Curated Video
Graphing on a Coordinate Plane: Understanding Quadrants and Ordered Pairs
This video provides a clear and concise explanation of the key points for graphing on a coordinate plane, including vocabulary, quadrants, and how to plot ordered pairs. It also includes interactive exercises for viewers to practice...
Curated Video
Mastering MEAN Web Development Expert Full Stack JavaScript (Video 37)
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web applications in a...
IDG TECHtalk
How to make the most of Microsoft’s new Compliance Score Console
This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.
IDG TECHtalk
How to defend Office 365 from spear-phishing attacks
Configure Office 365 to detect email-delivered malware.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C02) Exam Prep Course - Sample Questions "Resilient Architectures"
This video explains the sample questions This clip is from the chapter "Resilient Architectures" of the series "AWS Certified Solutions Architect Associate (SAA-C02) Exam Prep Course".This section introduces you to resilient architectures.
All Ears English
Damage Control! How to Apologize After the Fact: AEE 1678
Damage Control! How to Apologize After the Fact: AEE 1678
Brian McLogan
Comparing the exponetial and logarithmic graphs
👉 Learn all about graphing logarithmic functions. A logarithmic function is a function with logarithms in them. The graph of the parent function of a logarithmic function usually takes its domain from the positive x-axis. To graph a...
Curated Video
Master Hibernate and JPA with Spring Boot in 100 Steps - Step 21 - Entities and Relationships - an Overview
In this video, we will cover entities and relationships - an overview. This clip is from the chapter "Establishing Relationships with JPA and Hibernate-OneToOne" of the series "Master Hibernate and JPA with Spring Boot in 100 Steps".In...
Curated Video
Using Multiplication to Find Percent Increase
In this video, the teacher explains how to use multiplication to find a percent increase. They demonstrate how to write a percent increase problem as a product of the original amount and provide examples to illustrate the concept.
Curated Video
Similar Figures
In this video lesson, we will learn the definition of similar figures. Similar figures are figures that are the same shape but different sizes. Similar figures have corresponding sides that are proportional and corresponding angles that...
Curated Video
Finding Area in Real World Situations
In this video, the teacher explains how to find the area in real-world situations using multiplication. They review the concept of area and the measurements of length and width for rectangles. They provide examples of finding the area of...
IDG TECHtalk
How to protect legacy systems on a Windows network
Every company has legacy systems, many of which provide vulnerabilities for attackers to exploit. Use this advice to help shut them out.
IDG TECHtalk
What security and IT admins need to know about Microsoft Threat Protection
Microsoft Threat Protection can help admins monitor and secure much of a Windows network, but licensing requirements are confusing.
Brian McLogan
I still don't get in simplifying basic expressions
👉 Learn how to simplify mathematics expressions. A mathematis expression is a finite combination of numbers and symbols formed following a set of operations or rules. To simplify a mathematics expression means to reduce the expression...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Creating a Pull Request from a Forked Repository
This video explains the process for creating a pull request from a forked repository. This clip is from the chapter "Forks and Contribution to the Public Repositories" of the series "Complete Git Guide: Understand and Master Git and...
Brian McLogan
What is an exponent - Teacher explains all
👉 Learn about the rules of exponents. An exponent is a number which a number is raised to, to produce a power. It is the number of times which a number will multiply itself in a power. There are several rules used in evaluating...
Brian McLogan
Learn how to identify the inverse of a function and graph
👉 Learn how to find the inverse of a linear function. A linear function is a function whose highest exponent in the variable(s) is 1. The inverse of a function is a function that reverses the "effect" of the original function. One...
Curated Video
Who Grades Your Computer IELTS Exams? - IELTS Energy Podcast 1143
You may be planning to take the computer-delivered IELTS exam and there are some differences between paper and computer! Today we answer 3 questions about the computer exam. Listen in so you are ready for test day!
Curated Video
Graphing and Transforming Absolute Value Functions
This video teaches how to graph and transform absolute value functions using the parent function f(x) = |x|. It explains how to identify translations, stretches, shrinks, and reflections, and provides examples for practice.
Curated Video
Solving Quadratic Problems: Factored Form and Finding Zeros and Symmetry
In this lesson, students will learn how to convert quadratic functions from standard form to factored form and use it to solve quadratic problems. They will also learn how to find the zeros and lines of symmetry using the factored form.
Curated Video
Learning Python Web Penetration Testing (Video 25)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
ACDC Leadership
AP Exam Review and LIVE Stream Dates (2018)
(*Correction*- For the tour stops in Marietta, GA I accidently switched the topics. The May 2nd session is Micro) Hey, econ teachers and students, it's that time again. Don't worry, I have your back.
IDG TECHtalk
Tips for finding signs of SolarWinds-type attacks in Active Directory
The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.
IDG TECHtalk
Top vulnerabilities used in attacks on Windows networks in 2020
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.