In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Learners read definitions of terms related to legal, insurance, and advocacy issues regarding the elderly. At the end of the activity, learners test their knowledge in three matching exercises. Some of the programs and groups discussed are Medicare, Medicaid, Social Security, long-term care insurance, OBRA, SSI, and CWAG.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Concepts of Programming 8: Pseudocode Repetition Structures using For Statement
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
In this interactive learning object, the student matches the names of software with their definitions and categorizes computer terms according to the appropriate software.