Please enable JavaScript to use CodeHS

Nebraska Introduction to Computer Science and Technology

Description

In this lesson, students explore the impacts of being online. Students reflect on social media use and their digital footprint as well as learn how to identify and respond to cyberbullying.

Objective

Students will be able to:

  • Analyze the impact of social media and technology use on the lives of teenagers
  • Explain how one’s digital footprint can impact their future employment options
  • Analyze their own digital footprint and explain how they can maintain a positive digital footprint
  • Define cyberbullying
  • Explain how to respond to cyberbullying
  • (Optional) Choose the best privacy settings to protect their digital footprint and prevent cyberbullying
Description

In this lesson, students explore the complex world of data collection. Students learn about the types of data that companies collect and what they do with it. Students also consider the ethics of data collection by working through a scenario about location tracking in school. Lastly, students learn about privacy within the context of law.

Objective

Students will be able to:

  • Explain why companies collect data and what they do with it
  • Analyze the benefits and consequences of data collection that may or may not be evidence to users
  • Consider the ethics of data collection with relation to privacy concerns
  • Define personally identifiable information
  • Explain personal data collection in the context of the law (GDPR, CCPA, and privacy policies)
Description

In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Objective

Students will be able to:

  • Evaluate the accuracy, relevance, comprehensiveness, appropriateness, and bias of electronic information resources
  • Evaluate quality of digital resources for reliability
  • Reflect on the growth of artificial intelligence in terms of trustworthy content
  • Explore and use search engine keywords and special characters to refine search results
Description

By the end of this lesson, students should have a better understanding of cyberethics, responsible internet use, and the impact of copyright and licenses on the digital world. They should also be more aware of the potential consequences of unethical online behavior.

Objective

Students will be able to:

  • Identify the difference between ethical hacking and malicious hacking
  • Discuss the principles of cyber ethics, focusing on responsible online behavior.
  • Discuss potential legal consequences of unethical online behavior
  • Debate intellectual laws and the beneficial and harmful effects that these laws have on innovation
Description

In this lesson, students learn about the importance of personal data security and explore different forms of authentication and browser security settings. Students then consider the tradeoffs between ease of use and security when implementing different authentication methods.

Objective

Students will be able to:

  • Explain password best practices
  • Define authentication terms: passphrase, multifactor authentication, 2FA, biometric authentication, password managers
  • Evaluate different forms of authentication
  • Explain how to use privacy settings on their browser to enhance security
  • Consider the tradeoffs between usability and security measures
Description

In this lesson, students are introduced to the core concepts of cybersecurity, focusing on the importance of protecting information and devices in the digital world. Students will explore key vocabulary terms, security frameworks, and the potential risks associated with the Internet of Things (IoT).

Objective

Students will be able to:

  • Define basic cybersecurity terminology
  • Explain the importance of information security and the CIA Triad (Confidentiality, Integrity, Availability)
  • Analyze how the AAA Security Framework (Authentication, Authorization, and Accounting) helps protect online information
  • Identify potential security risks associated with the Internet of Things (IoT) devices.
Description

In this lesson, students will learn how to navigate the digital world safely by understanding common cyber threats and implementing protective measures. Through interactive activities and creative storytelling, students will explore various cyberattacks, their consequences, and strategies for defense. This awareness will empower them to make responsible choices online and protect themselves from cybercrime.

Objective

Students will be able to:

  • Identify and define different types of cyberattacks (malware, viruses, ransomware, spyware, phishing)
  • Explain the importance of preventative measures like antivirus software, updates, HTTPS, and firewalls
  • Analyze real-world examples of phishing attacks and develop strategies for identifying suspicious online activities
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of basic cybersecurity concepts and its impacts through a multiple choice quiz
Description

In this lesson, students will learn about different encryption techniques and their historical significance. They will discover the limitations of certain methods and the evolution of cryptography throughout history. Lastly, students will also explore the future of cryptography and its potential applications.

Objective

Students will be able to:

  • Decode messages encrypted with Caesar and Vigenere ciphers
  • Explain the concept of encryption and its role in secure communication
  • Identify and compare different historical and modern encryption techniques
  • Analyze the limitations of certain decryption methods (brute force, letter frequency analysis)
  • Discuss the potential future applications of cryptography
Description

In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process.

Objective

Students will be able to:

  • Explain the characteristics of symmetric algorithms and use them to encode and decode text. Specific ciphers include block, substitution, and transposition ciphers.
  • Compare and contrast the strengths and weaknesses of symmetric ciphers.
Description

In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.

