Explore Annotations for CS Concept

Networks and the Internet

 

 

Return to Explore Annotations page

  • Network Communication and Organization

    • K.NI.NCO.01 Recognize that basic computing devices and components can be connected to one another. Annotation K.NI.NCO.01

    • 1.NI.NCO.01 Recognize that computing devices can be connected through physical or wireless pathways. Annotation 1.NI.NCO.01

    • 2.NI.NCO.01  Recognize that by connecting computing devices together they can share information (e.g., printers, scanners, internet, display devices). Annotation 2.NI.NCO.01

    • 3.NI.NCO.01  Recognize how information is sent and received over physical and wireless pathways. Annotation 3.NI.NCO.01

    • 4.NI.NCO.01  Summarize how information is sent and received over physical and wireless pathways (e.g., information is deconstructed in smaller pieces called packets, transmitted to final destination, and reassembled). Annotation 4.NI.NCO.01

    • 5.NI.NCO.01 Model how information is deconstructed into packets (smaller pieces), transmitted through multiple devices over the internet and networks, and reassembled at the final destination. Annotation 05.NI.NCO.01

  • Cybersecurity (1)

    • K.NI.C.01 Identify and use passwords and discuss why they are not shared with others. Annotation K.NI.C.01

    • 1.NI.C.01 Recognize what passwords are, why they are used, and why they are not shared. Annotation 1.NI.C.01

    • 2.NI.C.01  Identify differences between strong and weak passwords and explain the importance of choosing strong passwords to protect devices and information from unauthorized users. Annotation 2.NI.C.01

    • 3.NI.C.01  Discuss basic issues that relate to responsible use of computing devices and describe consequences of inappropriate use in a variety of locations. Annotation 3.NI.C.01

    • 4.NI.C.01  Identify problems that relate to unsecure networks and inappropriate use of computing devices and potential subsequent consequences. Annotation 4.NI.C.01

    • 5.NI.C.01 Define personal identifiable information (e.g., digital footprint) and why it should be protected as related to real-world cyber security problems. Annotation 5.NI.C.01.pdf

  • Cybersecurity (2) 

    • Not addressed at grades K-4

    • 5.NI.C.02 Discuss real-world cybersecurity problems and explain how personal information can be protected (e.g., antivirus software, backing up data, strong passwords). Annotation5.NI.C.02.pdf

 

Return to Explore Annotations page