Explore Annotations for CS Concept

Networks and the Internet

 

 

Return to Explore Annotations page

  • Network Communication and Organization

    • K.NI.NCO.01 Recognize that basic computing devices and components can be connected to one another. Annotation K.NI.NCO.01

    • 1.NI.NCO.01 Recognize that computing devices can be connected through physical or wireless pathways. Annotation 1.NI.NCO.01

    • 2.NI.NCO.01  Recognize that by connecting computing devices together they can share information (e.g., printers, scanners, internet, display devices). Annotation 2.NI.NCO.01

    • 3.NI.NCO.01  Recognize how information is sent and received over physical and wireless pathways. Annotation 3.NI.NCO.01

    • 4.NI.NCO.01  Summarize how information is sent and received over physical and wireless pathways (e.g., information is deconstructed in smaller pieces called packets, transmitted to final destination, and reassembled). Annotation 4.NI.NCO.01

    • 5.NI.NCO.01 Model how information is deconstructed into packets (smaller pieces), transmitted through multiple devices over the internet and networks, and reassembled at the final destination. Annotation 5.NI.NCO.01

    • 6.NI.NCO.01 Model a simple protocol for transferring information, using packets, across networks and the internet. Annotation 6.NI.NCO.01

    • 7. NI.NCO.01 Explain and model the process to replace lost packets using a protocol for information transfer. Annotation 7.NI.NCO.01

    • 8. NI.NCO.01 Model and explain how data is sent using protocols to choose the fastest pathway, to deal with missing information, and to deliver data securely. Annotation 8.NI.NCO.01

  • Cybersecurity (1)

    • K.NI.C.01 Identify and use passwords and discuss why they are not shared with others. Annotation K.NI.C.01

    • 1.NI.C.01 Recognize what passwords are, why they are used, and why they are not shared. Annotation 1.NI.C.01

    • 2.NI.C.01  Identify differences between strong and weak passwords and explain the importance of choosing strong passwords to protect devices and information from unauthorized users. Annotation 2.NI.C.01

    • 3.NI.C.01  Discuss basic issues that relate to responsible use of computing devices and describe consequences of inappropriate use in a variety of locations. Annotation 3.NI.C.01

    • 4.NI.C.01  Identify problems that relate to unsecure networks and inappropriate use of computing devices and potential subsequent consequences. Annotation 4.NI.C.01

    • 5.NI.C.01 Define personal identifiable information (e.g., digital footprint) and why it should be protected as related to real-world cyber security problems. Annotation 5.NI.C.01

    • 6.NI.C.01 Identify existing cybersecurity concerns with the internet, its connected devices (i.e. IoT) and the systems it uses. Annotation 6.NI.C.01

    • 7.NI.C.01 Explain how to protect electronic information using both physical and digital measures; explain existing cybersecurity concerns with the internet and the systems it uses. Annotation 7.NI.C.01

    • 8.NI.C.01 Evaluate physical and digital security measures that have been developed and implemented to protect electronic information; discuss the impacts of hacking, ransomware, scams, and ethical/legal concerns. Annotation 8.NI.C.01

  • Cybersecurity (2) 

    • Not addressed at grades K-4 or 6-8.

    • 5.NI.C.02 Discuss real-world cybersecurity problems and explain how personal information can be protected (e.g., antivirus software, backing up data, strong passwords). Annotation5.NI.C.02.pdf

 

Return to Explore Annotations page