Explore Annotations for CS Concept
Networks and the Internet
Return to Explore Annotations page
Network Communication and Organization
K.NI.NCO.01 Recognize that basic computing devices and components can be connected to one another. Annotation K.NI.NCO.01
1.NI.NCO.01 Recognize that computing devices can be connected through physical or wireless pathways. Annotation 1.NI.NCO.01
2.NI.NCO.01 Recognize that by connecting computing devices together they can share information (e.g., printers, scanners, internet, display devices). Annotation 2.NI.NCO.01
3.NI.NCO.01 Recognize how information is sent and received over physical and wireless pathways. Annotation 3.NI.NCO.01
4.NI.NCO.01 Summarize how information is sent and received over physical and wireless pathways (e.g., information is deconstructed in smaller pieces called packets, transmitted to final destination, and reassembled). Annotation 4.NI.NCO.01
5.NI.NCO.01 Model how information is deconstructed into packets (smaller pieces), transmitted through multiple devices over the internet and networks, and reassembled at the final destination. Annotation 05.NI.NCO.01
Cybersecurity (1)
K.NI.C.01 Identify and use passwords and discuss why they are not shared with others. Annotation K.NI.C.01
1.NI.C.01 Recognize what passwords are, why they are used, and why they are not shared. Annotation 1.NI.C.01
2.NI.C.01 Identify differences between strong and weak passwords and explain the importance of choosing strong passwords to protect devices and information from unauthorized users. Annotation 2.NI.C.01
3.NI.C.01 Discuss basic issues that relate to responsible use of computing devices and describe consequences of inappropriate use in a variety of locations. Annotation 3.NI.C.01
4.NI.C.01 Identify problems that relate to unsecure networks and inappropriate use of computing devices and potential subsequent consequences. Annotation 4.NI.C.01
5.NI.C.01 Define personal identifiable information (e.g., digital footprint) and why it should be protected as related to real-world cyber security problems. Annotation 5.NI.C.01.pdf
Cybersecurity (2)
Not addressed at grades K-4
5.NI.C.02 Discuss real-world cybersecurity problems and explain how personal information can be protected (e.g., antivirus software, backing up data, strong passwords). Annotation5.NI.C.02.pdf