Fiber-Optic Cables
By Terry Bartelt
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Strings in the .NET Framework
By Brett Sheleski
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Excel: Locking Cell References
By Patrick Hoppe
Students read how to lock a cell that is being referenced in a formula so that it does not automatically show an increment when the formula is copied.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
IT Stress Management - Root Cause
By mikhailvmatc
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Data Manipulation Language
By jamiecchavez
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Parameters and Arguments
By carlfranklin
In this learning activity, you’ll discover the difference between a parameter and an argument.
Cross-site Scripting Awareness
By Joseph Wetzel
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Visual Logic Basic Programming: Using Flow Charts
By Jason Vosters
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
User Experience Design: Fitts Law
By Kimberly Reed
In this activity, you'll learn how Fitt's Law applies to user experience design.
CreateJS Cardioid
An interactive html page that allows the user to manipulate a Cardioid-like shape generated by lines.
User Experience Design: What is Usability?
In this learning activity you'll explain how how Usability fits into User Experience Design.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Firewall: Stateful Packet Inspection
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Programming in C++ Using Constants
By Ryan Appel
In this learning activity you'll discover the const keyword and it’s uses in C++.
Four Steps for Setting and Achieving Your Goals
By Mitch Vesaas
You will learn four steps for good goal setting.
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Analog and Digital Converters
In this learning activity you'll examine how electronic converters convert between analog voltages and proportional digital signals.