Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
In this learning activity you'll review the hexadecimal numbering system.
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
In this learning activity, you will learn about testing for user experience design.
In this learning activity, you’ll explore the Waterfall model and its application to software development.
In this learning activity, you'll discover and then follow established rules when naming database objects.
In this learning activity you'll examine how network address translation works.
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Explore how to combine Waterfall and Agile methodologies for your next software development project.
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
In this learning activity, you'll practice creating a new repository in Visual Studio Online, a cloud-based version control system.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.