Instructional Video14:19
SciShow

The 16 Most Asked Questions About Magnets

12th - Higher Ed
Magnets - how DO they work? We've got the answer for you, plus a bunch of weird fun magnet facts - where they got their names, why hitting some stuff with a hammer can turn it into magnets, and even why we feed magnets to cows, on purpose.
Instructional Video7:06
SciShow

5D, Holograms, & DNA: Amazing Hard Drives of the Future

12th - Higher Ed
Today's data storage solutions have an expiration date. What's on the horizon to replace them?
Instructional Video12:54
TED Talks

Dina Zielinski: How we can store digital data in DNA

12th - Higher Ed
From floppy disks to thumb drives, every method of storing data eventually becomes obsolete. What if we could find a way to store all the world's data forever? Bioinformatician Dina Zielinski shares the science behind a solution that's...
Instructional Video10:17
SciShow

5 More Computer Viruses You Really Don't Want to Get

12th - Higher Ed
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
Instructional Video3:48
SciShow

How Much Data Can Our Brains Store?

12th - Higher Ed
Our brains aren't exactly like a computer's hard drive, but it can still be fun to think about just how much storage space we have in our noggins.
Instructional Video5:12
TED-Ed

TED-Ed: How do hard drives work? - Kanawat Senanan

Pre-K - Higher Ed
The modern hard drive is an object that can likely hold more information than your local library. But how does it store so much information in such a small space? Kanawat Senanan details the generations of engineers, material scientists,...
Instructional Video16:41
TED Talks

Tony Fadell: The first secret of design is ... noticing

12th - Higher Ed
As human beings, we get used to "the way things are" really fast. But for designers, the way things are is an opportunity ... Could things be better? How? In this funny, breezy talk, the man behind the iPod and the Nest thermostat shares...
Instructional Video11:48
TED Talks

Ben Wellington: How we found the worst place to park in New York City -- using big data

12th - Higher Ed
City agencies have access to a wealth of data and statistics reflecting every part of urban life. But as data analyst Ben Wellington suggests in this entertaining talk, sometimes they just don't know what to do with it. He shows how a...
Instructional Video24:12
SciShow

SciShow Talk Show: Carl Zimmer & Genetics

12th - Higher Ed
Curious about genetics? Dig in a little deeper with this special SciShow Talk Show featuring science writer and 2016 Stephen Jay Gould prize winner Carl Zimmer talking about what he did after receiving himself on a hard drive.
Instructional Video11:41
Crash Course

Memory & Storage: Crash Course Computer Science

12th - Higher Ed
So we’ve talked about computer memory a couple times in this series, but what we haven’t talked about is storage. Data written to storage, like your hard drive, is a little different, because it will still be there even if the power goes...
Instructional Video3:39
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Other Types of Malwares

Higher Ed
In this video, we will look at other malware that can harm your computer system or your network.
Instructional Video15:40
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - Server Virtualization

Higher Ed
In this video, discover how server virtualization enables the creation of multiple virtual machines on a single physical server.
Instructional Video7:16
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Encryption/Travel

Higher Ed
In this informative module, you will learn—at a basic level—all about encryption, why it is so very important to enforce security and privacy, and then you will be presented with some common encryption solutions you can use both at home...
Instructional Video5:10
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Apple Part II

Higher Ed
You will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer.
Instructional Video18:11
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Types of Security Threats

Higher Ed
Educate on various security threats targeting Linux systems and how to protect against them, ensuring a secure IT environment.
Instructional Video1:54
Curated Video

Signal Storage and Transmission

9th - Higher Ed
A video titled "Signal Storage and Transmission" identifies how digital and analog signals are stored and transmitted.
Instructional Video2:08
Curated Video

Inside the Computer: Exploring Key Components and How They Work

12th - Higher Ed
This video provides a basic overview of the key components inside a computer, such as the motherboard, CPU, RAM, hard drive, and power supply unit. It explains their functions and how they work together to make a computer operate. The...
Instructional Video2:08
Curated Video

Inside the Computer: Understanding the Components

12th - Higher Ed
This video provides an insightful look into the internal components of a computer, breaking down the functions of key parts that enable the computer to operate effectively. It starts by introducing the motherboard as the central circuit...
Instructional Video3:13
Curated Video

Computer Basics Protecting Your Computer

6th - Higher Ed
This video provides essential tips for protecting your computer and keeping it running smoothly. It covers the importance of using antivirus programs, regular updates, and backup solutions to safeguard your files and personal data. By...
Instructional Video10:51
Curated Video

Why Do We Dream? Scientific Theories Behind Dreaming and Meaning

12th - Higher Ed
Why do we dream? What do dreams mean? What are dreams? We know that we dream while we are asleep. Sleep can be divided into two categories rapid eye movement or REM sleep, and non-REM sleep. When you fall...
Instructional Video13:43
Curated Video

The Connection Between Entropy, Time, and Information

12th - Higher Ed
The common interpretation of entropy is that it is a measure of disorder in the universe. The universe is on path to more and more disorder. And this is the reason time is thought to flow forward.Is entropy a...
Instructional Video1:57
Curated Video

How to Restore Computer Files You Deleted Accidentally

9th - Higher Ed
Howcast - Learn how to restore computer files you deleted accidentally from computer expert Yoav Erez in this Howcast video about wireless network technology.
Instructional Video1:26
Curated Video

How to Use NTFS

9th - Higher Ed
Howcast - If you're confused when it comes to your hard drive's format, this guide will show you the way to get the most out of your system.
Instructional Video1:24
Curated Video

How to Partition a Hard Drive on a Windows PC

9th - Higher Ed
Howcast - If your hard drive is getting slower and you need to allocate space, this guide will show you how to pick up the pace with partitions.