Ongoing professional development and support is available throughout the year. Sign up for sessions and classes now.

Explore Annotations for CS Concept

Networks and the Internet



Return to Explore Annotations page

Jump to sub-concept:


  • Network Communication and Organization
    • K.NI.NCO.01 Recognize that basic computing devices and components can be connected to one another.pdfAnnotation K.NI.NCO.01
    • 1.NI.NCO.01 Recognize that computing devices can be connected through physical or wireless pathways. pdfAnnotation 1.NI.NCO.01
    • 2.NI.NCO.01  Recognize that by connecting computing devices together they can share information (e.g., printers, scanners, internet, display devices). pdfAnnotation 2.NI.NCO.01
    • 3.NI.NCO.01  Recognize how information is sent and received over physical and wireless pathways. pdfAnnotation 3.NI.NCO.01
    • 4.NI.NCO.01  Summarize how information is sent and received over physical and wireless pathways (e.g., information is deconstructed in smaller pieces called packets, transmitted to final destination, and reassembled). pdfAnnotation 4.NI.NCO.01
    • 5.NI.NCO.01 Model how information is deconstructed into packets (smaller pieces), transmitted through multiple devices over the internet and networks, and reassembled at the final destination.pdfAnnotation 05.NI.NCO.01
  • Cybersecurity (1)
    • K.NI.C.01 Identify and use passwords and discuss why they are not shared with others. pdfAnnotation K.NI.C.01
    • 1.NI.C.01 Recognize what passwords are, why they are used, and why they are not shared. pdfAnnotation 1.NI.C.01
    • 2.NI.C.01  Identify differences between strong and weak passwords and explain the importance of choosing strong passwords to protect devices and information from unauthorized users. pdfAnnotation 2.NI.C.01
    • 3.NI.C.01  Discuss basic issues that relate to responsible use of computing devices and describe consequences of inappropriate use in a variety of locations. pdfAnnotation 3.NI.C.01
    • 4.NI.C.01  Identify problems that relate to unsecure networks and inappropriate use of computing devices and potential subsequent consequences. pdfAnnotation 4.NI.C.01
    • 5.NI.C.01 Define personal identifiable information (e.g., digital footprint) and why it should be protected as related to real-world cyber security problems. pdfAnnotation 5.NI.C.01.pdf
  • Cybersecurity (2) 
    • Not addressed at grades K-4
    • 5.NI.C.02 Discuss real-world cybersecurity problems and explain how personal information can be protected (e.g., antivirus software, backing up data, strong passwords). pdfAnnotation5.NI.C.02.pdf


Return to top of the page

Return to Explore Annotations page


Dianne O'Grady-Cunniff, dogrady at usmd dot edu
Director, Maryland Center for Computing Education

Dr. Megean Garvin, mgarvin at usmd dot edu
Director of Research, Maryland Center for Computing Education

     ECEP Logo 2 Web        CSFORALL Logo Web        CSTALogo Web

Maryland Center for Computing Education
3300 Metzerott Rd. Adelphi, MD 20783
MCCE received initial support from the National Science Foundation, (MSP)2 Grant No. 0831970.