Objective

Students will be able to:

  • Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics

  • Explain the difference between symmetric and asymmetric encryption

Description

In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security. They will also discover the concept of hashing and its application in data integrity.

Objective

Students will be able to:

  • Define digital certificates and explain their role in web security.
  • Describe the basic steps involved in the SSL/TLS handshake process.
  • Explain the concept of hashing and its importance in data verification.
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of cryptography through a multiple choice quiz
Description

In this lesson, students will learn about the basic functions and types of operating systems. Students will also explore the process for upgrading and installing Windows and Mac operating systems.

Objective

Students will be able to:

  • Explain the purpose of operating systems
  • Identify the main types of operating systems
  • Analyze the upgrade and installation process for operating systems
Description

In this lesson, students delve deeper into the differences between the three main operating systems. They learn how operating systems store and manage files and the differences and similarities in each system’s interface.

Objective

Students will be able to:

  • Compare and contrast the interface of Mac, Windows, and Linux operating systems
  • Explain how operating systems use file systems to manage data
Description

In this lesson, students continue to compare and contrast different operating systems. Students learn how operating systems use file extensions to determine how to view different data types and how some extensions are only compatible with specific operating systems. Additionally, students learn about processors and the difference between a 32-bit processor and a 64-bit processor.

Objective

Students will be able to:

  • Compare and contrast file systems of different operating systems
  • Explain the role of the processor in a computer system
  • Explain the difference between a 32-bit and 64-bit processor and the impact it has on the operating system
Description

In this lesson, students learn about the different types of software. Through interactive exercises, students explore how different software can be used in the workplace and our every day lives. Students also learn about single and cross-platform software.

Objective

Students will be able to:

  • Explain the different types of software (productivity, collaboration, business) and the purpose of each.
  • Explain the benefits and challenges of single and cross-platform software.
Description

In this lesson, students learn about the different types of software licenses as well as the different methods of installing software based on the application’s architecture.

Objective

Students will be able to:

  • Explain the different types of software licenses
  • Explain the different delivery methods and architecture models of installing software
Description

In this lesson, students will learn about the importance of application security and what they can do to protect applications once they have been installed on a device.

Objective

Students will be able to:

  • Explain the importance of application security
  • Explain the multiple methods for protecting software
Description

In this lesson, students will learn about browser security features and ways to configure their browsers to enhance security.

Objective

Students will be able to:

  • Configure their browser to enhance security and privacy
  • Explain how the following features impact their browser security: cache, client-side scripting, browser extensions, private browsing, proxy settings, certificates, and popup blockers
  • Describe appropriate browser security configurations
Description

In this lesson, students learn how to use user accounts and permissions to secure a device. Students also learn about system hardening and how to strengthen the security of a network by setting up and implementing host security.

Objective

Students will be able to:

  • Describe how creating user accounts and permissions enhances security
  • Define system hardening explain the importance of establishing baseline security, including deciding rules around authentication and authorization
  • Explain the importance of performing security audits
Description

In this lesson, students learn how to use the command line interface to interact with files and folders, and access information about computer processes.

Objective

Students will be able to:

  • Understand the connection between a command line (CLI) interface and a graphical line interface (GUI)
  • Use the appropriate command line tool for different tasks
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of system administration concepts and its impacts through a multiple choice quiz
Description

In this lesson, students will explore how computers use the binary number system to store and communicate information. Through hands-on activities, they will learn how sequences of 0s and 1s represent data in a computer, understanding the fundamental concept of binary code. This foundational knowledge will enable students to grasp how computers interpret complex information and the importance of secure data encoding in cybersecurity.

Objective

Students will be able to:

  • Explain the significance of binary in computer communication
  • Encode and decode messages using binary representation
  • Understand the role of transistors in storing and processing binary information
Description

In this lesson, students will learn how to convert between binary and decimal numbers, understand binary place values, and apply these concepts to encode and decode messages using ASCII.

Objective

Students will be able to:

  • Explain how text can be represented using a sequence of 0s and 1s (binary code)
  • Convert between binary and decimal numbers
  • Identify binary place values
  • Encode and decode messages using ASCII
  • Apply binary concepts to real-world scenarios
Description

In this lesson, students will learn how computers break down images into concrete values that can be stored. Students will learn how images are represented digitally using pixels.

Objective

Students will be able to:

  • Understand how images can be encoded as data
  • Create pixel images in color and black and white
  • Identify bit storage units by name and size
Description

In this lesson, students will explore the fundamental concepts of the internet, including its infrastructure and operation. Through videos, readings, and interactive activities, students will gain an understanding of wired and wireless networks, the role of submarine cables, and the foundational ideas behind the internet. The lesson culminates in a reflection activity where students articulate their understanding of the internet.

