In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
In this animated activity, learners examine the circuitry in a DC variable speed drive that keeps the motor running at a constant speed as the load varies.
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
In this well-illustrated object, learners examine the structures and properties of the four types of solids: molecular, metallic, ionic, and covalent network. Five interactive questions are provided.