In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this animated object, learners observe the voltage on a capacitor at various time constants when it either charges or discharges. Students then answer questions in the categories of Identify, Compare, and Compute.