Instructional Video11:13
Brian McLogan

Find the Domain of a square root function compilation

12th - Higher Ed
In this video we will explore how to find the function of a radical by focusing on the the implied domain over 5 different examples. ⭐️Find the Domain of a Rational Radical Function - • Find the Domain of a Rational Radical... ⭐️ Find...
Instructional Video10:34
Brian McLogan

Domain with More Than One Restriction | Part 4

12th - Higher Ed
Once you know how to find the domain of a single function it is time to add multiple functions together. This adds a complex layer to finding the domain that we will explore in this video. ⭐️ Find the Range Using the Inverse | Part 3 - •...
Instructional Video5:02
Brian McLogan

What students always forget when writing the domain

12th - Higher Ed
Finding the domain or a function can be confusing, in this video I cover something students commonly forget when dealing with a rational radical function. ⭐️ Where Students Make Mistakes Evaluating Functions - • Where Students Make...
Instructional Video2:11
Brian McLogan

Biggest Mistake For Domain Radical Function

12th - Higher Ed
In this video I will go over one of the most common mistakes students make with finding the domain of a function like this. ⭐️ What students always forget when writing the domain - • What students always forget when writ... ✔️ Functions...
Instructional Video1:47
Curated Video

The Role of Philosophy

12th - Higher Ed
Philosopher Scott Soames (USC) passionately speaks of the importance of philosophical thinking.
Instructional Video5:53
Curated Video

What Is a Function?

3rd - Higher Ed
“What Is a Function?” will explain what a function is and how it can be represented.
Instructional Video5:21
Curated Video

On Being A Slave

12th - Higher Ed
Intellectual historian Quentin Skinner (QMUL) demonstrates how the ancient Roman view of freedom, while largely overlooked today, is hugely relevant to many aspects of our contemporary world.
Instructional Video8:18
Curated Video

Finding a Function’s Inverse Algebraically

K - 8th
This video will discuss examples of finding a function’s inverse function algebraically.
Instructional Video2:44
Curated Video

Increased Elegance

12th - Higher Ed
Imperial College cosmologist Claudia de Rham describes her view of how reinterpreting Einstein's theory of gravity in terms of particle physics gives a more coherent and elegant picture of the forces of nature.
Instructional Video2:36
Curated Video

Neuroplasticity and Vision

12th - Higher Ed
Stanford University neuroscientist Kalanit Grill-Spector describes three aspects of neuroplasticity she is investigating in her work on vision and facial recognition, investigating various ways that the brain might reorganize itself as...
Instructional Video5:15
Curated Video

Using the Boclips "Sparks" Feature to Browse Videos by Curriculum Alignments

Pre-K - Higher Ed
Learn more about "Sparks," one of the most popular video discovery features on the Boclips CourseSpark platform. Sparks help you browse video recommendations by popular and widely adopted curricula. In this video, you will learn about...
Instructional Video26:57
Why U

Algebra 92 - Rational Functions and Holes

12th - Higher Ed
In the previous lecture, we saw examples of x values that cause a rational function's numerator to be zero, where those x values produce x-axis intercepts in the function's graph. We also saw x values that cause denominator zeros that...
Instructional Video13:06
Why U

Algebra 91 - Rational Functions and Vertical Asymptotes

12th - Higher Ed
A rational function is any function that can be written as a fraction whose numerator and denominator are polynomials. Rational functions include a broad range of possibilities. For example, since a polynomial can be a constant, a...
Instructional Video15:13
Why U

Algebra 86 - Graphing Polynomial Functions - Part 1

12th - Higher Ed
Calculators and graphing utilities are available that are capable of creating accurate graphs of polynomial functions. However, it is often desirable to sketch a quick representation of a function's graph to get a general idea of its...
Instructional Video3:00
Curated Video

Domain and Range

3rd - Higher Ed
“Domain and Range” explains when a relation is a function. The video also describes how to determine the domain and range of a given function.
Instructional Video3:58
Curated Video

The Classification of Life

3rd - 8th
A video entitled “The Classification of Life” which describes taxonomy and how all organisms on Earth are organized according to the Linnaean system.
Instructional Video2:53
friEdTech

Google Calendar - Meet with & Find a Time

Higher Ed
"Have you ever needed to schedule a meeting with co-workers but hate the back-and-forth emails trying to find a time that works for everyone? With the Meet with and Find a Time features in Google Calendar, you can quickly schedule events...
Instructional Video12:11
Curated Video

Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends

Higher Ed
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Instructional Video2:30
Curated Video

Business Email Compromise

Higher Ed
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees
Instructional Video3:04
Curated Video

Other Phishing Techniques

Higher Ed
The video explains the phishing attack techniques and how you can identify and avoid them
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks