CS Principles 2020-2021

Standards Alignment


Download as CSV

Unit 2 - The Internet

Lesson 1: Welcome to the Internet

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 2-NI-04 - Model the role of protocols in transmitting data across networks and the Internet.
  • 3A-NI-04 - Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  • 3B-NI-03 - Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).

Lesson 2: Building a Network

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 2-NI-04 - Model the role of protocols in transmitting data across networks and the Internet.
  • 3A-NI-04 - Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  • 3B-NI-03 - Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).

CSP2021

CSN-1 - Computer systems and networks facilitate how data is transferred
CSN-1.A - Explain how computing devices work together in a network.
  • CSN-1.A.1 - A computing device is a physical artifact that can run a program. Some examples include computers, tablets, servers, routers, and smart sensors.
  • CSN-1.A.2 - A computing system is a group of computing devices and programs working together for a common purpose.
  • CSN-1.A.3 - A computer network is a group of interconnected computing devices capable of sending or receiving data.
  • CSN-1.A.4 - A computer network is a type of a computing system.
  • CSN-1.A.5 - A path between two computing devices on a computer network (a sender and a receiver) is a sequence of directly connected computing devices that begins at the sender and ends at the receiver.
  • CSN-1.A.6 - Routing is the process of finding a path from sender to receiver.
  • CSN-1.A.7 - The bandwidth of a computer network is the maximum amount of data that can be sent in a fixed amount of time.
  • CSN-1.A.8 - Bandwidth is usually measured in bits per second.

Lesson 3: The Need for Addressing

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 2-NI-04 - Model the role of protocols in transmitting data across networks and the Internet.
  • 3A-NI-04 - Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.

CSP2021

CSN-1 - Computer systems and networks facilitate how data is transferred
CSN-1.B - Explain how the Internet works.
  • CSN-1.B.1 - The Internet is a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
  • CSN-1.B.2 - Access to the Internet depends on the ability to connect a computing device to an Internet-connected device.
  • CSN-1.B.3 - A protocol is an agreed-upon set of rules that specify the behavior of a system.
  • CSN-1.B.4 - The protocols used in the Internet are open, which allows users to easily connect additional computing devices to the Internet.

Lesson 4: Routers and Redundancy

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 2-NI-04 - Model the role of protocols in transmitting data across networks and the Internet.
  • 3A-NI-04 - Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  • 3B-NI-03 - Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).

CSP2021

CSN-1 - Computer systems and networks facilitate how data is transferred
CSN-1.B - Explain how the Internet works.
  • CSN-1.B.5 - Routing on the Internet is usually dynamic; it is not specified in advance.
CSN-1.E - For fault-tolerant systems, like the Internet: a. Describe the benefits of fault-tolerance b. Explain how a given system is fault-tolerant c. Identify vulnerabilities in a system.
  • CSN-1.E.1 - The Internet has been engineered to be fault-tolerant, with abstractions for routing and transmitting data.
  • CSN-1.E.2 - Redundancy is the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
  • CSN-1.E.3 - One way to accomplish network redundancy is by having more than one path between any two connected devices.
  • CSN-1.E.4 - If a particular device or connection on the Internet fails, subsequent data will be sent via a different route, if possible.
  • CSN-1.E.5 - When a system can support failures and still continue to function, it is called fault-tolerant. This is important because elements of complex systems fail at unexpected times, often in groups, and fault tolerance allows users to continue to use the networ
  • CSN-1.E.6 - Redundancy within a system often requires additional resources but can provide the benefit of fault tolerance.
  • CSN-1.E.7 - The redundancy of routing options between two points increases the reliability of the Internet and helps it scale to more devices and more people.

Lesson 5: Packets

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 2-NI-04 - Model the role of protocols in transmitting data across networks and the Internet.
  • 3A-NI-04 - Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  • 3B-NI-03 - Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).

CSP2021

CSN-1 - Computer systems and networks facilitate how data is transferred
CSN-1.B - Explain how the Internet works.
  • CSN-1.B.5 - Routing on the Internet is usually dynamic; it is not specified in advance.
  • CSN-1.B.6 - The scalability of a system is the capacity for the system to change in size and scale to meet new demands.
CSN-1.C - Explain how data is sent through the Internet via packets.
  • CSN-1.C.1 - Information is passed through the Internet as a data stream. Data streams contain chunks of data, which are encapsulated in packets.
  • CSN-1.C.2 - Packets contain a chunk of data and metadata used for routing the packet between the origin and the destination on the Internet, as well as for data reassembly.
  • CSN-1.C.3 - Packets may arrive at the destination in order, out of order, or not at all.
  • CSN-1.C.4 - IP, TCP, and UDP are common protocols used on the Internet.

Lesson 6: HTTP and DNS

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 2-NI-04 - Model the role of protocols in transmitting data across networks and the Internet.
  • 3A-NI-04 - Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  • 3B-NI-03 - Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).

CSP2021

CSN-1 - Computer systems and networks facilitate how data is transferred
CSN-1.B - Explain how the Internet works.
  • CSN-1.B.7 - The Internet was designed to be scalable.
CSN-1.D - Describe the differences between the Internet and the World Wide Web.
  • CSN-1.D.1 - The World Wide Web is a system of linked pages, programs, and files.
  • CSN-1.D.2 - HTTP is a protocol used by the World Wide Web.
  • CSN-1.D.3 - The World Wide Web uses the Internet.
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
  • IOC-2.B.6 - Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model .

Lesson 7: Project - Internet Dilemmas Part 1

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-28 - Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  • 3A-IC-30 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  • 3B-IC-26 - Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  • 3B-IC-28 - Debate laws and regulations that impact the development and use of software.

CSP2021

IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.C - Describe issues that contribute to the digital divide.
  • IOC-1.C.1 - Internet access varies between socioeconomic, geographic, and demographic characteristics, as well as between countries.
  • IOC-1.C.2 - The “digital divide” refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
  • IOC-1.C.3 - The digital divide can affect both groups and individuals.
  • IOC-1.C.4 - The digital divide raises issues of equity, access, and influence, both globally and locally.
  • IOC-1.C.5 - The digital divide is affected by the actions of individuals, organizations, and governments.
IOC-1.F - Explain how the use of computing could raise legal and ethical concerns.
  • IOC-1.F.10 - The digital divide raises ethical concerns around computing.

Lesson 8: Project - Internet Dilemmas Part 2

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-28 - Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  • 3A-IC-30 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  • 3B-IC-26 - Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  • 3B-IC-28 - Debate laws and regulations that impact the development and use of software.

CSP2021

IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.C - Describe issues that contribute to the digital divide.
  • IOC-1.C.4 - The digital divide raises issues of equity, access, and influence, both globally and locally.
  • IOC-1.C.5 - The digital divide is affected by the actions of individuals, organizations, and governments.
IOC-1.F - Explain how the use of computing could raise legal and ethical concerns.
  • IOC-1.F.10 - The digital divide raises ethical concerns around computing.

Lesson 9: Assessment Day