Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Summary
In this lesson, students will analyze what the Internet is and its basic functionality. Students will learn how the Internet works and how the implementation of the Internet has affected our society. They will discuss the idea of the Internet as a delivery service to get bits from one place to another.
For homework students, should have read and made brief notes on the following sections from the "Blown to Bits" book (Online book link: http://www.bitsbook.com/wp-content/uploads/2008/12/B2B_3.pdf):
These sections are on pages 91-92 & 301-303 in the pdf version.
The Internet and the systems built on it have a profound impact on society.
The Internet has many layers and was designed to be fault tolerant with redundant features.
Outcomes
Student computer usage for this lesson is: required
Blown to Bits (Abelson, Ledeen, Lewis): http://www.bitsbook.com/
Optional Student Handout: Internet Change Student Handout
Answer Key for Teacher: Internet Change Answer Key
The following links provide background on the topics covered in this lesson:
Ask: How does the Internet work?
Journal: Define
Share student responses and develop class definitions.
Compare student responses to the following.
Say: How did the internet and web browsers come about? The internet wasn't originally intended for everyone. Originally it was a tool for scientists to communicate.
Show how the Internet has grown from the small ARPANET system to what it is today.
Show the video Who Invented the Internet and Why through 4:49.
Ask: How is all this interesting and valuable information represented?
Answer: binary.
Lead students to develop the concept that lower-level abstractions can be combined to make higher-level abstractions such as texting (SMS), email, images, sound or video. (ie: one byte can represent one note, put notes together to make a soundtrack. 6 bytes make 1 color pixel. Put pixels together to make a picture. Put sound and pictures together to make a video)
Ask: who and what was theWorld Wide Web was originally intended for?
Answer: only for rapid and easy exchange of information within the scientific community.
Point out how, like many innovations, it grew beyond the original vision, but because of the limited view of its use in the beginning, there were serious holes in the security design of the system. Other design features, like scalability, have served the system well over many years.
Ask: How is information retrieved on the Internet?
Answer: Web browsers make requests for image, sound, web page and other files using the http or https protocols.
Requested files are broken into smaller pieces and the transmission of these pieces is done following the TCP/IP protocol.
Discuss the following sections from pages 301-303 in the "Blown to Bits" book. (Online book link: http://www.bitsbook.com/wp-content/uploads/2008/12/B2B_3.pdf):
In this activity, students will each share one thing they have learned from this lesson. This can be done in several ways depending on time constraints or disabilities. All students should participate in some way before leaving the classroom.
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
ASCII is a character-encoding scheme that uses ...
Consider the following numbers. Binary 1100Deci...
Using a real-time network tool that measures the number of views per minute, students generate a question that can be answered using this tool. They will then collect the data and write a report that answers this question. The report should use current real-time screenshots for data and examples. (Note: Students can possibly start this assignment in class, but will likely need to complete as homework.)
Possible question(s) to use for a future test:
Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Summary
The Internet is growing to connect to everything we do in our lives. Over the years, it has grown from being a representation of static content to web 2.0: a place where users interact with a collection of users and "things." In this lesson, the students will conceptualize devices that collect data and send it through the Internet.
The Internet is an ever-evolving system of increasing complexity. It has evolved from representing static information to providing interactivity of data between users and objects (things).
Outcomes
Student computer usage for this lesson is: optional
Students need access to paper for documentation.
Blown to Bits (Abelson, Ledeen, Lewis). Text is free as pdf: http://www.bitsbook.com/
Access to Internet connectivty for these links/videos:
In the Lesson Resources Folder:
Say: Devices connected to the Internet collect data. Sometimes those devices and the programs that store and process the data can have applications that the developers did not intend and may be very significant. For instance, consider this video from CNN about an app called Strava. https://www.cnn.com/2018/01/28/politics/strava-military-bases-location/index.html Play the video.(2:12). Have a brief discussion using the following questions as prompts.
Say: Data collection is not just from devices people knowingly use but increasingly from things connected to the internet they may not be aware of. Many computing innovations affect people in ways that were not anticipated.
Show the video (no audio except music) on how an average everyday person uses objects connected to the Internet in our current society: https://www.youtube.com/watch?v=ZgWbWCv0J5E (3:58)
Summary: A day in the life of the Internet of things shows these things connected to the Internet: cell phone, thermostat in the house, car entry system and radio, car GPS intelligently looking for available parking, parking sensors on the ground using mesh networking (short-range connections to a larger deployment system in a central box), a heart rate monitor with results that can be viewed online in real-time, a watch that connects with a cash register/inventory system, a package pickup system that connects with a drone to take the package directly to the customer.
Say: The data collected today is too large to be processed by people. Two strategies used to analyze large amounts of data are called data mining and artificial intelligence. While both tools regularly find useful results - useful in science and in business - the information obtained may result, in adverse decisions made against individuals or groups.
Students read the May 21, 2019 Guardian article, Facial recognition will soon be everywhere. Are we prepared? (https://www.theguardian.com/commentisfree/2019/may/21/facial-recognition-privacy-prepared-regulation). As students read, have them prepare to respond to the following prompts.
Say: Originally people generated the traffic on the internet. In the future, the vast majority of traffic on the internet will be generated by things.
Show this video about how data is generated by devices connected online:
Ask students if there were any objects that they did not think about earlier that are connected to the Internet. Adjust the list as needed. Analyze which devices would continue to be a high priority or useful if the ability to communicate on the Internet was suddenly diminished by an event like a hurricane or earthquake.
Journal. Pair and share.
With a partner, imagine a device that might someday be a part of the "Internet of Things," but currently does not exist. An example might be a shoe that has its own wireless acquired IP address and keeps track of how many steps one takes each day. (Note: This may already exist.)
As a small group, the students should create a document answering the following questions:
This document should also include a sketch of the device.
Students display a thumbs up or thumbs down to this question: Did this lesson help you comprehend the concept of the Internet as an entity that is comprised of both people (users) and objects or machines?
Read Blown to Bits (Pg 303 - 306) - IP Addresses - stop at "The Key to It All: Passing Packets."
Say: Today we will think about the future of the internet. The internet was designed to be scalable or to be adaptable to serve increasing demands. This ability to adapt to meet increases in demand, or scalability, was a design goal of the original internet. It was not part of the internet's original design to serve commercial needs.
Ask students to respond to these questions about how commercial needs have impacted them.
