The Connected World

Enduring Understanding

Computing devices may be connected to other devices or components to extend their capabilities. Together, devices and components will form a system for a purpose. Information needs connections to be sent or received, which can take many forms, such as physical or wireless. Information transmitted over the network can be protected using various security measures.


Essential Questions

Why do computers need to connect to other devices?
What do peripheral devices do?
What are input and output devices?
How are computers connected (physical paths or wirelessly, Wifi, bluetooth)?
What can you do with the Internet?
How and why do computers communicate with each other?
what are some cybersecurity issues in real world ?
What are some ways to protect information?
How do we keep personal information private?
What can you do about cyberbullying?

Core Concepts:

  • Computing Systems (Devices; Trouble Shooting)

  • Network and Internet (Network Communication & Organization; Cybersecurity)

  • Impacts of Computing (Safety, Law and Ethics)


CSTA Standards

1B-CS-01 Describe how internal and external parts of computing devices function to form a system. (P7.2)
Computing devices often depend on other devices or components. For example, a robot depends on a physically attached light sensor to detect changes in brightness, whereas the light sensor depends on the robot for power. Keyboard input or a mouse click could cause an action to happen or information to be displayed on a screen; this could only happen because the computer has a processor to evaluate what is happening externally and produce corresponding responses. Students should describe how devices and components interact using correct terminology.
1B-CS-03 Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. (P6.2)
Although computing systems may vary, common troubleshooting strategies can be used on all of them. Students should be able to identify solutions to problems such as the device not responding, no power, no network, app crashing, no sound, or password entry not working. Should errors occur at school, the goal would be that students would use various strategies, such as rebooting the device, checking for power, checking network availability, closing and reopening an app, making sure speakers are turned on or headphones are plugged in, and making sure that the caps lock key is not on, to solve these problems, when possible.
1B-NI-04 Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination. (P4.4)
Information is sent and received over physical or wireless paths. It is broken down into smaller pieces called packets, which are sent independently and reassembled at the destination. Students should demonstrate their understanding of this flow of information by, for instance, drawing a model of the way packets are transmitted, programming an animation to show how packets are transmitted, or demonstrating this through an unplugged activity which has them act it out in some way.
1B-NI-05 Discuss real-world cybersecurity problems and how personal information can be protected. (P3.1)
Just as we protect our personal property offline, we also need to protect our devices and the information stored on them. Information can be protected using various security measures. These measures can be physical and/or digital. Students could discuss or use a journaling or blogging activity to explain, orally or in writing, about topics that relate to personal cybersecurity issues. Discussion topics could be based on current events related to cybersecurity or topics that are applicable to students, such as the necessity of backing up data to guard against loss, how to create strong passwords and the importance of not sharing passwords, or why we should install and keep anti-virus software updated to protect data and systems.

Related Resources and Toolkits

Sample Lessons

Lesson 1: Input Devices
Lesson 2: Output Devices
Lesson 3: Processing Inputs to Create Outputs
Lesson 4 Private and Personal Information
Lesson 5: Screen Out the Mean
Lesson 6: The power of words

View Samples