How the Ethernet Works
By Terry Bartelt
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
Denial of Service Attacks
By Joseph Wetzel
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
User Experience Design: Fitts Law
By Kimberly Reed
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
Customer Service Skills for IT Professionals - Soft Skills
In this learning activity you'll be introduced to soft skills, or people skills, needed by all IT professionals.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Database Data Types
In this activity, you'll learn about the different data types associated with databases.