Say: Revenue from advertising is used to pay many of the expenses for content and services delivered by the internet. Businesses use data they collect about individuals to put them in a group and to target them for ads. Individuals and businesses both can benefit from seeing advertisements that most interest them.
Ask: Think about how individuals and groups could be harmed by the targeting of ads. Have a brief discussion about the possible harms. Be sure to address the three bullet points below.
Students create a story to summarize what they have learned about what the internet is and what they expect it to become in the future. The summary should include what impact the internet has already had, what impacts they think it might be intended to have in the future and what unintended impacts it might have.
Say: As you think about the future of the internet remember that the protocols it uses are open to everyone so technologies not yet developed can be adapted to use them. In this project, you are asked to envision what one of these technologies might be.
Students may present the story in written or other formats.
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
Two computers are built by different manufactur...
Which of the following best explains what happens
Using the document in the Lesson Resources folder called "Commercial Python Project", assign students the project to explore more about the "Internet of Things" and think about what the future of the "Internet of Things" might be. In the project, students consider creating their own product commercial template. Consider adding the requirement that their program includes conditional statements. Extra time will be needed.
The rubric for this project can also be found in the Lesson Resources Folder
Ask students to think about and document how their selected device may have an impact on our daily lives. Could their be any controversy associated with their device or the use of their device? If so, what is that controversy? Students should document their opinions and/or findings.
When selecting the pairs, aim for diversity of background, so the students learn how others view technology.
With a partner, imagine a device that might someday be part of the Internet of Things, but currently does not exist.
As a group, the students should submit a document answering the following questions:
This document should also include a sketch of the device.
How does the Internet effectively connect devices and networks?
How do devices and networks that make up the Internet communicate?
Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Summary
This lesson delves deeper into the structure of the Internet and routing protocols. Students will explore the necessity of redundancy by using packets to transmit sections of data. They will then discuss standards for packets and routing. The class will simulate a network in which each student is a node through which they will send email packages from one node to another.
Outcomes
Overview
Students will be able to:
Student computer usage for this lesson is: none
1. Materials required
2. Copies to make
3. Digital resources (check for access)
4. Required background knowledge
Prompt students to respond in their journals to one or more of these questions:
Discussion: Invite students to share their journal entries. The class should come to the general consensus that while their computer doesn’t know where to find everything on the Internet, it is able to pass information or requests from one location to another.
Transition Remark: Previously, we looked at the general structure of the Internet and how it works. Today, we will look more closely at the process of sending information between two locations using the Internet. Let's see what this looks like through a video(Code.org packets) or World of Science video. (After video) We are going to simulate this same action by sending packets of information to each other without leaving our seats.
Introduction:
Transition Remark: Our simulation of the protocol system on the Internet has been relatively tame. In reality, it doesn’t always work this nicely. Sometimes packets are lost; not all the information you want to transmit fits in one packet; or some routers are unable to keep working. Fortunately, the Internet is full of redundancy that allows it to keep working even if some parts fail to work, and we can send large data sets through multiple packets. We’re going to run our simulation again, but this time living in the "real world."
Discussion: How does redundancy of routers contribute to Internet fault tolerance?
Transition Remark: We just participated in a simulation that allowed us to become nodes within the Internet. By filling out the back side of your IP worksheet, each of you was essentially becoming a router. Each routers contains a configuration table with information that it can use to send packets to the correct location.
Discussion:
Conclusion: This information should be written in the student's journal.
Reflection: This may be completed as an exit ticket for formative assessment or in student journals.
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
A user enters a Web address in a browser, and a...
What is the minimum number of connections that ...
Assessment will occur informally through the discussion questions:
Reflection questions for journal:
Assessment Questions:
Explain the role of the Internet Protocol address for each device on the Internet.
Why is the assignment of an IP address critical to connecting a device to the Internet?
How does Internet router redundancy contribute to Internet fault tolerance?
How does redundancy of routers contribute to the Internet's ability to scale to more connections?
Explain how relatively small packets are used to transmit large files on the Internet and identify what information each packet must possess.
Identify a standard protocol for Internet packet communication.
Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Pre-lesson Preparation
Students must complete the pre-reading assignment: Blown to Bits (pages 303 - 306 in the PDF). They should read the sections about DNS, Protocols, and IP Addresses.
Summary
The purpose of the Domain Name System is to resolve domain names to IP address for computers on the Internet.
For the next two lessons, students will investigate the workings of the Domain Name System (DNS). They will then design and enact a simulation of DNS. Students will use their simulation to request and receive web pages, implement DNS caching, and investigate DNS poisoning.
Outcomes
Overview
Session 1 - Introduce DNS
Session 2 - Create DNS Improvisation
Students describe characteristics of the Internet that influence the systems built on it.
Students explain how computers can be used to get a web page from a new web server.
Students work as part of a collaborative group using effective communication to accomplish a task.
Student computer usage for this lesson is: required
Blown to Bits (either electronic or hard copy)
Access to the Internet for these sites:
Excel or similar software
"DNSWorksheet" document and "Favorite Domains (Sample List)" spreadsheet in lesson resources folder
Addtional Resources
https://studio.code.org/s/netsim Code Studio Internet Simulator
Student friendly explanation of DNS https://studio.code.org/s/netsim
Version 1 - If students have access to the system console window, use it to complete the following steps.
Directions for Host Configuration and DNS in Action Using the Console Window:
Version 2 - If the Console is blocked for your students, you can still demonstrate most of the console commands on your computer. If it is blocked for you as well, use a web site such as http://pingtool.org and the prompts below.
Note: If the Console is blocked, students will need a way to obtain unique IP addresses. A document named "DHCP Simulator" (in the lesson folder) contains 30 unique IP formatted addresses. Print and cut out the blocks and allow a student dubbed DHCP to give them out at random.
Directions for Host Configuration and DNS in Action Activity Without the Console Window:
During the investigation, students should answer the following questions in their journal:
Journal Questions for Version 1:
Students should attempt to answer these questions based on the previous activity:
Suggested Answers
Journal Questions for Version 2:
Students should attempt to answer these questions based on the previous activity:
Have students pick one or more of the following questions to answer in their journals:
Put the following list of DNS and other devices on the board. As a class, students are to create a diagram of the way devices 1 – 5 interact to resolve domain names (similar to the last picture in the overview.) Have students draw the picture on the board and agree that it is correct before they write it in their journals.
