IT Support & Services

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
An Algorithm for Binary Subtraction
Students use the Base Minus One Complement method to perform binary subtraction. This learning activity has audio content and immediate feedback.
An Overview of IT Project Management
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
Main Category
Digital Technology
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Main Category
Digital Technology
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Main Category
Digital Technology
Capacitors Series - Parallel: Practice Problems
Students complete 10 practice problems.
Main Category
Construction
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Main Category
Construction
Components of a Computer Workstation: Skills Check 1
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
DDoS - Distributed Denial of Service Attacks
Explore what DDoS attacks are, the methods used to carry them out, and how to prevent them.
Main Category
Digital Technology
Data Conversion
Learners observe animations showing how data is converted between serial and parallel flow.
Main Category
Digital Technology
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Main Category
Digital Technology
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Main Category
Digital Technology
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Main Category
Construction
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Category
Digital Technology
Go-Back-N ARQ
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
Main Category
Digital Technology
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
Main Category
Digital Technology
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Main Category
Digital Technology
IP Routing
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Main Category
Digital Technology
IT-Cybersecurity: Red Team, Blue Team, and Cybersecurity Policies
Think like a hacker. Respond like a pro. In this module, you’ll experience a simulated breach and learn how red and blue teams handle the heat.
Main Category
Digital Technology
Instantiation: Constructing an Object
In this learning activity you'll discover how constructors in the C# programming language are used to instantiate objects.
Main Category
Digital Technology
International Time Zones (Screencast)
In this screencast, you will learn about the 24 time zones.
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Main Category
Digital Technology
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Main Category
Digital Technology
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Main Category
Digital Technology
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Main Category
Digital Technology
Network Internet Protocol (IPv6)
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Main Category
Digital Technology
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
Main Category
Digital Technology
Normalization – 1st Normal Form
In this learning activity you'll explore and practice the first step in normalizing a database.
Main Category
Digital Technology
Normalization – 2nd Normal Form
In this activity you'll practice designing a table in second normal form.
Main Category
Digital Technology
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Main Category
Digital Technology
Object or Class?
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Main Category
Digital Technology
Overflow and Underflow for Signed Binary Numbers
Learners examine the occurrence of overflow and underflow conditions in a programmable logic controller. It is recommended that users view the learning object “Signed Binary Numbers” in advance of this object.
Main Category
Digital Technology
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Main Category
Digital Technology
Pointers In C++
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Main Category
Digital Technology
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Main Category
Digital Technology
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Main Category
Digital Technology
Port States
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Main Category
Digital Technology
Protecting Data in the Real World
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Records Management: An  Introduction to Filing Rules and Indexing (Screencast)
In this screencast, learners read an explanation of the file rules and indexing that have been developed by the Association of Records Managers and Administrators.
Records Management: Applying ARMA Rules to Business Filing
In this interactive object, learners apply their knowledge of the Association of Records Managers and Administrators (ARMA) filing rules by organizing and filing records alphabetically, numerically, and by subject.
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Main Category
Digital Technology
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Main Category
Digital Technology
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Main Category
Digital Technology
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Main Category
Digital Technology
Secure Data Erasure
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Main Category
Digital Technology
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Main Category
Digital Technology
Signed Binary Numbers: 2's Complement
Learners use this interactive and animated object to examine the use of binary numbers in a programmable logic controller. A brief quiz completes the activity.
Main Category
Digital Technology
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Main Category
Digital Technology
Strings in the .NET Framework
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Main Category
Digital Technology
Subtracting Binary Numbers by Adding the 2's Complement
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
The Broadband Telco Services Subscriber Loop
Walk through the subscriber loop and learn how the signal travels from the central office to the subscriber.
Main Category
Construction
The CLR: Overview of the Common Language Runtime
In this learning activity, you’ll explore the Common Language Runtime, or CLR.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Main Category
Digital Technology
The Logic Gates (Screencast)
Students read information about basic logic gates including the gates' names, symbols, Boolean expressions, pronunciations, and truth tables. They then complete a matching exercise.
Main Category
Digital Technology
The Processor Scan Cycle (Screencast)
Learners examine the three steps of a processor scan cycle.
Main Category
Construction
Timing Diagrams (Screencast)
The explanation and use of timing diagrams used in digital electronics to graphically show the operation of various circuits are given.
Main Category
Digital Technology
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Main Category
Digital Technology
Understanding Cloud Service Types
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Main Category
Digital Technology
Understanding Common DDL Statements
In this learning activity, you’ll explore the Data Definition Language (DDL) including its three main commands: CREATE, ALTER, and DROP.
Understanding and Writing Pseudocode: Advanced Topics
In this module, you'll build upon the concepts Understanding and Writing Pseudocode: The Basics, by learning new techniques and terms to make your pseudocode more complete.
Main Category
Digital Technology
Understanding and Writing Pseudocode: The Basics
In this activity you'll explore how flowchart programs can be converted into pseudocode programming.
Main Category
Digital Technology
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Main Category
Digital Technology
Value Types and Reference Types in the .Net Framework
In this learning activity you'll discover the functional differences between value and reference types within the .Net framework.
Main Category
Digital Technology
Variables in Computer Programming (C#)
In this learning activity you'll define what a variable is, how they're used in the C# programming language, and how the computer works with variables under the hood.
Main Category
Digital Technology
Variables in Computer Programming (JavaScript)
In this learning activity you'll review what a variable is, how to use variables in JavaScript, and how the computer works with variables.
Main Category
Digital Technology
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Main Category
Digital Technology
Visual Logic Basic Programming: Using Flow Charts
In this learning activity you'll understand what flow charts are and how they're used to create computer programs.
Main Category
Digital Technology
Visual Studio: Connecting to Team Foundation Service
In this learning activity, you’ll practice connecting to the Team Foundation Service (TFS) and your local code repository to get existing code.
Main Category
Digital Technology
What Is Normalization?
In this learning activity you'll examine how database normalization eliminates redundancy and helps maintain consistency within a relational database.
Main Category
Digital Technology
What is Database Denormalization?
In this activity, the learner will understand what denormalization is and when it's an appropriate strategy.
Main Category
Digital Technology
What is the .Net Framework?
In this learning activity you'll discover what the .NET Framework is, what problems it solves, and how it came to be.
Main Category
Digital Technology
Window 10 and Desktop Elements
In this interactive object, learners identify the elements of the Windows platform in a drag-and-drop exercise.
Main Category
Digital Technology
Working with Zip Files
In this learning activity you'll learn what Zip files are, their origins, and how to work with them in Windows.
Main Category
Digital Technology
Back to Top