Tarver Academy
How to Use Google Forms Settings
In This Episode, Tyler Teaches Us About How to Use Google Forms Settings
Brian McLogan
Review of order of operations with parenthesis and brackets, 2(5^2 + (36/6))
👉 Learn how to simplify mathematics expressions. A mathematis expression is a finite combination of numbers and symbols formed following a set of operations or rules. To simplify a mathematics expression means to reduce the expression...
EL Consulting
Performance Review Discussion with an Employee
In this performance discussion, a manager and employee review the key priorities of the job, strengths and areas for improvement. The discussion highlights the importance of accuracy and knowledge in the job, as well as the need for...
Brian McLogan
Summary for simplifying trigonometric expressions
👉 Learn how to simplify identities by factoring. Just like in normal algebraic expressions, trigonometric identities can be simplified by factoring out the GCFs from the terms of the identities, then common trigonometric identities like...
Curated Video
Web API Development with Flask (Video 16)
Whether working in the enterprise, building for web or mobile, you will need to build (if you haven't already) RESTful APIs to serve data between different client applications and endpoints. This course delivers the fundamental knowledge...
Curated Video
Understanding Equations and Finding Solutions Using a Pan Balance
In this video, the teacher explains the concept of equations having one solution using a pan balance analogy. The students are reminded that variables can represent unknown numbers or sets of numbers, and that the equal sign means both...
Programming Electronics Academy
DFRobot Pirate 4WD Mobile Platform Reveiw for Arduino
This video is review of the RFRobot Pirate 4WD Mobile Platform for Arduino. It briefly discusses the cost platform, the durability, it's speed, the ease of assembly, the power requirements and some other miscellaneous factors.
IDG TECHtalk
In hand: An iPhone 12 and a 12 Pro (plus some Apple earnings insights)
The first iPhone 12s have arrived in the hands of our two Apple experts. Macworld senior writer Michael Simon and Computerworld executive editor Ken Mingis join Juliet to discuss first thoughts on the iPhone 12, whether to buy an iPhone...
IDG TECHtalk
How to mitigate risk from nation-state attacks
The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.
IDG TECHtalk
How to better manage your domain passwords
Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.
IDG TECHtalk
Best practices for secure work-from-home VPN connections
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 01 - Overview of the Java Platform - an Introduction - java, javac, bytecode
In this video, we will see an overview of the Java platform - an introduction - java, javac, bytecode. This clip is from the chapter "Introduction to the Java Platform" of the series "Java Programming for Complete Beginners - Java 16".In...
Curated Video
Choosing the Right Unit of Measure for Area
In this video, the teacher explains how to decide which unit of measure to use when measuring area. They demonstrate the concept of square units and how they can vary in size depending on the measurement unit. Through examples of a...
ACDC Leadership
Micro Unit 6 Summary- Market Failures and the Role of the Government
This video introduces the topic of market failures and the role of government in addressing them. They cover concepts such as public goods, externalities, antitrust laws, and income distribution. The teacher emphasizes the importance of...
Curated Video
Understanding Place Value and Dividing by Powers of 10
In this lesson, students will learn about the relationship between digits on a place value chart by dividing by powers of 10. They will understand how each digit's value changes as we move to the right on the place value chart, becoming...
Curated Video
Web API Development with Flask (Video 25)
Whether working in the enterprise, building for web or mobile, you will need to build (if you haven't already) RESTful APIs to serve data between different client applications and endpoints. This course delivers the fundamental knowledge...
Curated Video
Analyzing and Identifying Discrete Domains
In this video lesson, students learn how to identify a discrete domain by analyzing a situation. The teacher uses the example of creating iPhone apps to illustrate how the average cost of creating a certain number of apps can be determined.
Oxford Comma
Chapter by Chapter (Never Let Me Go): Chapter Eighteen
Welcome to the eighteenth video in our chapter by chapter analysis of Kazuo Ishiguro's Never Let Me Go! In this video we'll look at the start of part three and how Ishiguro masterfully makes an extreme situation seem all too relatable....
The Business Professor
Auditing - What are Reviews
Thsi video explains what are Reviews in Audit practice.
IDG TECHtalk
New Windows vulnerabilities underscore importance of network segmentation
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
IDG TECHtalk
How to double-check permissions post migration from Windows 7
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.
Curated Video
Agile Masterclass: Agile for Project Management - Scrum Event 4: Sprint Review
This video explains Sprint review. This clip is from the chapter "Scrum Events" of the series "Agile Project Management: Agile, Scrum, Kanban, and Extreme Programming".This section explains Scrum events.
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Principle of Least Privilege
This video explains how the principle of least privilege can be implemented to restrict permission to a user. This clip is from the chapter "Solutions Architect Chapter 8 – Identity and Access Management (IAM) Best Practices" of the...