Instructional Video8:03
Curated Video

Java Programming for Complete Beginners - Java 16 - Step 12 - Java char Data Type - Exercises 2 – isDigit

Higher Ed
In this video, we will learn about Java char data type - exercises 2 – isDigit. This clip is from the chapter "Primitive Data Types and Alternatives" of the series "Java Programming for Complete Beginners - Java 16".In this section, we...
Instructional Video14:53
Curated Video

The Complete Beginners Guide to Arduino - 2021 - Temperature and Humidity Display - DHT11

Higher Ed
In this lecture, we are going to work with temperature and humidity display - DHT11. This clip is from the chapter "Step-by-Step Learning with Arduino Projects" of the series "The Complete Beginners Guide to Arduino - 2021".In this...
Instructional Video2:04
Brainwaves Video Anthology

Bradford Pearson - Teachers Make a Difference - Rem Briggs

Higher Ed
Bradford Pearson is an award-winning journalist whose work examines everything from magicians to Japanese American incarceration to his own kidnapping. He’s written for The New York Times, and Esquire, Time, and Men’s Health magazines,...
Instructional Video3:33
Curated Video

Python 3 for Beginners: Creating a Program to Make a Cat Speak with Speech Bubble

Higher Ed
In this Python programming tutorial, we will learn how to create a speech bubble in the console and display text inside the bubble. We will use the Len function to determine the length of the text and use print statements to create the...
Instructional Video12:19
Curated Video

Practical Data Science using Python - Python String Operations

Higher Ed
This video explains Python string operations. This clip is from the chapter "Python for Data Science" of the series "Practical Data Science Using Python".This section explains Python for data science.
Instructional Video9:07
PBS

The Beauty and Anguish of Les Misérables! (feat. Lindsay Ellis) | PBS Digital Studios

12th - Higher Ed
Victor Hugo’s Les Misérables is one of history’s most famous novels and one of the longest-running musicals in Broadway history. On this special episode of It’s Lit! we explore how Les Miserable became both a national and revolutionary...
Instructional Video21:53
Packt

Longest Palindromic Substring – Part 1

Higher Ed
This is the first part of the two-part video that explains the longest palindromic substring. This clip is from the chapter "Question 11: Longest Palindromic Substring" of the series "Data Structures and Algorithms: The Complete...
Instructional Video9:00
Curated Video

AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Password Policies in Amazon Web Services (AWS)

Higher Ed
This video demonstrates how to use and implement password policies in AWS. This clip is from the chapter "Solutions Architect Chapter 8 – Identity and Access Management (IAM) Best Practices" of the series "AWS Solutions Architect...
Instructional Video8:40
Curated Video

Complete Modern C++ - std::string_view - I

Higher Ed
In this video, learn and understand the basics of the std::string_view class. This clip is from the chapter "C++17 Standard Library Components" of the series "Complete Modern C++".null
Instructional Video7:22
Curated Video

Complete Modern C++ - File IO - Part IV (Character IO and Seeking)

Higher Ed
This video explains how to perform character I/O with streams. This clip is from the chapter "File Input and Output" of the series "Complete Modern C++".This section explains about functions in file input and output.
Instructional Video7:12
Curated Video

HTML CSS and JavaScript for Beginners - A Web Design Course - Create a Contact Form

Higher Ed
In this video, we'll learn about creating a contact form. This clip is from the chapter "Learn HTML Course Section" of the series "HTML CSS and JavaScript for Beginners - A Web Design Course".Learn about HTML here. You will learn about...
Instructional Video11:39
Curated Video

JavaScript Strings

Pre-K - Higher Ed
JavaScript has a number of methods for manipulating, managing and searching strings. Mark will demonstrate in this video.
Instructional Video8:21
The Africa Channel

Behind the Words: Chimamanda Ngozi Adiche talks about her book 'Purple Hibiscus'

12th - Higher Ed
Go, Behind the Words of some of Africa’s literary icons and hear what inspired their writings. Chimamanda Ngozi Adichie, author of bestselling novel, Americanah the soon to be produced HBO Max series starring Lupito Nyong’o, and Half of...
Instructional Video6:41
The Art Assignment

Draw a shape that represents you. | Tschabalala Self | The Art Assignment

9th - 12th
This week we meet with Tschabalala Self, whose work explores ideas surrounding the black female body; and her assignment asks you to consider your own body as a symbol too.
Instructional Video1:34
IDG TECHtalk

How to use the csplit command: 2-Minute Linux Tips

Higher Ed
In this Linux tip, learn how to use the csplit command. It's a command that lets you split a file into pieces based on its content. For example, you might separate a file based on chapter headings, dates or content separators of some...
Instructional Video6:57
Curated Video

HTML CSS and JavaScript for Beginners - A Web Design Course - JavaScript String Methods

Higher Ed
In this video, we'll cover JavaScript string methods. This clip is from the chapter "Learn JavaScript Section" of the series "HTML CSS and JavaScript for Beginners - A Web Design Course".Learn how to write JavaScript, JavaScript code,...
Instructional Video9:31
Curated Video

Excel VBA Programming The Complete Guide - VBA Functions, Part I

Higher Ed
The VBA object includes many helper methods to assist the developer with common utility operations. In this lesson, we explore the LCase, UCase, Len, Trim, and InStr methods for working with strings. This clip is from the chapter...
Instructional Video14:09
Curated Video

The Complete Practical Docker Guide - Changing Permissions

Higher Ed
This video explains how to change files permissions. This clip is from the chapter "User Management and Permissions in Linux" of the series "The Complete Practical Docker Guide".This section focuses on the User Management and Permissions...
Instructional Video2:52
Curated Video

World of Computer Networking Your CCNA start - Hexadecimal versus Binary Numbers

Higher Ed
This video highlights the difference between hexadecimal and binary numbers. This clip is from the chapter "Ethernet" of the series "World of Computer Networking: Your CCNA start".This section introduces you to Ethernet.
Instructional Video4:58
Curated Video

Java Programming for Complete Beginners - Java 16 - Step 17 - Set Interface - Hands on - HashSet, LinkedHashSet and TreeSet

Higher Ed
In this session, we will learn about set interface - hands on - HashSet, LinkedHashSet, and TreeSet. This clip is from the chapter "Collections" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will...
Instructional Video5:12
Curated Video

Linux Administration Bootcamp: Go from Beginner to Advanced - Wildcards - Part 1

Higher Ed
This is the first part of the two-part video that explains the concept of wildcard symbols. This clip is from the chapter "Intermediate Linux Skills" of the series "Linux Administration Bootcamp: Go from Beginner to Advanced".This...
Instructional Video7:13
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Making Password Lists with Cupp

Higher Ed
In this video, you'll learn about Cupp and how to make password lists using this tool. This clip is from the chapter "Wireless Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video3:23
Curated Video

Inserting Tick Box Symbols in Google Docs

Pre-K - Higher Ed
Learn how to easily insert tick boxes, cross boxes, and other symbols into your Google Docs using a clever drawing tool. By simply drawing the symbol you want to insert, Google Docs will search for similar symbols and allow you to select...
Instructional Video6:34
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - SQLi mitigation - Escaping user input, least privilege, whitelist validation

Higher Ed
SQL Injection: SQLi mitigation - Escaping user input, least privilege, whitelist validation This clip is from the chapter "SQL Injection" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will...