Explore Annotations for CS Concept
Networks and the Internet
Return to Explore Annotations page
Jump to sub-concept:
- Network Communication and Organization
- K.NI.NCO.01 Recognize that basic computing devices and components can be connected to one another.
Annotation K.NI.NCO.01
- 1.NI.NCO.01 Recognize that computing devices can be connected through physical or wireless pathways.
Annotation 1.NI.NCO.01
- 2.NI.NCO.01 Recognize that by connecting computing devices together they can share information (e.g., printers, scanners, internet, display devices).
Annotation 2.NI.NCO.01
- 3.NI.NCO.01 Recognize how information is sent and received over physical and wireless pathways.
Annotation 3.NI.NCO.01
- 4.NI.NCO.01 Summarize how information is sent and received over physical and wireless pathways (e.g., information is deconstructed in smaller pieces called packets, transmitted to final destination, and reassembled).
Annotation 4.NI.NCO.01
- 5.NI.NCO.01 Model how information is deconstructed into packets (smaller pieces), transmitted through multiple devices over the internet and networks, and reassembled at the final destination.
Annotation 05.NI.NCO.01
- K.NI.NCO.01 Recognize that basic computing devices and components can be connected to one another.
- Cybersecurity (1)
- K.NI.C.01 Identify and use passwords and discuss why they are not shared with others.
Annotation K.NI.C.01
- 1.NI.C.01 Recognize what passwords are, why they are used, and why they are not shared.
Annotation 1.NI.C.01
- 2.NI.C.01 Identify differences between strong and weak passwords and explain the importance of choosing strong passwords to protect devices and information from unauthorized users.
Annotation 2.NI.C.01
- 3.NI.C.01 Discuss basic issues that relate to responsible use of computing devices and describe consequences of inappropriate use in a variety of locations.
Annotation 3.NI.C.01
- 4.NI.C.01 Identify problems that relate to unsecure networks and inappropriate use of computing devices and potential subsequent consequences.
Annotation 4.NI.C.01
- 5.NI.C.01 Define personal identifiable information (e.g., digital footprint) and why it should be protected as related to real-world cyber security problems.
Annotation 5.NI.C.01.pdf
- K.NI.C.01 Identify and use passwords and discuss why they are not shared with others.
- Cybersecurity (2)
- Not addressed at grades K-4
- 5.NI.C.02 Discuss real-world cybersecurity problems and explain how personal information can be protected (e.g., antivirus software, backing up data, strong passwords).
Annotation5.NI.C.02.pdf
Return to Explore Annotations page