All Learning Objects

Digital Technology

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
AND Gates (Screencast)
In this learning activity you'll describe the operation of an AND gate by using a truth table, a waveform diagram, a Boolean Algebra equation, a switch analogy, and a written definition.
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
An Algorithm for Binary Subtraction
Students use the Base Minus One Complement method to perform binary subtraction. This learning activity has audio content and immediate feedback.
An Algorithm for Converting a Binary Number to a Decimal Number
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Subcategories
An Algorithm for Converting a Decimal Number to a Binary Number
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Subcategories
An Introduction to the Solderless Breadboard (Screencast)
In this learning activity you'll be introduced to the layout and operation of the solderless breadboard.
An Overview of IT Project Management
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Angular JS
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Attributes of a Class: Fields and Properties
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Axis Modes
The learner will gain an understanding of the modes of axis movement for successful robot programming.
BCD-to-Seven  Segment Decoder
Learners will understand how binary-coded decimal information is decoded and used to drive a seven-segment display.
Subcategories
Bandwidth
In this learning activity you'll explore bandwidth.
Bandwidth Capacity Techniques
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Basic Logic Gates
The learner will understand the operation of the six fundamental logic gates and the inverter by using truth tables, Boolean Algebra equations, switch analogies, and written statements.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
CSI Coding Scene Investigation
Learners test their knowledge in this drag-and-drop exercise by identifying coding errors in health care claim cases.
CSI Coding Scene Investigation
Learners test their knowledge in this drag-and-drop exercise by identifying coding errors in health care claim cases.
Calling Programs from Inputs
Robotic welding is an increasingly popular tool used in industrial welding applications. Knowing how to program the robot is key. Explore how to improve your programming skills by using if-then-else, calls and unconditional jumps in this learning activity.
Calls and Unconditional Jumps
Robotic welding is an increasingly popular tool used in industrial welding applications. Knowing how to program the robot is key. Explore how to improve your programming skills by using calls and unconditional jumps in this learning activity.
Capacitors Series - Parallel: Practice Problems
Students complete 10 practice problems.
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Components of a Computer Workstation: Skills Check 1
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Concepts of Programming 4: Structure of Variable Declarations
Understand the pseudocode structure of variable declarations
Concepts of Programming 5: Pseudocode Structure of Inputs and Outputs
Understand pseudocode structure of Inputs and Outputs, a vital component of programming computer and industrial applications.
Concepts of Programming 6: Pseudocode Structure of Assigning Data to Variables
Understand the pseudocode structure of variable declarations, a vital component of programming computer and industrial applications.
Concepts of Programming 7: Pseudocode If Statements Structure
Identify the correct description of pseudocode if statements.
Concepts of Programming 8: Pseudocode Repetition Structures using For Statement
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
Concepts of Programming 9: Pseudocode Repetition Structures using  While Statements
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
Converting Between Gray and Binary Codes
Learners follow steps to convert numbers from Gray code to binary code. They then view steps to change binary values to Gray code numbers.
Counting Programs
Robotic welding is an increasingly popular tool used in industrial welding applications. Knowing how to program the robot is key. Explore how to improve your programming skills by using if-then-else, calls, unconditional jumps, and counters in this learning activity.
Creating Histograms
Students follow steps to transfer data from a list to a histogram.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Data Conversion
Learners observe animations showing how data is converted between serial and parallel flow.
Data Flow on the Internet
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Debugging: Breakpoints
In this learning activity we will discuss breakpoints: what they are and how to use them.
Subcategories
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Subcategories
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Subcategories
Demultiplexers (Screencast)
In this animated object, learners examine the operation of a demultiplexer along with the data output and select lines. A brief quiz completes the activity.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Design Principles Introduction
Explore the history behind today's eLearning best practices in this introduction to our design principles series.
Disk Encryption Simulation
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
Equivalent Gates/Ladder Logic Circuits
Learners will identify ladder logic diagrams and the logic functions they perform.
Finding Factorials with Recursion
In this activity we will discover when recursion is the best solution for your computer programming task.
Subcategories
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.

Wisc-Online FAQs

Explore this section for helpful answers to common questions regarding Wisc-Online.