Getting Started/Introducing Activity (5 min)
The teacher will explain the following activity to the students:
Show DNS explained (https://www.youtube.com/watch?v=72snZctFFtA) 3:20 - 5:39.
Teachers will explain that the Internet is much bigger than the Web, but for our simulation purposes, we will only be trying to access web pages from web servers.
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
According to the domain name system (DNS), whic...
What is the minimum number of connections that ...
Which of the following is a characteristic of the
When pairing up students in "Think - Pair - Share," use a random generator such as random.org (use list tool) to randomly pair students.
Students create a list of things in their lives that are identified by unique numbers.
1. End to End Architecture 6.1.1B
A. Describe the “end to end” architecture of the Internet.
B. Explain how the “end to end” architecture facilitates connection of new devices.
2. Internet Names and Address Rules 6.1.1 E
A. Describe how computers are uniquely identified and connected on the Internet.
3. DNS Function 6.1.1 G
A. Briefly explain the primary use of the Domain Name System made by users of the Internet.
4. DNS Hierarchy 6.2.1 B
A. Describe the hierarchy of the Domain Name System.
Unit 3. Information and the Internet
Revision Date: Jan 04, 2020 (Version 3.0)Pre-lesson Preparation
This lesson will require some room setup or prep for best delivery of instruction. Some of the setup should have been done in the previous lesson.
Summary
In this lesson, students will expand their knowledge of how the Domain Name System (DNS) works by acting as a class to simulate the use of DNS to retrieve web pages.
Once the simulation is functioning students enhance its efficiency through the use of caching.
Poison the DNS cache by adding false DNS replies (DNS poisoning).
Students discuss with their groups how DNS works and how it supports Internet growth.
Then they explain in their journals how:
DNS works
Caching is both a benefit and a security risk.
DNS supports Internet growth.
In this lesson, students will expand their knowledge of how DNS works by acting out a simulation of DNS in action and using it to retrieve web pages. This is a two-session lesson. The first session is for students to get the simulation functioning, with the teacher serving as director. As students realize they need to "fix" their implementation of the simulation (modify their scripts), they record the insights in their journals.
In Session Two, students take on different roles and conduct a dress rehearsal that is entirely student-led. Teachers then introduce DNS caching and DNS poisoning. Once the simulation is functioning, students will address both increased efficiency due to DNS caching, and cybersecurity concerns associated with DNS.
Outcomes
Overview
Session 1 - Acting the Simulation
Session 2 - Round 2 of Simulations
The characteristics of the Internet influence the systems built on it.
Domain Name Servers are essentially the "address book" of the Internet and store information to help Internet systems route transmission requests and replies.
A list of character protocols is provided as a resource. These may help students learn their roles.
Student computer usage for this lesson is: required
This lesson requires extensive preparation.
Acquire:
24 envelopes per class – one or two per host per rehearsal and production.
Post-it Notes
One color for students to use to self-select roles.
One color for students to use to record DNS information.
One color for students to use to initiate requests.
Print:
One copy of character protocols for each student.
One copy of Routing Table.docx for each student router.
One copy of DNS cache for each root, TLD, ANS and local DNS server and each host.
Four copies of each device/character role page (web, router, root, TLD, ANS and local DNS and host).
Three or four copies of the first page web page, grouped by domain.
Warm Up:
Distribute post-it notes to each student.
Casting Characters:
Beside each device listed on the board, there should be the number of students needed to play each role. As soon as students complete their post it notes, have them choose their role by placing the post it notes next to the device name.
Below are suggested numbers of actors per role for two class sizes. Students take their seats and add their name and IP address to their router table.
Device List |
16 Students |
30 students |
Host |
4 |
8 |
Local DNS |
2 |
4 |
Root |
1 |
1 |
Top Level Domain |
2 |
3 |
Authoritative Name |
4 |
6 |
Web Server |
4 |
6 |
Router |
1 |
2 |
Once students select a role, each device group should meet briefly to discuss what information they have to collect from the post-it notes on the board. They will go and obtain either a script that informs them what to do during the play, (how their device works) or all the printed web pages from their server.
Gathering Data:
Post this list of directions and allow devices to go to the board and obtain the required IP address information.
Before the play can start, these seven sets of data still have to be collected.
Notes:
Steps to complete the play:
Explain: Both domain names rules name and IP address rules have changed over time.
Have students watch these two videos:
Afterwards, they should record responses to these two prompts:
Set the stage:
Distribute scripts, envelopes, and post-it notes.
Note: Use the character protocols from the previous session during the dress rehearsal, especially if the students are struggling.
This play is improvisational with Hosts requesting whichever pages they want. Restart the system with all Hosts online.
Introduce the security problems associated with plain text messages and with DNS poisoning:
Students will research this topic and report on security issues (among other aspects of DNS) in their summary report.
If the previous lesson has not been assessed, assign the entire summary in the document entitled "DNS Summary."
The simulation will be acted out at least three times. Students should change to a new role each time.
Use the character protocols during the dress rehearsal.
Students are to reopen their spreadsheets from the previous lesson.
Show the students how to create a simple "if statement" in a spreadsheet. The spreadsheet will become a tool where a user can type a domain name into a cell. If the respective IP address of that domain name is found, then that IP address is shown. If it is not then a "0" appears.
(See the sample spreadsheet in the Lesson Resources folder called "Sample Spreadsheet")
A. Describe one rule change for names used on the Internet. Describe the rule before and after the change.
B. Describe one rule change for IP addresses used on the Internet. Describe the rule before and after the change.
C. Describe briefly the process by which the Domain Name System operates.
D. Briefly describe one way the Domain Name System was not designed to be completely secure.
E. Briefly describe one security concern and one coping strategy for the Domain Name System insecurity.
Unit 3. Information and the Internet
Revision Date: Jan 04, 2020 (Version 3.0)Summary
This lesson investigates how the world wide web and search engines work. Concepts of browsers and servers as well as he spiders that crawl the web in search of valuable information, the data farms that store the data, and the processes used to organize current and historical data. The search process starts before you ever type a query, by crawling and indexing trillions of documents. Students will create a concept map illustrating their understanding of the operations of a search engine. A concept map is an artifact that could be created as part of the Explore Performance Task at the end of Unit 3.
Outcomes
Students will be able to:
Overview
Source
The slides for the guided exploration of search methods were adapted from slides provided by Marie desJardins at the University of Maryland, Baltimore County.
Students will understand how the world wide web is structured and operates.
Students will understand the many processes that are required for an effective search engine.
