In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Students read about the use of business cards in various countries and the customs that Americans should follow when presenting a card in those parts of the world.
In this simulation activity, an electrician will troubleshoot an AC motor that quit running and cannot be restarted. Before accessing blueprints and then using a multimeter to find the fault, the learner will follow safety protocols by following lock-out tag-out procedures and then suit up with appropriate (PPE) personal protection equipment.
Using Blueprints to Troubleshoot a Defective Water Pump
In this simulation activity, an electrician troubleshoots a defective water pump that will not start. To find the problem, the learner selects the appropriate blueprints that must be referred to while performing the troubleshooting steps. Then safety protocols will be followed, such as making lockout-tag out installations and donning PPE items before taking measurements with a multimeter to locate the faulty component.
Using Blueprints to Troubleshoot a Defective Compressor Motor
In this simulation activity, an electrician troubleshoots a defective compressor motor that will not start. To find the problem, the learner selects the appropriate blueprints that must be referred to while performing the troubleshooting steps. Then safety protocols will be followed, such as making lockout-tag out installations and donning PPE items before taking measurements with a multimeter to locate the faulty component.
Troubleshooting a Three Phase Motor that is Overheating
In this simulation activity, an electrician will troubleshoot an AC motor that is overheating. Before accessing blueprints and then using a multimeter to find the fault, the learner will follow safety protocols by following lock-out tag-out procedures and then suit up with appropriate (PPE) personal protection equipment.