In this lesson, students will have a high level discussion about what the internet is and how the internet works. The topics of anonymity and censorship will also be discussed.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
When was the first computer made? What did it look like, and what was it used for? In this lesson, students will explore the creation and evolution of computing machines that now permeate our day-to-day life.
Students will be able to:
How are computers organized? What are the main components of a computer?
In this lesson, we will explore how different organizational structures of computers interact with each other to make computers functional.
Students will be able to:
What kinds of software do computers use and need?
In this lesson, the topic of software is broken down into types of software, how they interact, and the specific functions of the different types of software.
Students will be able to:
In this lesson, students will explore the hardware that makes up the internet and the characteristics of that hardware that define our experience on the internet.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
In this lesson, students will explore the DNS system and how it maps human readable domain names into actual accessible IP addresses.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
In this lesson, students explore how messages get from one address on the internet to another.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
In this lesson, students learn about the last piece of the puzzle for how the Internet works: Packets and Protocols. All information sent over the internet is broken down into small groups of bits called packets. The format for creating and reading packets is defined by open protocols so that all devices can read packets from all other devices.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
In this lesson, students will learn what a number system is, the difference between the decimal number system and the binary number system, and how to convert between decimal and binary.
Students will be able to:
In this lesson, students will learn what a number system is, the difference between the decimal number system and the binary number system, and how to convert between decimal and binary.
Students will be able to :
In this lesson, students are presented with different ways that the Internet impacts their lives. The Internet affects the way that people communicate (emails, social media, video chat) and collaborate to solve problems. It has revolutionized the way that people can learn and even buy things. Because the Internet is present in almost every facet of people’s lives, there are severe ethical and legal concerns that derive from the Internet.
Students will be able to:
This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…
This lesson is a summative assessment of the unit’s learning objectives.
Assess student achievement of the learning goals of the unit
In this lesson, students learn how to use the command line interface to interact with files and folders, and access information about computer processes.
Students will be able to:
In this lesson, students will learn about different CLI commands and tools that will provide network information. Students will also take a look at network connection logs to determine the legitimacy of specific login attempts.
Students will be able to: