In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this animated activity, learners examine the circuitry in a DC variable speed drive that keeps the motor running at a constant speed as the load varies.
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
Learners read definitions of terms related to legal, insurance, and advocacy issues regarding the elderly. At the end of the activity, learners test their knowledge in three matching exercises. Some of the programs and groups discussed are Medicare, Medicaid, Social Security, long-term care insurance, OBRA, SSI, and CWAG.
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
In this learning activity you'll analyze a scenario using operant conditioning. (For security reasons, the ability to email results to your instructor at the end of the lesson has been disabled)