IT Project Management: Methodologies
By Kimberly Reed
You'll explore two unique project management methodologies for developing software.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Visual Logic Basic Programming: Using Flow Charts
By Jason Vosters
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
Hexadecimal Numbering System
In this learning activity you'll review the hexadecimal numbering system.
An Algorithm for Converting a Binary Number to a Decimal Number
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Firewall: Network Address Translation/Port Address Translation
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how network address translation works.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Denial of Service Attacks
By Joseph Wetzel
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.