In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Learners read about the most common forms of financial statements including balance sheets, cash flow statements, and profit and loss statements. A brief quiz completes the activity.
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
In this learning activity, we’ll learn what an algorithm is.
In this learning activity you'll enter your wage information and learn what a day, an hour, and a minute of their time costs an employer.
In this learning activity you'll explore what scientific notation is and how it's used to express very large and very small numbers.
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
In this learning activity, you will learn what supply chain management is, four main links that make up the supply chain, and explore examples of how effective supply chain management works.
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Explore what sexual harassment is, the three conditions that constitute harassing behavior, and the four levels of sexual harassment.
Methods for teaching reading
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Learners study an animation that shows how a battery charge reduces over time and when varying resistance values are placed in a series circuit. Ten review questions complete the activity.
In this learning activity you'll calculate the difference in the total cost of a new car when using cash and when paying for the car with a 60-month loan.
In this interactive object, learners identify the qualities of a person with integrity. They also list the qualities that they themselves possess.
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Are you a member of a fragmented, conflicted, or smooth- functioning team? Learn the characteristics of each to build a stronger team.
In this learning activity you'll explain how how Usability fits into User Experience Design.