Students will create diagrams and concept maps, do some investigations and discuss how search engines work, and then will individually use a computational tool to create an online diagram illustrating their understanding.
Student computer usage for this lesson is: required
Students should journal on the following question:
"How many searches do you think are done each day using the Google search engine?"
Pair and share, then show this amazing live counter of internet searches: http://www.internetlivestats.com/google-search-statistics/
Use the slide presentation "About Search Engines" (in Lesson Resources folder) to direct students through this lesson.
Jigsaw into third’s and assign each third one of the following tasks. Have students answer their assigned question based on the reading.
Read paragraphs 1 and 2 of Understanding Browser Tracking by Goodwill Community Foundation, Inc. What have you used online recently that is keeping a record – tacking – your usage?
Read paragraphs 1 and 2 of Locational Privacy – Issues by Electronic Privacy Information Center. What devices or systems are tracking your or your family’s location?
Read paragraphs 1 and 2 of HOW COMPANIES USE PERSONAL DATA AGAINST PEOPLE section 2.4 Key developments in recent years. How do companies individually identify us?
Share responses to each question with the class.
Describe at least three differences between the internet and the world wide web and identify which is searched by search enginges like Google or Bing.
Have students create a concept map of ideas relating to search engines, doing additional research to round out their understanding. (See Teacher Resources for online tools that can be used to create concept maps.)
Share ideas from the students' concept maps. Point out that the concept map (if done online) is an artifact that was created using a computer to present information visually.
Optional Extension: (for fast moving classes who need more to do)
Google tracks everything that everyone queries. (Is this an invasion of your privacy?) The results are fascinating.
Look at www.google.com/trends. You can look at trends by region and limit them to a date and/or place. For example search for “Obama, McCain” limiting your search to 2008, and the United States. What conclusions do you draw?
Pick another topic of interest to explore in Google trends to reveal society’s interests.
Students can create diagrams and concept maps on paper by hand if that is helpful.
Be sure to assign roles to pairs when working together. Don't allow one partner to be passive while the other is active.
Students create a concept map of what they learned with additional research on the topic.
Students will develop a visual diagram of the processes involved in indexing the Internet by a search engine.
Unit 3. Information and the Internet
Revision Date: Jan 12, 2020 (Version 3.0)Summary
This lesson has two main objectives.
The first focuses on search engine algorithms and the impact search engines have on our lives. Search engine page rank algorithms rely on many factors to predict what someone is looking for. The business advantage of appearing on the front page of a Google search is tremendous. However, as more information is tracked about our interests and preferences in order to customize the results of our searches, we have to ask whether or not the loss of privacy is worth the results.
The second objective is to introduce students to creating a visual artifact (knowledge required for performance tasks). Students will research a page ranking subtopic, prepare a one minute speech, and (if possible) create a video to accompany the speech.
Outcomes
Session Two
Students will understand that the page rank algorithm depends on many factors, has changed over time, and has a large impact on the traffic that a site gets.
Students will give examples of how their activity online is tracked and how the knowledge of them is used to taylor the results and the possible repercussions.
Students will create an artifact using screen capture of themselves discussing and analyzing an aspect of searching.
How can computing extend traditional forms of human expression and enhance people’s ability to find information and solutions?
Student computer usage for this lesson is: required
Students should take a few minutes to journal on the following question:
Which are you more likely to do if you don't see an answer to a search request on the first page: click forward to page 2 of the results or ask the question differently? Why?
(Encourage students to discover that it is very valuable to business to appear at the top of the search engine rankings and that often thousands or millions of results are returned in a single search.)
(Use the PageRank presentation in the lesson folder to guide the discussion.)
Note: Guidelines for the teacher are in the "Teacher Notes on PageRank Presentation" document. This document also contains an answer key. (Students can record their notes in the "PageRank Student Handout".)
Read Fast Fact the Protect PII on Social Media published by the US Navy.
What concerns does the Navy have about the information posted online?
Do these same concerns apply to people not in the military?
Read the first three sections Internet is forever, except when it is not from Ask Leo.com.
How hard is it to permanently delete information once it is posted on the internet?
What advice would you give to a young person about posting their information online?
Why could it be beneficial for a search engine to keep track of what people are searching for? In what ways do computers enhance our ability to solve problems? Discuss.
(Possible answer to lead students toward: Topics sporadically become popular, and knowing what results people like can make it easy to suggest sites to others looking for similar things. History data can also enable a search engine to suggest a search phrase when a single word or only a few letters are typed in. The better a search engine knows what you are looking for, the better it can filter results to include results relevant to your query.)
Explain that students will be creating a presentation on the topic they researched in the last session. This presentation should be scripted, and make use of a PowerPoint and sources from the internet. They will have 30 minutes to make this presentation. (Slide 8 is made for video creation, but works well for general presentations too.)
For classes with enough video recording equipment for all groups:
Explain that students will create their own video explanations of how one feature of search engines works. Go over the "1 minute talk directions.odt" together to help students organize their video. The creative design process to develop such a short, focused product requires good teamwork, organization, and creativity. Plan out what the key message is, what visuals will add the most value, and then craft the wording to fit within the 1 minute time frame.
Students should split into their groups and begin work. Allow only 10 minutes for additional research as needed. They will take the remaining 25 minutes to:
Show as many videos/ group presentations as you can share with the class. If there are videos, assign the remainder to be watched as homework and have students bring in notes on the key points learned from each video.
Session 3 New for 2020-2021
Getting Started
Warmup:
1 What can we conclude from the following two statements?
2 How do you think the computer can tell which bits are for the title of a page and should be large and which bits represent plain text on the page and should be smaller?
Say: According to the Dublin Core Metadata Initiative Metadata Basics page (), metadata is "data about data" -- specifically, descriptive metadata -- is structured data about anything that can be named, such as Web pages, books, journal articles, images, songs, products, processes, people (and their activities), research data, concepts, and services. Creative Commons Attribution 3.0 Unported License
In this session, we will investigate what metadata is, its relationship to data, and its uses.
Watch the first 40 seconds of this video to complete these two sentences.
Metadata are pieces of information that make studies ______________ & ______________.
Metadata helps you make_________ of the ___________.
Watch the first 90 seconds of this video. After watching the Meta... What? Metadata! video, define metadata in your own words.
Say: Let’s answer two questions about the metadata for this image.
.
Colin Hines www.ColinHinesPhotography.com [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0/)]
Now view its metadata.
