Learning Objects

IT Support & Services

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Why Wisc-Online Moved to WisTech Open

In January 2026, Wisc-Online transitioned to WisTech Open to better align with current educational standards and long-term goals. During this process, the catalog was reviewed and content that did not meet accessibility requirements or was outdated was removed. Games were also taken down, and the team is evaluating the possibility of adding them back in the future with accessibility and quality standards in mind.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Normalization – 3rd Normal Form
In this learning activity, you'll be introduced to Third Normal Form and you'll design a table following these rules.
Main Category
Digital Technology
Object or Class?
In this learning activity, you'll watch an animated explanation of the terms class and object as used by computer programmers, and then contrast the differences.
Main Category
Digital Technology
Overflow and Underflow for Signed Binary Numbers
Learners examine the occurrence of overflow and underflow conditions in a programmable logic controller. It is recommended that users view the learning object “Signed Binary Numbers” in advance of this object.
Main Category
Digital Technology
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Main Category
Digital Technology
Pointers In C++
In this learning activity you'll be introduced to programming pointers compatible with both the C and C++ languages.
Main Category
Digital Technology
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Main Category
Digital Technology
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Main Category
Digital Technology
Port States
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Main Category
Digital Technology
Protecting Data in the Real World
You’re the IT pro on call. Use VPN, Remote Desktop, and BitLocker to secure company data to troubleshoot the kinds of challenges cybersecurity teams face every day.
Records Management: An  Introduction to Filing Rules and Indexing (Screencast)
In this screencast, learners read an explanation of the file rules and indexing that have been developed by the Association of Records Managers and Administrators.
Back to Top