Instructional Video11:26
Crash Course

The Internet: Crash Course Computer Science

12th - Higher Ed
Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader...
Instructional Video4:06
SciShow

Weird Places: Movile Cave

12th - Higher Ed
In 1986, a prospecting crew in southern Romania was looking for a good place to build a geothermal power plant, when they accidentally discovered one of the oddest caves of all
Instructional Video1:12
Visual Learning Systems

Traits and Heredity: What Is Heredity?

9th - 12th
Upon viewing the Traits and Heredity video series, students will be able to do the following: Define traits as the distinguishing characteristics of an organism. Describe heredity as the process of passing on traits from parents to...
Instructional Video3:37
Packt

Evaluate the scalability and reliability of networks : Application types and network performance

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Application types and...
Instructional Video23:40
Curated Video

Lamb

K - Higher Ed
Watch with us as thousands of Olive Ridley Turtle babies find their way into the sea off the coast of India with the help of conservationists and concerned volunteers. Also, find out how zoo keepers in Madrid endeavor to help their...
Instructional Video4:37
Professor Dave Explains

Practice Problem: Molarity Calculations

12th - Higher Ed
Solution concentration is measured in molarity, which is moles solute per liter of solution. Can we calculate concentration, moles, or volume, given the other two values? Sure, it's easy!
Instructional Video6:16
Packt

List computer networking media : Firewalls and Servers

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode...
Instructional Video2:09
Financial Times

Why Israel leads the world in computer vision

Higher Ed
This technology's impact Is being felt in fields from medicine to self-driving cars and even shopping. Israel's start-ups in this sector have attracted millions of dollars in investment. It has a big advantage: a heavy concentration of...
Instructional Video10:53
Curated Video

Describe the applications of artificial intelligence systems : What is Machine Learning?

Higher Ed
From the section: An Introduction to Machine Learning. In this section, we are introduced to Machine Learning. We learn about its types and applications. There will an explanation on AI versus ML. An Introduction to Machine Learning:...
Instructional Video3:30
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - How Applications Run

Higher Ed
This video explains how applications run in runtime environments. This clip is from the chapter "Cloud Platforms" of the series "Web Development Concepts for Everyone".This video explains cloud platforms and cloud hosting with Heroku.
Instructional Video1:03
Visual Learning Systems

Measuring: Summing Up

9th - 12th
Upon viewing the Measuring video series, students will be able to do the following: Generally explain that the process of measuring involves making observations of things using tools. Understand that measurements often involve the use of...
Instructional Video3:28
Packt

Compare the breadth-first and depth-first search algorithms : Introduction to File Search Application

Higher Ed
From the section: Shortest Time Search (Depth First Search). Understand the application that we will develop in this section by answering the questions. • What is search • What is file search • How does it work Understand the application...
Instructional Video4:37
Curated Video

Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will find out what is persistent...
Instructional Video2:52
Curated Video

World of Computer Networking Your CCNA start - Client and Server

Higher Ed
This video explains the client and server in the transport layer. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your...
Instructional Video2:58
Curated Video

Application Development with Swift 2 (Video 2)

Higher Ed
Swift 2 is the latest iteration of Apple's native programming language for iOS devices. If you're an aspiring iOS application developer who is looking to build apps for the App Store, you'll need to use Swift. The language boasts a vast...
Instructional Video2:30
Tarver Academy

Expressions and Variables - Algebraic Expressions - ALGEBRA I

12th - Higher Ed
In This Episode, Tyler Teaches Us About Expressions and Variables - Algebraic Expressions - ALGEBRA I
Instructional Video12:32
Packt

Introduction to computer hardware and software : Introduction to Mass Storage

Higher Ed
From the section: Mass Storage Technologies. In this section, we cover topics related to Mass storage. Mass Storage (disk drives and solid-state drives) store the operating system and applications. Despite the different technologies,...
Instructional Video7:43
Packt

List computer networking media : E-Mail

Higher Ed
From the section: The Internet. Here, we explore our internet options. Continuing with the Application-layer protocols, this episode explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for...
Instructional Video8:03
Curated Video

The Art of Doing - Python Network Applications with Sockets - Advanced GUI Chat Room Part 11 - Final Testing

Higher Ed
In this eleventh part, we are going to work on the final test. This clip is from the chapter "Creating an Advanced GUI Chat Room with the Json Module" of the series "The Art of Doing - Python Network Applications with Sockets".In this...
Instructional Video9:05
Curated Video

Describe the different types of malware that could affect a computer system or network : Ransomware

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video8:26
Seven Dimensions

Conflict Resolution and Effective Communication in the Workplace

Higher Ed
This video shows a workplace conflict resolution session, highlighting the importance of effective communication, respect, and understanding in resolving conflicts. It showcases various scenarios and strategies for addressing conflicts,...
Instructional Video1:06
Next Animation Studio

Hong Kong national security law changes, explained

12th - Higher Ed
Chinese authorities are planning to override Hong Kong’s legislature and propose their own national security law for the region.
Instructional Video12:28
Flipping Physics

Dart with Thin Rod Collision - Conservation of Angular Momentum Demonstration and Problem

12th - Higher Ed
A 5.3 g dart is moving vertically at 16.5 m/s just before it collides with and sticks to a 33.9 cm long, thin piece of cardboard. If the dart hits the 71.8 g piece of cardboard 28.7 cm from its fixed end, to what maximum angle does the...
Instructional Video3:00
Curated Video

Introduction to Coding: The Language of Computers

Pre-K - Higher Ed
Coding is the language that powers the technology around us. It's the set of instructions that computers follow to perform their functions. From smartphones and computers to cars and microwaves, code is what makes these devices work.

Other popular searches