Why U
Algebra 80 - Multiplication with Complex Numbers
Multiplying a complex number by another complex number is accomplished using the distributive property to multiply the real and imaginary parts of the first number by the real and imaginary parts of the second number. In this lecture we...
de Dicto
Time Perception with Dr Devin Terhune: Time perception and the average person
What do we better understand about the way the average person perceives time? Time Perception with Dr Devin Terhune, Part 4
Schooling Online
IB Biology Skills: Reliability 1
A new contender joins the archery contest... Will they be a match for Robin Hood? Only time (and repeated trials) will tell! This lesson will explore the concept of reliability, including the subtle difference between accuracy and...
Curated Video
Explain web security : Understand-ing Bit Hacker Jar-gon!
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Curated Video
Explain web security : Basic Terminologies
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Hip Hughes History
The Assassination of William McKinley: HipHughes On Location
The assassination of President William McKinley is one of only four Presidential assassinations in US History, yet most Americans know very little about the event. Travel with me to the spot where it happened in Buffalo, NY for a little...
Curated Video
Explain web security : Methodolo-gy of Hack-ers
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Curated Video
Explain web security : What is Reconnaissance?
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Curated Video
Explain web security : Reconnais-sance and Passive In-formation Gathering
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Math Fortress
Differential Equations: Solutions (Level 4 of 4)
This video introduces the basic concepts associated with solutions of partial differential equations. This video goes over 3 examples illustrating how to verify solutions to partial differential equations.
TED-Ed
TED-Ed: The Prison Break | Think Like A Coder, Ep 1 | Alex Rosenthal
This is episode 1 of our animated series "Think Like A Coder." This 10-episode narrative follows a girl, Ethic, and her robot companion, Hedge, as they attempt to save the world. The two embark on a quest to collect three artifacts and...
TED-Ed
TED-Ed: The World Machine | Think Like A Coder, Ep 10 | Alex Rosenthal
This is episode 10 of our animated series "Think Like A Coder." This 10-episode narrative follows a girl, Ethic, and her robot companion, Hedge, as they attempt to save the world. The two embark on a quest to collect three artifacts and...
Curated Video
How to Use ChatGPT and Generative AI for Passive Income - Use ChatGPT to Write Emails for Sales
Discover how to use ChatGPT to draft effective sales emails that drive conversions. This video will show you how to use AI to generate personalized and persuasive messages that engage with your target audience and encourage them to take...
Curated Video
Explain web security : The Course Overview
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Curated Video
Finding Complex Solutions of Quadratic Equations
This video explains how to find complex solutions of quadratic equations using the method of completing the square. It provides step-by-step instructions on isolating variables, finding perfect square trinomials, and using the square...
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.