All Learning Objects

Digital Technology

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
AND Gates (Screencast)
In this learning activity you'll describe the operation of an AND gate by using a truth table, a waveform diagram, a Boolean Algebra equation, a switch analogy, and a written definition.
Main Category
Digital Technology
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Main Category
Digital Technology
Achieve Persistence on the Web
An Overview of IT Project Management
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
Main Category
Digital Technology
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Main Category
Digital Technology
Angular JS
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Main Category
Digital Technology
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Main Category
Digital Technology
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Main Category
Digital Technology
Attributes of a Class: Fields and Properties
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Main Category
Digital Technology
Authentication versus Authorization
In this learning activity you'll review the differences between identification, authentication, and authorization.
Main Category
Digital Technology
Bandwidth
In this learning activity you'll explore bandwidth.
Main Category
Digital Technology
Bandwidth Capacity Techniques
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Main Category
Digital Technology
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Main Category
Digital Technology
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
Main Category
Digital Technology
Clock Pulse Triggering of Flip-Flops (Screencast)
This screencast shows the symbols used to represent the type of pulse required at the clock input to activate flip-flops.
Main Category
Digital Technology
Subcategories
Components of a Computer Workstation: Skills Check 1
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
Main Category
Digital Technology
Concepts of Programming 4: Structure of Variable Declarations
Understand the pseudocode structure of variable declarations
Main Category
Digital Technology
Concepts of Programming 5: Pseudocode Structure of Inputs and Outputs
Understand pseudocode structure of Inputs and Outputs, a vital component of programming computer and industrial applications.
Main Category
Digital Technology
Concepts of Programming 6: Pseudocode Structure of Assigning Data to Variables
Understand the pseudocode structure of variable declarations, a vital component of programming computer and industrial applications.
Main Category
Digital Technology
Concepts of Programming 7: Pseudocode If Statements Structure
Identify the correct description of pseudocode if statements.
Main Category
Digital Technology
Concepts of Programming 8: Pseudocode Repetition Structures using For Statement
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
Main Category
Digital Technology
Concepts of Programming 9: Pseudocode Repetition Structures using  While Statements
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
Main Category
Digital Technology
Converting Between Gray and Binary Codes
Learners follow steps to convert numbers from Gray code to binary code. They then view steps to change binary values to Gray code numbers.
Main Category
Digital Technology
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Main Category
Digital Technology
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Main Category
Digital Technology
Current and Voltage Parameters of Digital Circuitry (Screencast)
In this interactive learning object, students read about the voltage and current parameters commonly found on a data sheet. A brief quiz completes the activity.
Main Category
Digital Technology
Subcategories
Customer Service Skills for IT Professionals - Communication
In this learning activity you'll be introduced to the communication model and how it impacts your work as an IT professional.
Main Category
Digital Technology
Customer Service Skills for IT Professionals - Controlling the Conversation
In this learning activity you'll practice your customer service skills in a number of IT real world job scenarios.
Main Category
Digital Technology
Customer Service Skills for IT Professionals - Engaging the Customer
In this learning activity you'll explore four ways to engage your customers and improve your customer service skills.
Main Category
Digital Technology
Customer Service Skills for IT Professionals - Soft Skills
In this learning activity you'll be introduced to soft skills, or people skills, needed by all IT professionals.
Main Category
Digital Technology
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Main Category
Digital Technology
Data Conversion
Learners observe animations showing how data is converted between serial and parallel flow.
Main Category
Digital Technology
Data Flow on the Internet
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Main Category
Digital Technology
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Main Category
Digital Technology
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Main Category
Digital Technology
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Main Category
Digital Technology
Debugging: Breakpoints
In this learning activity we will discuss breakpoints: what they are and how to use them.
Main Category
Digital Technology
Subcategories
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Main Category
Digital Technology
Subcategories
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Main Category
Digital Technology
Subcategories
Demultiplexers (Screencast)
In this animated object, learners examine the operation of a demultiplexer along with the data output and select lines. A brief quiz completes the activity.
Main Category
Digital Technology
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Main Category
Digital Technology
Disk Encryption Simulation
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
Exclusive-NOR Gate (Screencast)
In this learning activity you'll review the operation of an Exclusive-NOR gate by using a truth table, a Boolean Algebra equation, a switch analogy, and a written statement.
Main Category
Digital Technology
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Main Category
Digital Technology
Fibre Channel Storage Area Networks
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activitywill explain the benefits, components, and some basic configurations of fibre channel networks.
Main Category
Digital Technology
Finding Factorials with Recursion
In this activity we will discover when recursion is the best solution for your computer programming task.