Objective

Students will be able to:

  • Define what the internet is and explain its significance
  • Differentiate between wired and wireless networks
  • Understand the role of submarine cables in global connectivity
  • Reflect on the foundational concepts of the internet as described by Vint Cerf
  • Articulate their understanding of the internet through open-ended responses
Description

In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol. They will also gain insight into IP addresses, including their function, how to read them, and their role in network communication.

Objective

Students will be able to:

  • Evaluate protocol effectiveness
  • Demonstrate an understanding of IP addresses
  • Identify IP addresses of devices in a simulated environment
  • Discuss privacy concerns related to IP addresses
Description

In this lesson, students explore how messages get from one address on the internet to another. Students explore the format for creating and reading packets, as defined by open protocols.

Objective

Students will be able to:

  • Explain how computers communicate using routers, and explain what considerations are made when choosing a route
  • Map messages across several routers of different statuses
  • Analyze the transmission of data between IP addresses using packets
  • Determine if TCP or UDP protocols are more appropriate for transferring several types of data
Description

In this lesson, students will explore how websites function, learning about key concepts such as IP addresses, web servers, DNS, and HTTP. Through interactive activities, students will gain a deeper understanding of how data travels across the internet and the role of protocols in delivering web content.

Objective

Students will be able to:

  • Understand the structure of a website and its components
  • Explain how web pages are stored and delivered using web servers and protocols
  • Demonstrate the process of sending and receiving data over the internet through activities
Description

In this lesson, students will explore the OSI (Open Systems Interconnection) Model, which is a conceptual framework used to understand how different networking protocols interact and work together. Students will learn about the seven layers of the OSI Model, the functions of each layer, and how it applies to real-world scenarios such as troubleshooting network issues.

Objective

Students will be able to:

  • Identify the seven layers of the OSI Model
  • Explain the purpose and function of each layer
  • Analyze real-world networking issues using the OSI Model framework
Description

In this lesson, students will explore the various impacts of the internet on society, including social, educational, and personal aspects. Through readings and the Compass Points thinking routine, students will articulate their thoughts and reflect on their understanding of the internet’s influence.

Objective

Students will be able to:

  • Describe the various impacts of the internet on social, educational, and personal life
  • Express their feelings about the internet using the Compass Points thinking routine
  • Conduct research on selected internet topics
  • Demonstrate an understanding of properly citing sources
  • Participate in discussions, comparing perspectives with peers
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Description

In this lesson, students will learn about the essential internal components that make up a computer. Component categories include the motherboard (system board), firmware (BIOS), CPU (processor), GPU (graphics processor), storage, cooling, and NIC (network adapter).

Objective

Students will be able to:

  • Explain the purpose of common internal computing components such as motherboards, BIOS, RAM, and more.
Description

In this lesson, students will learn and explain the purposes and use of various peripheral types. They will classify the peripherals as input or output devices and explore different ways of installing them on a laptop or PC.

Objective

Students will be able to:

  • Explain the purposes and uses of various peripheral types
  • Classify common types of input/output device interfaces.
  • Explain how to install common peripheral devices to a laptop/PC
Description

In this lesson, students will learn about different networking devices that allow devices to connect to other devices as well as the Internet. They will also learn different networking connection methods such as using dialup, DSL, coax cables, and fiber optic cables.

Objective

Students will be able to:

  • Compare and contrast common Internet service types
  • Compare and contrast common networking hardware devices
  • Explain basic cable types, features, and their purposes
Description

In this lesson, students will learn about the different storage options including local storage, network storage, and cloud storage.

Objective

Students will be able to:

  • Compare and contrast storage types
  • Examine and discuss the security of cloud storage
  • Select suitable storage devices for given situations
Description

In this lesson, students will learn about the different network types and options that are available. This will include wireless networking standards and protocols.

Objective

Students will be able to:

  • Compare and contrast the different wireless network standards
  • Compare and contrast Internet connection types, network types, and their features
Description

In this lesson, students will learn about different ports and protocols and how they can be protected using a firewall. They will explore port scans and how to set firewall rules.

Objective

Students will be able to:

  • Compare and contrast different ports, protocols and their purposes
  • Explain the purpose of a firewall and how it protects against unwanted traffic
Description

In this lesson, students will learn about different CLI commands and tools that will provide network information. Students will also take a look at network connection logs to determine the legitimacy of specific login attempts.

