Authentication versus Authorization
By Joseph Wetzel
In this learning activity you'll review the differences between identification, authentication, and authorization.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
IT Project Management: Methodologies
By Kimberly Reed
You'll explore two unique project management methodologies for developing software.
Subtracting Binary Numbers by Adding the 2's Complement
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
Hexadecimal Numbering System
In this learning activity you'll review the hexadecimal numbering system.
Angular JS
By Rose Guthrie, Donna Gehl
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
User Experience Design: Testing
In this learning activity, you will learn about testing for user experience design.
Firewall: Network Address Translation/Port Address Translation
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how network address translation works.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
IP Routing
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
What is an Algorithm?
By carlfranklin
In this learning activity, we’ll learn what an algorithm is.
SEO - Promoting your Website
This learning object explains new, free, and traditional ways to market your website.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
JOINs (Inner, Left, Right, Full)
By jamiecchavez
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
SEO: Analytics
In this activity, you will explore what web analytics are and how to use them for site optimization.