Chapter 6.1 - Unit Overview
This unit focuses on Computing Systems and Networks, one of the big ideas in computer science. The App Inventor lesson in this unit shows how to use the Internet in apps, including the ability to send text messages over wifi. The CS Principles lessons focus on the Internet, how it works, how it enables innovation and collaboration, and security concerns for using it. In this unit, you will complete a series of activities using network administration software tools such as Ping and traceroute as well as a Domain Name System (DNS) simulator app to explore how we communicate on the Internet with IP Addresses.
Big Idea 1: Creative Development (CRD)
Enduring Understanding CRD-2: Developers create and innovate using an iterative design process that is user-focused, that incorporates implementation/feedback cycles, and that leaves ample room for experimentation and risk-taking.
Big Idea 4: Computing Systems and Networks (CSN)
Enduring Understanding CSN-1: Computer systems and networks facilitate how data are transferred.
Big Idea 5: Impact of Computing (IOC)
Enduring Understanding IOC-1: While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences.
Enduring Understanding IOC-2: The use of computing innovations may involve risks to your personal safety and identity.
Technical Terms
Below is a table of all of the technical terms that you'll learn in this unit. You will find a vocabulary section similar to this at the end of each lesson. Hover over the terms to review the definitions. You'll be able to practice your knowledge of the vocabulary with a quizlet at the end of the unit.
MIT App Inventor
function
local variables
Computer Science Principles
bandwidth
biometrics
certificate authority
computing system
decryption
digital certificate
digital divide
encryption algorithm
encryption key
encryption
fault-tolerant
HTTP
keylogger
malware scanning software
malware
multi-factor authentication (MFA)
network
packet
phishing
protocol
public key cryptography
rogue access point
router
routing
run-time error
scalability
server
strong password
symmetric encryption
syntax error
trust model
virus
World Wide Web
General Computing
abstraction layer
asymmetric cipher
brute force attack
cipher
ciphertext
client
computer bug
cryptography
debugging
Diffie-Hellman
DNS
domain name
ethernet
firewalls
frequency analysis
host
HTML
HTTPS
Internet Service Provider
intractable
IP address
IPv4
IPv6
key exchange problem
LAN
latency
modem
one time pad
packet sniffer
packet switching
ping
plaintext
polyalphabetic substitution
ransomware
rsa
semantic error
SMTP/POP
ssl
substitution cipher
symmetric cipher
traceroute
transposition cipher
Trojan horse
URI
WAN
wifi
worm
6.1.1. Self-Check
Q-1: Identify 1-2 vocabulary terms from the table above that you know and define them in your own words. If you don’t know any of these words yet, that’s ok! Instead, write 1-2 sentences on how you plan to practice learning the vocabulary for this unit.
Q-2: Identify 1-2 vocabulary terms from the table above that you have heard before but don’t know the definition for.
Q-3: Identify 1-2 vocabulary terms from the table above that you don’t know but want to learn in this unit.
6.1.2. Reflection: For Your Portfolio
Answer the following portfolio reflection questions as directed by your instructor. Questions are also available in this Google Doc - you will be prompted to make your own editable copy.
Portfolio Reflection Questions
Make a copy of this document in your Portfolio Assignments folder and answer these questions in the spaces below. Once complete, turn in this assignment according to the steps given by your teacher.
6.1 Unit Overview Curriculum Page
WORD RANKING: How familiar are you with these words? Enter a ✔ into the applicable cell for each vocabulary word and then answer the questions.
Vocabulary Word
Not Familiar At All - I have never heard of this word.
Sort of Familiar - I have heard it before.
Really Familiar - I could teach someone else this word.
computing system
latency
bandwidth
digital divide
network
World Wide Web
client
SMTP/POP
protocol
modem
ethernet
server
HTTP
HTML
Internet Service Provider
wifi
host
router
IP Address
domain name system (DNS)
ping
traceroute
packet switching
packet
packet sniffer
abstraction layer
fault-tolerant
Scalability
cipher
cryptography
encryption
decryption
function
brute force attack
frequency analysis
rsa
intractable
ssl
certificate authority
digital certificate
trust model
syntax error
semantic error
computer bug
debugging
run-time error
multi-factor authentication (MFA)
biometrics
malware
virus
worm
Trojan horse
ransomware
phishing
keylogger
rogue access point
firewalls
1. Which vocabulary words in this unit are not familiar at all?
Answer
2. Which vocabulary words in this unit are sort of familiar?
Answer
3. Which vocabulary words in this unit are really familiar?
Answer
Last updated