By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
Setting Up Your Virtual Private Network (VPN)
By Joseph Wetzel
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
By Terry Bartelt
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
Understanding HTML Pathing
By Jay Stulo
In this animated activity, learners study the difference between relative and absolute paths and how each can be used to create links to html resources. A short quiz completes the activity.This learning object has audio content.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
Basics of the SELECT Statement
By Glen Orsburn
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.
Switches and Hubs
Learners view animations showing how hubs and switches work in local area network configurations.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
Window and Desktop Elements
By Dawn Matott
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
User Experience Design: Fitts Law
By Kimberly Reed
In this activity, you'll learn how Fitt's Law applies to user experience design.
User Experience Design: Usability Testing
In this learning activity, you will learn about usability testing.
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Instantiation: Constructing an Object
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Value Types and Reference Types in the .Net Framework
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
How to Evaluate a Problem Statement using MEA and IPO Techniques
By Matthew Green
In this learning activity you'll discover how to evaluate a problem statement using both the MEA and the IP Techniques.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.