Normalization – 3rd Normal Form
By jamiecchavez
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Object or Class?
By Jay Stulo
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Parameters and Arguments
By carlfranklin
In this learning activity, you’ll discover the difference between a parameter and an argument.
Peer-to-Peer Operating Systems
By Terry Bartelt
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Pointers In C++
By Ryan Appel
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Port Scanning
By Joseph Wetzel
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Routers: Acronyms
By Joseph Wetzel, Jeff Sonnleitner
In this interactive activity, learners insert the router terms that each acronym stands for. Each of the acronyms is formed from the key letters in a term that relates to routers.
Routers: Logical Addresses
In this learning activity you'll examine how logical addresses work. The IP address is the logical address assigned to a connection by the ISP or network administrator.
SEO - A Brief Overview
By Kimberly Reed
This learning activity provides an overview of Search Engine Optimization, or SEO.
SEO - Promoting your Website
This learning object explains new, free, and traditional ways to market your website.
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
SEO: Analytics
In this activity, you will explore what web analytics are and how to use them for site optimization.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
STP - The Spanning Tree Protocol
By Dawn Rohm
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.