In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Learners consider the most common types of electromagnetic waves and the kinds of hardware used in a wireless network. A short quiz completes the activity.
In this animated activity, learners examine how an electronic converter changes digital signals to analog signals. Sections of a synthesizer are identified, and the operation of a D/A converter is demonstrated.
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.