Software Solutions

Learning Objects

Dive into Wisc-Online’s rich collection of learning objects — bite-sized, interactive, and designed for real learning. These modular digital tools include animations, drag-and-drop exercises, quizzes, videos, and more. You can explore topics across STEM, arts, humanities, career skills, and beyond. Each learning object is crafted to help learners actively engage with content—reviewing, applying, self-checking—in a way that’s flexible and self-paced.

Filter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Learning Object
Access Modifiers in C#
In this learning activity we will learn what access modifiers are and how they are used in C#.
Main Categories
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
Main Categories
An Algorithm for Binary Subtraction
Students use the Base Minus One Complement method to perform binary subtraction. This learning activity has audio content and immediate feedback.
Main Categories
An Algorithm for Converting a Binary Number to a Decimal Number
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Main Categories
Subcategories
An Algorithm for Converting a Decimal Number to a Binary Number
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Main Categories
Subcategories
An Introduction to the Solderless Breadboard (Screencast)
In this learning activity you'll be introduced to the layout and operation of the solderless breadboard.
An Overview of IT Project Management
In this learning activity, you’ll be introduced to the many responsibilities of being an IT project manager.
An Overview of the Raspberry Pi
In this learning activity you'll discover what the Raspberry Pi is, how it's used, and some projects you can do at home.
Main Categories
Angular JS
Explore the AngularJS framework, learn how it’s used to architect, and organize code when building web applications.
Main Categories
Asymmetric Encryption: How It Works
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Main Categories
Async and Await
In this learning activity, we’ll explore how async and await is used in mobile programming to allow multiple tasks to happen at once.
Main Categories
Attributes of a Class: Fields and Properties
In this learning activity you'll discover how C#, attributes provide a way of associating data with an object in two forms - Fields and Properties.
Main Categories
Axis Modes
The learner will gain an understanding of the modes of axis movement for successful robot programming.
BCD-to-Seven  Segment Decoder
Learners will understand how binary-coded decimal information is decoded and used to drive a seven-segment display.
Main Categories
Subcategories
Basic Logic Gates
The learner will understand the operation of the six fundamental logic gates and the inverter by using truth tables, Boolean Algebra equations, switch analogies, and written statements.
Main Categories
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Main Categories
CRUD Applications - Create Retrieve Update Delete
In this learning activity you'll discover what C.R.U.D. applications are and how they're used in everyday life.
Main Categories
CSI Coding Scene Investigation
Learners test their knowledge in this drag-and-drop exercise by identifying coding errors in health care claim cases.
CSI Coding Scene Investigation
Learners test their knowledge in this drag-and-drop exercise by identifying coding errors in health care claim cases.
Calling Programs from Inputs
Robotic welding is an increasingly popular tool used in industrial welding applications. Knowing how to program the robot is key. Explore how to improve your programming skills by using if-then-else, calls and unconditional jumps in this learning activity.
Calls and Unconditional Jumps
Robotic welding is an increasingly popular tool used in industrial welding applications. Knowing how to program the robot is key. Explore how to improve your programming skills by using calls and unconditional jumps in this learning activity.
Components of a Computer Workstation: Skills Check 1
In this interactive exercise, learners label the components of a workstation, a Windows desktop, and an application window.
Concepts of Programming 4: Structure of Variable Declarations
Understand the pseudocode structure of variable declarations
Main Categories
Concepts of Programming 5: Pseudocode Structure of Inputs and Outputs
Understand pseudocode structure of Inputs and Outputs, a vital component of programming computer and industrial applications.
Main Categories
Concepts of Programming 6: Pseudocode Structure of Assigning Data to Variables
Understand the pseudocode structure of variable declarations, a vital component of programming computer and industrial applications.
Main Categories
Concepts of Programming 7: Pseudocode If Statements Structure
Identify the correct description of pseudocode if statements.
Main Categories
Concepts of Programming 8: Pseudocode Repetition Structures using For Statement
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
Main Categories
Concepts of Programming 9: Pseudocode Repetition Structures using  While Statements
Explore repetition structures, which are commonly referred to as “Looping” statements, are a vital component of programming computer and industrial applications.
Main Categories
Converting Between Gray and Binary Codes
Learners follow steps to convert numbers from Gray code to binary code. They then view steps to change binary values to Gray code numbers.
Counting Programs
Robotic welding is an increasingly popular tool used in industrial welding applications. Knowing how to program the robot is key. Explore how to improve your programming skills by using if-then-else, calls, unconditional jumps, and counters in this learning activity.
Creating Histograms
Students follow steps to transfer data from a list to a histogram.
Main Categories
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Main Categories
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Main Categories
Data Manipulation Language
Explore what DML is including its main commands INSERT, UPDATE, DELETE, and SELECT.
Main Categories
Database Data Types
In this activity, you'll learn about the different data types associated with databases.
Main Categories
Database Naming Conventions
In this learning activity, you'll discover and then follow established rules when naming database objects.
Main Categories
Debugging: Breakpoints
In this learning activity we will discuss breakpoints: what they are and how to use them.
Main Categories
Subcategories
Debugging: Immediate Window
In this learning activity, you'll explore the Immediate Window including what is it and how you use it?
Main Categories
Subcategories
Debugging: What is It?
Learn more about debugging including: what it is, why we use it, and what it looks like in action.
Main Categories
Subcategories
Demultiplexers (Screencast)
In this animated object, learners examine the operation of a demultiplexer along with the data output and select lines. A brief quiz completes the activity.
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Main Categories
Design Principles Introduction
Explore the history behind today's eLearning best practices in this introduction to our design principles series.
Disk Encryption Simulation
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
Main Categories
Equivalent Gates/Ladder Logic Circuits
Learners will identify ladder logic diagrams and the logic functions they perform.
Finding Factorials with Recursion
In this activity we will discover when recursion is the best solution for your computer programming task.
Main Categories
Subcategories
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Main Categories

Wisc-Online FAQs

Explore this section for helpful answers to common questions regarding Wisc-Online.