Think-pair-share: Discuss with your elbow partner
Say: If metadata tells us what data means - what information it contains - then what tells us what metadata means.?
Consider the XML for these messages.
<messages>
<note id="23">
<to>Marcus</to>
<from>Lin</from>
<heading>Reminder</heading>
<body>Don't forget our appointment!</body>
</note>
<note id="24">
<to>Lin</to>
<from>Marcus</from>
<heading>Re: Reminder</heading>
<body>What meeting</body>
</note>
</messages>
Ask: How does the metadata make using the data itself more effective?
The metadata tells us what the data (in black) means. To find out what XML, means we need to consult a standard. Examine the standards recommended by the W3C for XML.
Say: On a web page the data is what people need to see. The metadata is what computer systems use to present the data in useful ways. One large computer system is the internet. Every message/file transmitted on the internet is first broken into small fragments and each fragment packed in packets. These packets contain a lot of metadata that make delivery of the packets by the routers (computers) of the internet both possible and reliable.
Visit the IP packet structure web page and examine the metadata that is part of every packet transmitted on the internet and answer these questions.
Watch this video from International Privacy.org then discuss these two questions with your elbow partner.
For a shorter class, don't have students take notes, just discuss the slides.
For the Explore performance task, each student should be able to create their own artifact. You could have the students work on the presentations individually in this lesson, as a practice for the Explore task, if your class is fairly competent with the technology. For students with less experience (or to save time during presentations), it could be beneficial to have students create these artifacts in pairs, with some pairs repeating topics for comparison.
Students share best definitions of page rank related terms
Students analyze web pages for reasons for differences in page rank
Students create a one-minute video clip on a topic related to the operation of search engines.
Unit 3. Information and the Internet
Revision Date: Jul 22, 2019 (Version 3.0)Summary: This lesson is designed for students to review basic statistics, including calculations of the mean, median, mode, and standard deviation. It will also give the students some experience using spreadsheet software to calculate the statistics and to create histograms. Note: This lesson is intended primarily as a review and a reminder of material that should already be familiar to the students. If your students have little familiarity or experience with using Excel to compute statistics or generate plots, you may wish to extend this lesson to two sessions, and provide more scaffolding and instruction on the basic mechanisms.
Outcomes:
Overview:
Source: This lesson was adapted from Unit 2: The Engineering Design Process, Lesson 2: Collecting and Processing Information ©2013 International Technology and Engineering Educators Association Foundations of Technology, Third Edition/ Technology, Engineering, and Design
The students must understand the basic statistical concepts of mean, median, mode, and standard deviation. They must also be able to use spreadsheet software to calculate the statistics and to create histograms.
Students often have some initial difficulty learning how to use formulas in the spreadsheet software to do the calculations.
Student computer usage for this lesson is: required
For Each Student:
Review of Statistics:
Present a review of basic statistics (min, max, mean, median, mode, and range), and use the following board exercise to have the class review their understanding of these basic concepts:
Discussion:
Ask the class to come up with situations where it might be most useful to compute the mean, median, or mode of a set of values. Encourage them to understand that each of these statistics can be useful in different situations, but may be misleading. Have them generate sets of data that would give "misleading values" for mean (if there is an "outlier value"), median (if the values have a longer "tail" on one side than the other), or mode (if there is a frequent value that happens to occur at one end or the other of a wider range).
Note: The teacher may want to do this activity along with the students, displaying the spreadsheet on a screen so that the students may ask questions and see how to do the statistical calculations using the spreadsheet software. Students who do not have much experience with spreadsheets may need more scaffolding and instruction. (If you have many such students, you may wish to spread this lesson out over two class sessions.)
Students will use spreadsheet software, such as Excel, to calculate the average number and standard deviation of candy color in an individual-sized bag of M&Ms, Skittles, or other colored candy. Optionally, students may compare their results to other online published statistics for each candy.
Candy Statistics |
||||||
Trial Number |
1 |
2 |
3 |
4 |
5 |
6 |
Yellow |
17 |
20 |
24 |
19 |
19 |
17 |
Red |
21 |
13 |
19 |
21 |
15 |
18 |
Blue |
10 |
18 |
16 |
18 |
21 |
20 |
Brown |
7 |
12 |
5 |
12 |
12 |
14 |
Green |
26 |
26 |
16 |
17 |
22 |
18 |
Orange |
24 |
16 |
20 |
15 |
15 |
16 |
Package Total |
105 |
105 |
100 |
102 |
104 |
103 |
The students will also need to create columns further to the right labeled Mean, Median, Mode, and Standard Deviation.
Mean |
Median |
Mode |
Standard Deviation |
19.375 |
19 |
19 |
2.199837656 |
18.125 |
19 |
19 |
2.799872446 |
17 |
17.5 |
18 |
3.338091842 |
9.5 |
10 |
12 |
3.380617019 |
21.125 |
22 |
22 |
3.833592124 |
18.25 |
17.5 |
16 |
3.284161124 |
SUM
function.
Yellow Candy σ = |
2.199837656 |
Get on |
3Cs |
25.97451297 |
|
2S |
23.77467531 |
|
1s |
21.57483766 |
|
Mean |
19.375 |
|
-1s |
17.17516234 |
|
-2s |
14.97532469 |
|
-3s |
12.77548703 |
Students will answer the following question in their journals:
Learners may be paired to assist each other in the use of the spreadsheet software.
The teacher should frequently check the students' work for accuracy as the lesson progresses so that misunderstandings may be quickly resolved.
Unit 3. Information and the Internet
Revision Date: Nov 07, 2019 (Version 3.0)Summary
This lesson provides the students with an opportunity to practice the AP CSP Explore Performance Task with a given set of tasks from which they may choose. Students will use a rubric to perform self-assessment of work generated for the Explore Performance Task.
Outcomes
Overview
Session 1
Session 2
Session 3
Source: The lesson models the College Board AP CSP Explore Performance Task.
The students will be able to use reliable research findings to generate a computational artifact and respond to questions on that innovation.
Student computer usage for this lesson is: required
In the Lesson Resources folder:
Instruct the students that they are to use their findings to generate a computational artifact and a one-page paper on an innovation.
The artifact is an original digital artifact screencast or knowledge map diagram that you create to express the effects of your chosen innovation.
Students are to generate a written document in which they respond directly to the following prompts. Their document should be a one-page paper that may include illustrations.