Objective

Students will be able to:

  • Explain and use appropriate network command line tools
  • Read and understand the basics of log reports
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Description

In this lesson, students are introduced to coding with turtle graphics. Students will begin to recognize programs as sequences and groups of commands. Students will learn a few basic commands and then apply them right away by writing their first program.

Objective

Students will be able to:

  • Define programming/coding
  • Use basic Tracy commands
  • Write their first program
Description

In this lesson, students will be introduced to the layout of Tracy’s grid world and will learn how to use coordinate pairs to locate Tracy on the coordinate plane. They will add to the list of commands they know and can use to create Tracy graphics.

Objective

Students will be able to:

  • Locate Tracy on the coordinate plane
  • Use the penup(), pendown(), and backward() commands in their programs
Description

In this lesson, students will learn how to use the left and right commands in order to move Tracy to more locations on the canvas. They will now have many commands that can be used to have Tracy create more complex graphics.

Objective

Students will be able to:

  • Use the left and right commands in order to move Tracy around her grid world
Description

In this lesson, students are introduced to for loops. They learn how for loops simplify the process of making small changes to a program and help avoid repeating code. For loops are written like this:

for i in range (4):
    // Code to be repeated 4 times
Objective

Students will be able to:

  • Create for loops to repeat code a fixed number of times
  • Explain when a for loop would be a useful tool
  • Utilize for loops to write programs that would be difficult / impossible without loops
Description

In this lesson, students are introduced to the ability to turn Tracy at any angle. With this feature, Tracy can now draw diagonal lines which opens up the possibility to draw multiple shapes that weren’t previously available.

Objective

Students will be able to:

  • Use angles inside turning commands
  • Turn Tracy at angles in conjunction with for loops
Description

In this lesson, students are introduced to functions. They start with the basics of defining a function and why we need them and will revisit a program they coded earlier in the unit to rewrite it using functions.

Objective

Students will be able to:

  • Define a function
  • Call a function
  • Explain why functions are used
Description

In this lesson, students are able to add some flair to their turtle graphics programs by controlling color, pensize, and fill. These new commands are added to the list of commands that have been already practiced in order to allow for more creativity in student programs.

Objective

Students will be able to:

  • Use the extended circle() command to draw different shapes
  • Use the color(), pensize(), begin_fill(), and end_fill() commands to add more creativity to their programs
Description

In this lesson, students are introduced to the concept of Top Down Design. Top Down Design is the process of breaking down a program into functions or smaller parts to avoid repeated code and to make our programs more readable.

Objective

Students will be able to:

  • Break a large problem down into smaller pieces
  • Write functions to solve each smaller problem
  • Solve a complicated problem using Top Down Design
Description

In this lesson, students will learn about abstraction. Abstraction is the act of managing complexity by dissociating information and details in order to focus on relevant concepts.

Objective

Students will be able to:

  • Understand abstraction as the different levels of detail and complexity
  • Understand the importance of abstracting away complexity to solve problems more efficiently
Description

In this lesson, students will learn about a fundamental aspect of every programming language: Variables. A variable is something that stores information in a program that can be used later.

Objective

Students will be able to:

  • Describe what variables are
  • Discuss why variables are used in our programs
Description

In this lesson, students will learn how to incorporate user input into their programs. Students will learn how to request user input as both strings and integers, where the input is stored, and how to convert strings and integers.

Objective

Students will be able to:

  • Incorporate user input into their code in order to customize their programs
Description

In this lesson, students will dive deeper into the concept of functions by exploring how to use parameters to customize their code.

Objective

Students will be able to:

  • Incorporate parameters into their functions in order to adapt their functions to multiple situations
Description

In this lesson, students will learn how to use If Statements which will allow them to use conditions to determine how their code should run.

Objective

Students will be able to:

  • Use if statements in order to tell Tracy how to make decisions
Description

In this lesson, students will learn how to expand on If Statements by including a way to have Tracy make decisions between multiple scenarios.

Objective

Students will be able to:

  • Use if/else statements in order to have Tracy make decisions between multiple scenarios
Description

In this lesson, students will learn that while loops allow code to be executed repeatedly based on a condition. They will also be warned that infinite loops are created if the exit condition of the while loop is never met, causing the code inside the while loop to repeat continuously which causes the program to crash.

Objective

Students will be able to:

  • Effectively use while loops in their programs
  • Identify infinite loops
Description

In this lesson, students review content with a 25 question End-of-Unit Quiz.

Objective

Students will be able to:

  • Prove their knowledge of control structures and coding concepts through a multiple choice quiz