In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.