Writing responses to questions posed on "Practice Explore Task Response Document" and creating artifact.
Remind students that brevity is important for the performance tasks; it is a talent to be able to get a message across with real content succinctly.
I have made this letter longer than usual, only because I have not had time to make it shorter. ~Blaise Pascal (1623-1662).
Have students complete the "Practice Explore Task Job Completion" form, indicating where they are in the process of the Practice Artifact.
Complete any additional research needed to complete the document (if needed).
The previous evening's homework was to complete the paper that students were working on in the previous class. Pass out the rubric and have students go through their paper to verify that they have all points covered. Point out that most of the points awarded are based on the report (75% of the total score) and the artifact represents 25% of the score. Teacher will need to circulate to assist where needed.
Have students complete a Job Progress form indicating where they are in the process of the Practice Artifact.
Complete the paper using the rubric as a guide. Complete the plan for the artifact; you will have one more class period to work on the artifact before the project is due.
The previous evening's homework was to complete responses to "Practice Explore Task Response Document" modifications as indicated using the rubric that students received in the previous class. Using the artifact part of the rubric, have students go through their plans for the artifact to verify that they have all points covered. Point out that most of the points awarded are based on the report (75% of the total score) and the artifact represents 25% of the score. Teacher will need to circulate to assist where needed.
The responses to "Practice Explore Task Response Document" for the Practice Explore Performance Task should be complete. Students should be focused on the artifact. The entire project will be collected next class.
Have students complete a Job Progress form indicating where they are in the process of the Practice Artifact.
Complete artifact using the rubric as a guide. The Practice Explore Performance Task is due at the start of the next period.
SPED/LLD: need to be frequently monitored and assisted as needed.
Teachers may choose to spread this activity out into multiple class sessions over a longer period of time, to give students some more time to work on the paper and artifacts at home (especially if the class meets every day, since "overnight homework" is often difficult for students to complete effectively when they are involved in other after-school activities and have assignments for other classes).
Practice Explore Performance Task -- provide feedback, using College Board's rubric (Explore_Performance_Task_Rubric_Nov2015.pdf and the CSM detailed Explore Task writing rubric (CSMattersWritingRubric.docx and CSMattersWritingRubric.pdf) -- both can be found in the lesson folder
Explore Performance Task
Unit 3. Information and the Internet
Revision Date: Sep 28, 2019 (Version 3.0)This is the second of three lessons where students will research a computing innovation.
This lesson will focus on:
Identify data privacy, security, or storage concern
Say: In this lesson, we are going to work individually to investigate a computing innovation. All computing innovations use data and to some degree expose the data to risk. In this lesson, you will identify a computing innovation and describe a privacy, storage or cybersecurity concern.
All computing innovations have a purpose, a purpose that guided the developers in its production. Some privacy, data security or data storage concerns about the innovations may have been known by the developers. Others may have become known only after the innovation was in use.
With elbow partners, list five or so kinds of information that most people want to remain private. Create a class list of these a list of these.
Say. Some personally identifiable information is protected by law is PII. Have students visit this website for a definition of PII. (https://github.com/ca-cwds/Information-Security/wiki/Definition-of-PII-(Personally-Identifiable-Information))
Provide the list below and ask students to identify what elements in our list are also listed as proteced by law.
Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:
Select one of the three concerns from activity 1 to focus upon.
Research and prepare a report assessing the risk and providing guidance on how to protect against that risk. The report must include citations of at least two references assessing the concern and two reference for protecting against the risk.
Prepare a one minute report about the concern you wrote about in the last sessions.
Computing Innovation data concern presentations.
Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Pre-lesson Preparation
Assigning some of the research as homework will allow more in-depth research.
Summary
Reflecting on the fact that the Internet was not designed with security in mind, students will examine the devastating impact of cyber attacks. Students will study types of cyber attacks and the vulnerabilities they exploit and identify the roles of software, hardware, people, and the Internet. Students will identify potential cybersecurity concerns in systems built on the Internet.
6.3 Cybersecurity is an important concern for the Internet and the systems built on it.
The Internet was not built with security in mind, leaving computers vulnerable to cyber attacks. This makes cybersecurity an extremely important concern when designing and implementing systems that are built on the Internet. Students need to be able to identify potential problems that could arise and potential options for protecting against these problems.
Outcomes
Student computer usage for this lesson is: optional
In the Lesson Resources folder:
Journal Sample Response:
Example for Presentations:
Information to present about firewalls. (Included in the slides)
“You can protect against certain attacks. One way to protect against them is a firewall.”
(Note: There is a PowerPoint to be used with this entire lesson: "Cyber Security Lesson Slides" in the Lesson Resources folder.)
In their journals or as a class, students should discuss the following:
2a. Say: What can be done to protect our online security and privacy? Institutions can implement Multifactor and 2-factor authentication.
Show the videos: Multifactor and 2-factor authentication
Discuss: multifactor identification. Be sure all four points below are discussed. (Suggestion, play it like Family Feud, keep getting ideas until all key points below have been revealed and add other ideas as they are suggested)
2b. Say: What can we as users do?
Discuss with students what they think they can do. Be sure all six points below about what users can do are discussed.
Individuals can manage passwords, network and credit card use.
Organize the class into seven groups and assign a topic above to each. Ask students to think about what the technology is, why it is important and how it is used.
Allow students five minutes to research the topics. Allow 5 minutes to prepare a poster about each. Present and answer questions about each.
4a. Say: All real-world systems have errors or weaknesses that make the susceptible to attack. One approach to making them safe is to detect and prevent these attacks. We are going to investigate malware and virus attacks. Show the video Malware: Difference Between Computer Viruses, Worms and Trojans. Have a brief class discussion on computer viruses using the questions below as prompts.
4b. Say: Attacks come from unknown senders, or spoofed or compromised known senders. Show the What is Phishing video. Have a brief class discussion on phishing using the questions below as prompts.
4c. Say: Some attacks take advantage of keyloggers. Show the Cyber Security Minute: Keyloggers video. Have a brief class discussion on keyloggers using the questions below as prompts.
4d. Ask: Why is the danger of free downloads is a special risk to young people? Visit the site 7 Quick Sites That Let You Check If a Link Is Safe and identify two tools you could use to identify safe downloads.
4e. Ask: What is an access point to a network? (Ans: a point of connection that can communicate with the network)
Say: According to Wikipedia, A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator. Rogue access points can give access to the network with authorization and can be used to intercept or modify network traffic that is traveling through it.