Main Category
Digital Technology
Subcategories
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Category
Digital Technology
Go-Back-N ARQ
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Main Category
Digital Technology
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
Main Category
Digital Technology
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Main Category
Digital Technology
IP Routing
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Main Category
Digital Technology
IT Project Management: Agile Scrum
In this learning activity, you’ll be introduced to how the Agile software development methodology uses the scrum framework.
Main Category
Digital Technology
IT Project Management: Combined Methodologies
Explore how to combine Waterfall and Agile methodologies for your next software development project.
Main Category
Digital Technology
IT Project Management: Methodologies
You'll explore two unique project management methodologies for developing software.
Main Category
Digital Technology
IT Project Management: Waterfall Methodology
In this learning activity, you’ll explore the Waterfall model and its application to software development.
Main Category
Digital Technology
IT Stress Management - Diet and Exercise
In this learning activity you'll examine how diet and exercise affect stress.
Main Category
Digital Technology
IT Stress Management - Root Cause
In this learning activity you'll explore how finding and understanding the root cause of stressors can help reduce stress in your life.
Main Category
Digital Technology
IT Stress Management - Setting Goals
In this learning activity you'll explore how to set goals based on realistic expectations.
Main Category
Digital Technology
IT Stress Management - Time Management
In this learning activity you'll explore what time management is, some general techniques for improving your time management skills, and the Pomodoro Method.
Main Category
Digital Technology
IT Stress Management - Volunteerism
In this learning activity you'll discover how volunteering, developing outside interests, and setting aside time for hobbies all help reduce stress.
Main Category
Digital Technology
IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.
Main Category
Digital Technology
Instantiation: Constructing an Object
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Main Category
Digital Technology
Intro to Outlook
Explore the Microsoft Office Suite, which is so much more than just email.
Main Category
Digital Technology
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Main Category
Digital Technology
JOINs (Inner, Left, Right, Full)
In this learning activity, you’ll explore four different types of JOINs and understand how they help programmers produce readable reports.
Main Category
Digital Technology
Logic Symbols (Screencast)
The schematic symbols of logic gates used in digital circuits are shown.
Main Category
Digital Technology
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Main Category
Digital Technology
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Main Category
Digital Technology
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Main Category
Digital Technology
Network Internet Protocol (IPv6)
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Main Category
Digital Technology
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Main Category
Digital Technology
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
Main Category
Digital Technology
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Main Category
Digital Technology
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Main Category
Digital Technology
Object or Class?
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Main Category
Digital Technology
Overflow and Underflow for Signed Binary Numbers
Learners examine the occurrence of overflow and underflow conditions in a programmable logic controller. It is recommended that users view the learning object “Signed Binary Numbers” in advance of this object.
Main Category
Digital Technology
Parameters and Arguments
In this learning activity, you’ll discover the difference between a parameter and an argument.
Main Category
Digital Technology
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Main Category
Digital Technology
Pointers In C++
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Main Category
Digital Technology
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Main Category
Digital Technology
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Main Category
Digital Technology
Port States
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Main Category
Digital Technology
Programming in C++ Using Constants
In this learning activity you'll discover the const keyword and it’s uses in C++.
Main Category
Digital Technology
Protecting Data in the Real World
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Recursion - See Recursion
In this learning object you'll learn what recursion is and how to use it.
Main Category
Digital Technology
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Main Category
Digital Technology
Request Response: How the Web Works
In this learning activity we’ll learn how the web works by using a Request and Response algorithm.
Main Category
Digital Technology
Restful Services
In this learning activity, we’ll explore what RESTful services are, how they interact with clients and servers, and finally, understand how it works within an HTTP framework.
Main Category
Digital Technology
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Main Category
Digital Technology
SEO - A Brief Overview
This learning activity provides an overview of Search Engine Optimization, or SEO.
Main Category
Digital Technology
SEO - Promoting your Website
This learning object explains new, free, and traditional ways to market your website.
Main Category
Digital Technology
SEO - Site Optimization
This learning activity explains how site structure and organization can have a positive effect on optimization and driving traffic to your website.
Main Category
Digital Technology
SEO - Site Organization and Structure
In this activity, we will explain the mechanics of site structure and the role it plays in search engine optimization.
Main Category
Digital Technology
SEO: Analytics
In this activity, you will explore what web analytics are and how to use them for site optimization.
Main Category
Digital Technology
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Main Category
Digital Technology
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Main Category
Digital Technology
Secure Data Erasure
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Main Category
Digital Technology
Back to Top