In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Learners read definitions of terms related to legal, insurance, and advocacy issues regarding the elderly. At the end of the activity, learners test their knowledge in three matching exercises. Some of the programs and groups discussed are Medicare, Medicaid, Social Security, long-term care insurance, OBRA, SSI, and CWAG.
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Concepts of Programming 9: Pseudocode Repetition Structures using While Statements
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this animated activity, learners listen to instructions for simplifying a complex fraction by finding the least common denominator. This learning object requires a computer that is equipped with speakers.
In this interactive game, learners review emergency medications. For every right answer, the learner earns a square on the tic-tac-toe board while playing against the computer or another contestant.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.