Instructional Video4:46
SciShow

Why We Hide Our Good Deeds

12th - Higher Ed
It doesn’t make much sense when we try to hide our good deeds, even though we know that we would get rewards from doing something good. Scientists are trying to solve this our bizarre behavior by using game theory.
Instructional Video5:47
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - DNS The Domain Name System

Higher Ed
In this video, learn about DNS, a key system for translating domain names into IP addresses.
Instructional Video1:06
Curated Video

How to Address an Envelope

9th - Higher Ed
Address an envelope correctly so it reaches its destination.
Instructional Video1:52
Curated Video

How to Stop Junk Mail

9th - Higher Ed
If you are being overwhelmed with junk mail, use these ideas to stem the delivery of unwanted mail to your home or office.
Instructional Video26:50
Curated Video

Generating a plan for a letter to be written to Joseph Coelho

Pre-K - Higher Ed
Pupil outcome: I can generate a plan for a letter to be written to Joseph Coelho. Key learning points: - A letter is a piece of writing that someone sends to someone else. - There are many different reasons why a person may write and...
Instructional Video8:34
Curated Video

Exploring Communication: A Colorful Journey with Paco the Macaw

K - 5th
In this video, Paco the Macaw teaches children about the importance of communication. Through examples and storytelling, Paco explains how communication involves both verbal and nonverbal signals, and how it helps build relationships and...
Instructional Video3:29
Curated Video

Inbox Zero: Mastering Email Management

Pre-K - Higher Ed
Feeling overwhelmed by an overflowing inbox? Discover how to achieve Inbox Zero and master email management with these proven strategies. This video covers effective techniques to turn email chaos into order, enhancing your productivity...
Instructional Video4:47
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Modifier Function

Higher Ed
In this video, we will discuss the solution to the exercise on the modifier function from the previous video.
<
br/>
This clip is from the chapter "Solidity Patterns II - Restricted Access" of the series "The Complete Solidity...
Instructional Video1:34
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Modifier Function

Higher Ed
This is an exercise video on the modifier function.
<
br/>
This clip is from the chapter "Solidity Patterns II - Restricted Access" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video8:56
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Write a Function Modifier

Higher Ed
In this video, we will discuss the solution to the exercise on writing a function modifier from the previous video.
<
br/>
This clip is from the chapter "Learn Functions in Solidity" of the series "The Complete Solidity Course -...
Instructional Video3:53
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Write a Function Modifier

Higher Ed
This is an exercise video on writing a function modifier.
<
br/>
This clip is from the chapter "Learn Functions in Solidity" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts".This...
Instructional Video9:11
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Global Variables in Solidity I

Higher Ed
In this video, you will learn about global variables in Solidity, which are pre-defined variables that can be accessed from anywhere in the contract.
<
br/>
This clip is from the chapter "Learn Solidity Basics IV (Conversions and...
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video4:59
Curated Video

Behavioral Design Patterns in C++ - Introduction-Chain Of Responsibility

Higher Ed
This video provides an introduction to the CoR (Chain of Responsibility) pattern.
<
br/>
This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of...
Instructional Video2:37
Curated Video

Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island - Quotes Struct

Higher Ed
This video explains how to create the data structure for our quotes widget.
<
br/>
This clip is from the chapter "Network-Enabled Widget" of the series "Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island".This section...
Instructional Video1:29
Curated Video

Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island - Quotes Widget Introduction

Higher Ed
This video explains the quotes widget creation and how it works.
<
br/>
This clip is from the chapter "Network-Enabled Widget" of the series "Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island".This section explains how to...
Instructional Video10:53
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video5:15
Curated Video

Wish You Were Here

K - 8th
Mr. Griot receives a postcard from an old friend. Then he describes the elements of a postcard as he creates one to send to his friend.
Instructional Video3:51
Curated Video

SkillSprints: Understanding and Preventing Phishing Emails

Pre-K - Higher Ed
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Instructional Video4:20
Organizational Communication Channel

5 Components of Human Communication Dean Barnlund

Higher Ed
There are five key components of human communication that Dean Barnlund explained and we look at Johnson and Hackman's explanation of those principles.
Instructional Video5:35
Curated Video

Sender Framework Policy (SPF)

Higher Ed
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Instructional Video10:20
Curated Video

Introduction to IT and Cybersecurity: Cyber Security Essentials

Higher Ed
Part 13/16 of Introduction to IT and Cybersecurity series: The video discusses the essentials of cyber security and covers various aspects such as encryption, firewalls, digital certificates and signatures, passwords, and intrusion...
Instructional Video7:08
Curated Video

Protect Yourself from Phishing Attacks

Higher Ed
The video explains the phishing attack techniques and how you can identify and avoid them.
Instructional Video1:45
Curated Video

I WONDER - Why Should You Be Careful When Clicking On Online Links?

Pre-K - 5th
This video is answering the question of why should you be careful when clicking on online links.