Learners examine the operation of a proportional control amplifier and the two ways that it is programmed using proportional gain or proportional band. A brief quiz completes the activity.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity you'll analyze an introduction and determine whether or not it was effective. You'll also gain an understanding of what makes an effective introduction.
In this learning activity you'll review a conclusion and decide how effectively it summarized a speech. You'll also gain some tips for writing your own speech conclusion.
The inverting amplifier configuration is presented. The closed loop voltage gain and the closed loop bandwidth formulas are explained, along with the concept of negative feedback.
Students read about the illegal practice of manipulating the boundaries of legislative districts for political gain. They then create their own gerrymandered districts in a drag and drop exercise.
Students are introduced to the non-inverting amplifier configuration. The formulas for closed loop gain and bandwidth are shown, and an example is given.
Learners use this Structured Query Language tutorial to gain an understanding of how a SELECT statement is built. This learning object has audio content.