“…The application provides users with a series of levels where the user would control how bundles of information or “packets” were routed between devices in a simulated network. These levels would have the user learn about topics such as routing, weighted graphs, algorithms, pinging, and a cybersecurity attack known as the “man in the middle” [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. All of these levels remain in the second version which we called as ML version of the application and were improved to more intuitively convey the ideas being taught.…”