In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this animated activity, learners examine the circuitry in a DC variable speed drive that keeps the motor running at a constant speed as the load varies.
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
In this well-illustrated object, learners examine the structures and properties of the four types of solids: molecular, metallic, ionic, and covalent network. Five interactive questions are provided.
This interactive activity represents the grid modeling technique, a heuristic model for choosing a centralized location for a manufacturing or distribution center within a supply chain network. The formula calculates a central point between the suppliers and the markets. This object requires the latest version of Flash Player.