Computers send and receive information based on a set of rules called protocols, which define how messages between computers are structured and sent. The information across networks can be protected from unauthorized access and modification in a variety of ways.
Network and Internet (Network Communication & Organization)
Impacts of Computing (Culture; Safety, Law and Ethics)
2-IC-20 - Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
2-AP-13 - Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
2-IC-23 - Describe tradeoffs between allowing information to be public and keeping information private and secure.
2-AP-16 - Incorporate existing code, media, and libraries into original programs, and give attribution.
2-IC-21 - Discuss issues of bias and accessibility in the design of existing technologies.
2-NI-04 Model the role of protocols in transmitting data across networks and the Internet. (P4.4)
Related Resources and Toolkits
Lesson 1: Exploring Websites
Lesson 2: Websites for Expression
Lesson 3: Internet
Lesson 4: Digital Footprint
Lesson 5: Intellectual Property and Images
Lesson 6: Source and Search Engines