In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.
In this animated activity, learners examine how an electronic converter changes digital signals to analog signals. Sections of a synthesizer are identified, and the operation of a D/A converter is demonstrated.