learners view the seven segments of an Ethernet frame and the types of information each represents.
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
In this learning activity you'll examine how network address translation works.
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity you'll create a packet filter.
In this learning activity you'll examine how a large computer network is configured.
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.