Solicit at least 3 examples of how this could be a problem on a secure network.
4f. Ask: What does it mean if something is malicious? (Ans: it has bad intentions)
Say: According to ZDnet,"85% of all malspam sent in Q2 2019 (April, May, and June) contained a link to a malicious file download, rather than the actual malicious file attached to the email." Have a brief class discussion on malicious email using the questions below as prompts.
4g. Say: In addition to attachments and malicious links - whether in an email, message or on a web page, email from an unknown sender or a known sender whose computer has been compromised may contain active contents such as forms or videos that can be used to compromise your computer security, your privacy or both. Discuss with students ways malicious software can be installed on their computers. Be sure to address the points below.
Optional programming activity.
Visit the PyPi website keylogger 2.7.3 and read the Use cases.
Optional research activity.
Students will be grouped by the type of attack they read about. They will conduct research to answer the following questions: (some resources will be provided, but students can also search for others. If no computers are provided, it will be up to the teacher to find these additional resources)
Visit the Top 10 Malware January 2019 report.
Visit the us-cert.gov report on Ransomware.
What is ransomware?
How can you protect yourself?
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
A certain social media Web site allows users to...
A retailer that sells footwear maintains a single
When a cellular telephone user places a call, the
Many Web browsers allow users to open anonymous...
Which of the following has the greatest potential
Which of the following is considered an unethical
Real World Connection: Protecting your Computer
Choose one of the following articles to read, based on the operating system you have running on one of your home computers, or the computer you normally use.
Answer the following questions:
If yes, answer the following questions:
If no, do the following:
Optional: Use this extended checklist to enhance the security of your computer.
The teacher will see where the students place the cyber attacks as they read about them on the impact graph and give appropriate feedback.
The teacher will monitor the research on cyber attacks and check for accurate information.
The teacher will clarify misconceptions that become evident during the group presentations.
Students will complete a journal entry by responding to questions about their personal and school related data being accessible through the Internet.
Unit 3. Information and the Internet
Revision Date: Jul 22, 2019 (Version 3.0)Summary
Students are introduced to the topic of cryptography and learn to perform two encryption techniques. The students will identify the role of the algorithm and key in the encryption process. Students will use abstraction to see the general process used in symmetric encryption. The students will consider the strength of ciphers and the importance of keeping the key a secret.
Outcomes
Overview
Student computer usage for this lesson is: optional
In the Lesson Resources folder:
Optional: Lesson slides with the key questions, encryption demos, and diagrams (the teacher could simply read the questions and present demos and diagrams by writing on a board).
For examples, consider reviewing The Code Book by Simon Singh.
Journal:
Tell the students, “This problem is not a new one. Throughout history, people, including government and military officials and personnel, business owners, and others, have wanted to send secret messages to someone but worried that the message could be intercepted along the way.”
There are two ways to try to keep the message secret: Steganography and Cryptography.
Explain the basic difference between the two.
Present two different encryption techniques, showing one example of each.
An alternative to this lecture portion above is to have students independently study the same concepts using a reading, video, or online learning tool. Here are some suggested resources:
Summarize with this overview: "Each encryption scheme involves an algorithm and a key. The algorithm is the set of steps that you follow to accomplish the encryption. The key is the secret piece of information that is needed to know exactly how to apply the algorithm in this case. This allows you to securely send encoded information across the Internet and decode it when it arrives. Some codes are more secure than others."
Have the students pair up and practice sending each other encrypted messages, then decrypting them to make sure they end up with the correct message.
A worksheet called "Cryptography Partner Practice" is provided in the Lesson Resources folder.
Ask the students: “How difficult would it be to crack a message that was encrypted using the Caesar (shift) cipher if you didn’t know the key? How would you do it?” (Easy, try each of the 25 possible shifts.)
Present: There are two ways to increase the strength of encryption:
Option #1: Increase the number of possible keys.
A general substitution (not limiting to just a shift) dramatically increases the number of keys. The number of keys in this case is the number of permutations (different orderings) of the 26 letters in the alphabet. This can be computed by multiplying the 26 options for the first letter in the cipheralphabet, by the 25 remaining options for the 2nd letter, 24 remaining options for the 3rd letter, etc. (26! or 26 factorial).
The answer: 4.032914e x 1026 keys (Google will calculate it for you).
This analysis makes it seem as though a substitution cipher would be unbreakable, but clever people have invented tricks (e.g., frequency analysis) that can be used so you don't have to try all of the different keys.
Option #2: Use a better algorithm.
For example, use a polyalphabetic cipher that combines multiple cipher alphabets.
(If time allows, you can have students explore other ciphers. For further study, see Khan Academy or The Code Book by Simon Singh.)
Present a diagram that shows high-level view of the encryption and decryption process (see The Code Book, p. 11).
Journal:
Use the "Cipher Python Project" worksheet in the Lesson Resources folder. Students are tasked to create a simple Caesar cipher program that uses ASCII values to shift messages by a certain letter. The rubric for this project is also in the Lesson Resources folder.
The teacher will evaluate student responses to the journal entries, class discussion questions, and the students performance during the encryption practice.
Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Summary
In this lesson, students will learn two solutions to the key distribution problem and the mathematical foundations behind these solutions. They will make connections between encryption, the use of SSL/TLS in web browsers, and the use of digital certificates. Students will recognize the value of open standards used in modern cryptography.
Outcomes
Overview
Session 1
Session 2
Student computer usage for this lesson is: optional
In the Lesson Resources folder:
Students should answer the following questions in their journals:
Suggested Review
Motivation: Present the Key Distribution Problem:
Introduce the following topic. Allow for discussion among the class about possible solutions to the problem presented.
After the class has come up with some ideas, reveal a solution to the problem that was found using math.
Present Key Information: Dreamers to the Rescue – Two men, two solutions, one important mathematical idea.
The system also uses powers (base/exponent). Very briefly review power notation.
Students should answer this question in their journals:
Research Hellman and Diffie’s work on public-key exchange, identify the big ideas of CS Principles that show up, and provide specific examples of how they are related to what you find out about Hellman and Diffie's work. Alternately, read about the British group that developed the same solution as Hellman and Diffie's to public key encryption in secrecy (http://cryptome.org/ukpk-alt.htm).
Students will read the following question and record their thoughts in their journals:
Have students present ideas from their journal entries. Use this as a way to review the Key Distribution Problem, and the team that tackled the problem.
