Learning Objects

IT Support & Services

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Why Wisc-Online Moved to WisTech Open

In January 2026, Wisc-Online transitioned to WisTech Open to better align with current educational standards and long-term goals. During this process, the catalog was reviewed and content that did not meet accessibility requirements or was outdated was removed. Games were also taken down, and the team is evaluating the possibility of adding them back in the future with accessibility and quality standards in mind.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Records Management: Applying ARMA Rules to Business Filing
In this interactive object, learners apply their knowledge of the Association of Records Managers and Administrators (ARMA) filing rules by organizing and filing records alphabetically, numerically, and by subject.
Referential Integrity
Explore what referential integrity is, why it's important to reliable data organization, and learn how it enforces constraints.
Main Category
Digital Technology
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Main Category
Digital Technology
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Main Category
Digital Technology
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Main Category
Digital Technology
Secure Data Erasure
In this simulation, you’ll learn to differentiate between basic deletion and secure erasure to protect sensitive information.
Main Category
Digital Technology
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Main Category
Digital Technology
Signed Binary Numbers: 2's Complement
Learners use this interactive and animated object to examine the use of binary numbers in a programmable logic controller. A brief quiz completes the activity.
Main Category
Digital Technology
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Main Category
Digital Technology
Strings in the .NET Framework
In this activity, we will explain the string datatype in the .net framework and cover the peculiarities of a reference type that appears to behave like value type.
Main Category
Digital Technology
Back to Top