Hi, what do you want to do?
SciShow
Why We Hide Our Good Deeds
It doesn’t make much sense when we try to hide our good deeds, even though we know that we would get rewards from doing something good. Scientists are trying to solve this our bizarre behavior by using game theory.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - DNS The Domain Name System
In this video, learn about DNS, a key system for translating domain names into IP addresses.
Curated Video
How to Address an Envelope
Address an envelope correctly so it reaches its destination.
Curated Video
How to Stop Junk Mail
If you are being overwhelmed with junk mail, use these ideas to stem the delivery of unwanted mail to your home or office.
Curated Video
Generating a plan for a letter to be written to Joseph Coelho
Pupil outcome: I can generate a plan for a letter to be written to Joseph Coelho. Key learning points: - A letter is a piece of writing that someone sends to someone else. - There are many different reasons why a person may write and...
Curated Video
Exploring Communication: A Colorful Journey with Paco the Macaw
In this video, Paco the Macaw teaches children about the importance of communication. Through examples and storytelling, Paco explains how communication involves both verbal and nonverbal signals, and how it helps build relationships and...
Curated Video
Inbox Zero: Mastering Email Management
Feeling overwhelmed by an overflowing inbox? Discover how to achieve Inbox Zero and master email management with these proven strategies. This video covers effective techniques to turn email chaos into order, enhancing your productivity...
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Modifier Function
In this video, we will discuss the solution to the exercise on the modifier function from the previous video.
<
br/>
This clip is from the chapter "Solidity Patterns II - Restricted Access" of the series "The Complete Solidity...
<
br/>
This clip is from the chapter "Solidity Patterns II - Restricted Access" of the series "The Complete Solidity...
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Modifier Function
This is an exercise video on the modifier function.
<
br/>
This clip is from the chapter "Solidity Patterns II - Restricted Access" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
<
br/>
This clip is from the chapter "Solidity Patterns II - Restricted Access" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Write a Function Modifier
In this video, we will discuss the solution to the exercise on writing a function modifier from the previous video.
<
br/>
This clip is from the chapter "Learn Functions in Solidity" of the series "The Complete Solidity Course -...
<
br/>
This clip is from the chapter "Learn Functions in Solidity" of the series "The Complete Solidity Course -...
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Write a Function Modifier
This is an exercise video on writing a function modifier.
<
br/>
This clip is from the chapter "Learn Functions in Solidity" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts".This...
<
br/>
This clip is from the chapter "Learn Functions in Solidity" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts".This...
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Global Variables in Solidity I
In this video, you will learn about global variables in Solidity, which are pre-defined variables that can be accessed from anywhere in the contract.
<
br/>
This clip is from the chapter "Learn Solidity Basics IV (Conversions and...
<
br/>
This clip is from the chapter "Learn Solidity Basics IV (Conversions and...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Curated Video
Behavioral Design Patterns in C++ - Introduction-Chain Of Responsibility
This video provides an introduction to the CoR (Chain of Responsibility) pattern.
<
br/>
This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of...
<
br/>
This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of...
Curated Video
Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island - Quotes Struct
This video explains how to create the data structure for our quotes widget.
<
br/>
This clip is from the chapter "Network-Enabled Widget" of the series "Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island".This section...
<
br/>
This clip is from the chapter "Network-Enabled Widget" of the series "Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island".This section...
Curated Video
Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island - Quotes Widget Introduction
This video explains the quotes widget creation and how it works.
<
br/>
This clip is from the chapter "Network-Enabled Widget" of the series "Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island".This section explains how to...
<
br/>
This clip is from the chapter "Network-Enabled Widget" of the series "Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island".This section explains how to...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Understanding DNS
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Curated Video
Wish You Were Here
Mr. Griot receives a postcard from an old friend. Then he describes the elements of a postcard as he creates one to send to his friend.
Curated Video
SkillSprints: Understanding and Preventing Phishing Emails
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Organizational Communication Channel
5 Components of Human Communication Dean Barnlund
There are five key components of human communication that Dean Barnlund explained and we look at Johnson and Hackman's explanation of those principles.
Curated Video
Sender Framework Policy (SPF)
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Curated Video
Introduction to IT and Cybersecurity: Cyber Security Essentials
Part 13/16 of Introduction to IT and Cybersecurity series: The video discusses the essentials of cyber security and covers various aspects such as encryption, firewalls, digital certificates and signatures, passwords, and intrusion...
Curated Video
Protect Yourself from Phishing Attacks
The video explains the phishing attack techniques and how you can identify and avoid them.
Curated Video
I WONDER - Why Should You Be Careful When Clicking On Online Links?
This video is answering the question of why should you be careful when clicking on online links.