Present Diffie’s Solution - Public Key Cryptography
Have students act out three short scenes (see "Public Key Encryption Plays") in order to illustrate how the system works. (It is advisable to select "dramatic" students to fill the four roles.)
Roles
Overview
Follow Up question to ask the students: Who do you have to trust for this system to work? (2 min)
What are the mathematical details that enable this idea of work? (Don't worry, we are not going to fully answer this!)
Discussion: Do “Open Standards” make sense in the world of Cryptography?
The systems of encryption used on the web have been "standardized" (meaning that everyone agrees to use the same systems) so that computers all over the world can communicate with each other. These standardized systems could be "proprietary" (meaning the details are kept secret), or they can be "open" (meaning the details are shared for anybody to see).
Students will Think-Pair-Share about the following prompts:
Possible responses
Benefits of open encryption
Benefits of open standards
- The bigger picture: Open Internet standards are the cornerstone of the Internet’s success. They enable its existence, facilitate its growth, and provide a platform that supports creativity, as well as social and economic opportunity for its billions of users. Open standards are implemented around the world in all kinds of Internet products and services. https://www.internetsociety.org/policybriefs/openstandards
Note: Heartbleed vulnerability is a good example of something that was eventually caught because of open standards. (This could be a homework assignment to read about it)
Drawbacks
Students should read this question and record their thoughts in their journals:
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
What is the minimum number of connections that ...
Which of the following are true statements abou...
Which of the following best describes a Distrib...
Which of the following is LEAST likely to indic...
Which of the following statements about securit...
Read about Heartbleed vulnerability in SSL. Reflect on how open standards relate to this.
RSA Encryption Algorithm Video: http://youtu.be/M7kEpw1tn50
The teacher will observe and evaluate student responses to journal entries, class discussion questions, and class activities.
Unit 3. Information and the Internet
Revision Date: Jan 05, 2020 (Version 3.0)Summary
This lesson will increase student awareness of the concept that there are dangers associated with Internet usage. It addresses Internet Security with issues inherent to Internet usage: viruses, worms, Trojan horses, and identity theft. The primary objective of this lesson is to equip students with knowledge that will enable them to make responsible choices regarding their Internet use, to prevent security risks. This lesson introduces key vocabulary, discusses Internet security and provides students the opportunity to explore the causes and effects of common security problems.
Students will:
Outcomes
Student computer usage for this lesson is: required
Teacher's resources:
Students' resources:
Students will read the following prompt and respond in their journals:
Consider the following questions and discuss answers as a class:
On your home computer, see how vulnerable you are to malware and identity theft:
If there is additional time, watch one of the TED talks
Students can create an "Identity Theft Prevention Action Plan," including a purpose and list of ten guidelines, to share with family and friends after they have researched prevention tips on the FTC website.
Unit Assessment and Investigate/Explore Performance Project – at end of unit.
Unit 3. Information and the Internet
Revision Date: Jun 11, 2020 (Version 3.0)Data is stored and transmitted online efficiently using many different kinds of hardware and software to send it quickly and accurately. Data can be compressed to take up less storage room and transmission time and, at the core, the entire system is made up of simple circuits that work with binary information that flows at an incredible speed all around the world. The security and privacy of this constant flow of data deserve understanding and attention. Students will investigate different areas of privacy and share with the class.
This flexible lesson includes additional material if the teacher would like the opportunity to reteach key concepts such as binary, abstraction, Internet functionality and also teachers the layers of hardware abstraction from transistors and logic gates up to computing devices.
The accompanying assessment can be used in class or as homework. (20 min) optional
Student computer usage for this lesson is: required
The Computer Science Field Guide http://csfieldguide.org.nz
Coding and compression: http://csfieldguide.org.nz/en/chapters/coding-compression.html
Data representation: http://csfieldguide.org.nz/en/chapters/data-representation.html
Use the binary number calculator to check conversion calculations
How computer memory works (5:05) http://ed.ted.com/lessons/how-computer-memory-works-kanawat-senanan
Presentations: Unit3Lesson14_InternetData_Presentation, Unit3Lesson14LogicGates_Presentation.
Worksheets: Accompanying student notes to be filled in. Unit3Lesson14_InternetData_StudentHandout, Unit3Lesson14LogicGates_Handout. Also Unit3Lesson14_InternetData_ReviewSection
How does information get from one computing device to another using the Internet? (also on Slide 1 of the Unit3 Lesson14_InternetData_Presentation)
Slides 2-3 review the basic steps to sending information online:
This is a review of unit 3. Pair, share and discuss. Identify weak areas of student understanding.
If students need additional review: provide the handout: Unit3Lesson14_InternetData_ReviewSection (to accompany slides 4-9) and continue with the presentation, otherwise use the handout as an assessment.
Distribute Unit3Lesson14internetData_StudentHandout (slides 10-11) on data compression and abstractions from low level to high level with notes to accompany the video how computer memory works (5:05)
Say: To protect ourselves online we need to understand some facts about how data is collected and used. Assign each of the following to a pair of students. Each pair is to prepare and present a 30 second (2 or 3 sentences) explanation for why their fact is most important. After two minutes give each pair a chance to present their explanation.
Present Unit3Lesson14_LogicGates_Presentation about hardware abstraction.pptx
Distribute Student handout: Unit3Lesson14LogicGatesHandout.docx
Assessment (20 min) optional or can be used as homework.
Also available Logic Gates additional practice handout and informational article.
Questions in the AP Classroom Question Bank may be used for summative purposes.
Sixty of the 80 questions are restricted to teacher access. The remaining 20 questions are from public resources.
Questions are identified by their initial phrases.
A new bank plans to make customer convenience a...
More than any other lesson so far, this lesson should be customized to meet the needs of the students. If they have a background in electronics and logic circuits from science or STEM classes, or have a firm grasp of binary number conversion and how the internet works, these sections of the lesson can serve as a very quick review skipping past the slides with extra detail.
For advanced students: Use the Unit 3 Lesson 14 assessment and the Unit 3 Lesson 14 Data on the Internet - Review Section as summative assessments after a brief review.
For students who do not have this background knowledge, use the presentations and notes.
Notes and exercises for binary encoding, data compression, logic circuits, how the internet works and layers of hardware abstraction.
Unit 3 Lesson 14 Summative Assessment
and
Unit 3 Lesson 14 Data on the Internet - Review Section
can be used as a formative or summative assessment.