Instructional Video8:56
Cerebellum

Advanced Spanish: Using the Subjunctive

9th - 12th
Learn about the subjunctive - how to form it, how to use it, and how to make it obey your every command. This clip also explores how to use the indicative. This is part 3 in the series: 'Advanced Spanish: Subjunctive and Formal Commands'.
Instructional Video14:54
Learn German with Herr Antrim

Command Form - German 1 WS Explanation - Deutsch lernen

9th - 12th
In this video I explain how to form the command form (imperative) in German. This video is designed to accompany the German with Puppets episode about the same topic.
Instructional Video6:06
Fun Robotics

Class Project Smart Classroom

Higher Ed
Creating an Intelligent Classroom
Instructional Video9:37
Curated Video

Bash Shell Scripting- Command Chaining using Logical AND (&&) and Logical OR (||) Operators

Higher Ed
This video explains command chaining using Logical AND (&&) and Logical OR (||) operators. This clip is from the chapter "Test command, commands chaining, and conditional statements" of the series "Complete Bash Shell Scripting".This...
Instructional Video7:05
Curated Video

Cloud Native Development on Azure with Java 2.1: Build a Spring Boot Java Application and Provide CRUD Functionality for a To-Do List

Higher Ed
This video will walk you through a few quick steps to create a simple To-Do application capable of tracking your upcoming tasks. You can add new tasks to the application, and when you are done with a particular task, you can mark it as...
Instructional Video11:09
Curated Video

Describe cyber attacks that could affect a computer system or network : Taking Control Over Target Browser with BeEf

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn about variety of dangerous...
Instructional Video9:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools

Higher Ed
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Instructional Video9:54
Curated Video

Complete Python Scripting for Automation - os.system() function from os module

Higher Ed
OS Module: os.system() function from os module This clip is from the chapter "OS Module" of the series "Complete Python Scripting for Automation".In this section, the author introduces OS Module and Basic operation like os.path module,...
Instructional Video7:13
Curated Video

Bash Shell Scripting- Here Document for Multi-lines or Multi-line block

Higher Ed
This video explains how to work with Multi-lines or Multi-line block. This clip is from the chapter "Basics of shell scripting" of the series "Complete Bash Shell Scripting".This section covers the basics of shell scripting.
Instructional Video12:19
Curated Video

Cypress - Modern Automation Testing from Scratch + Framework - Cypress Asynchronous Nature and its Promise Handling

Higher Ed
This video introduces you to Cypress asynchronous nature. This clip is from the chapter "Deep Diving into Cypress Commands and its Asynchronous Nature" of the series "Cypress - Modern Automation Testing from Scratch + Framework".This...
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Instructional Video13:09
Packt

Importance of Surefire Plug-in in Executing Tests

Higher Ed
This video discusses the importance of the Surefire plug-in in executing tests. This clip is from the chapter "Framework Part 3 - Maven Build Management Tool" of the series "Selenium WebDriver with Java - Basics to Advanced and...
Instructional Video4:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line

Higher Ed
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to use...
Instructional Video8:24
Packt

Installing Node.js and Visual Studio Code

Higher Ed
Installing and Exploring Node.js: Installing Node.js and Visual Studio Code This clip is from the chapter "Installing and Exploring Node.js" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will...
Instructional Video12:37
APMonitor

Generate high quality plots with MATLAB

10th - Higher Ed
Plots in presentations and technical documents can either detract or enhance the delivery. This tutorial demonstrates how to make high quality plots in MATLAB and how to export the figures in PNG (for MS PowerPoint) or EPS format (for...
Instructional Video13:04
Paul Marriott

Arduino HC-05: Bluetooth Module Configurator w/Uno R3 & Basic AT Commands - Tutorial

9th - 12th
A full tutorial for an HC-05 bluetooth module configurator. Used in conjunction with Arduino IDE Serial Monitor, this device can be used to configure and pair HC-05 bluetooth modules via. special AT commands.
Instructional Video5:43
Curated Video

C++ for Beginners - Creating a Project

Higher Ed
In this lesson, David tours the IDE and demonstrates how to create a simple program. This clip is from the chapter "Your First Program" of the series "C++ for Beginners".Where to get the IDE
Instructional Video13:50
Fun Robotics

Class Project Shooting Game

Higher Ed
Creating a shooting game in Scratch
Instructional Video9:47
APMonitor

Java ☕ Course Introduction

10th - Higher Ed
The course is designed to start from no programming experience and guide a self-paced learner through the basics of Python. The 12 modules are run from Eclipse or another Java Integrated Development Environment (IDE). The tutorials start...
Instructional Video17:48
Curated Video

Cypress - Modern Automation Testing from Scratch + Framework - Understanding the Difference Between jQuery Methods and Cypress Commands

Higher Ed
This video explains understanding the difference between jQuery methods and Cypress commands. This clip is from the chapter "Deep Diving into Cypress Commands and its Asynchronous Nature" of the series "Cypress - Modern Automation...
Instructional Video8:11
Curated Video

Bash Shell Scripting - Job Control - jobs, fg, and bg

Higher Ed
This video demonstrates job control. This clip is from the chapter "Process Handling and Running Scripts" of the series "Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]".This section focuses on process...
Instructional Video2:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Ask Me Anything (AMA)

Higher Ed
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA). This clip is from the chapter "Tools of the Trade" of...
Instructional Video16:10
Learn German with Herr Antrim

The German Imperative (Command Form)

9th - 12th
Hallo, Deutschlerner. Today you are going to learn how to form the German command form, also known as the imperative. This is what you use to boss people around, tell them what to do and otherwise command people to act in a certain way...
Instructional Video7:24
Professor Dave Explains

Commands in Italian: Imperativo

12th - Higher Ed
Commands.