In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
In this learning activity you'll describe the typical components of a data center.
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
In this learning activity we will learn what access modifiers are and how they are used in C#.
In this learning object you'll learn what recursion is and how to use it.
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
In this learning activity we will discuss breakpoints: what they are and how to use them.
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
In this activity, you'll learn about the different data types associated with databases.
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
In this learning activity you'll review the differences between identification, authentication, and authorization.
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
You will learn four steps for good goal setting.
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.