Please enable JavaScript to use CodeHS

North Carolina Introduction to Computer Science

Description

In this lesson, students explore the impacts of being online. Students reflect on social media use and their digital footprint as well as learn how to identify and respond to cyberbullying.

Objective

Students will be able to:

  • Analyze the impact of social media and technology use on the lives of teenagers
  • Explain how one’s digital footprint can impact their future employment options
  • Analyze their own digital footprint and explain how they can maintain a positive digital footprint
  • Define cyberbullying
  • Explain how to respond to cyberbullying
  • (Optional) Choose the best privacy settings to protect their digital footprint and prevent cyberbullying
Description

In this lesson, students explore the complex world of data collection. Students learn about the types of data that companies collect and what they do with it. Students also consider the ethics of data collection by working through a scenario about location tracking in school. Lastly, students learn about privacy within the context of law.

Objective

Students will be able to:

  • Explain why companies collect data and what they do with it
  • Analyze the benefits and consequences of data collection that may or may not be evidence to users
  • Consider the ethics of data collection with relation to privacy concerns
  • Define personally identifiable information
  • Explain personal data collection in the context of the law (GDPR, CCPA, and privacy policies)
Description

In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Objective

Students will be able to:

  • Evaluate the accuracy, relevance, comprehensiveness, appropriateness, and bias of electronic information resources
  • Reflect on the growth of artificial intelligence in terms of trustworthy content
  • Explore and use search engine keywords and special characters to refine search results
Description

By the end of this lesson, students should have a better understanding of cyberethics, responsible internet use, and the impact of copyright and licenses on the digital world. They should also be more aware of the potential consequences of unethical online behavior.

Objective

Students will be able to:

  • Identify the difference between ethical hacking and malicious hacking
  • Discuss the principles of cyber ethics, focusing on responsible online behavior.
  • Discuss potential legal consequences of unethical online behavior
  • Debate intellectual laws and the beneficial and harmful effects that these laws have on innovation
Description

In this lesson, students learn about the importance of personal data security and explore different forms of authentication and browser security settings. Students then consider the tradeoffs between ease of use and security when implementing different authentication methods.

Objective

Students will be able to:

  • Explain password best practices
  • Define authentication terms: passphrase, multifactor authentication, 2FA, biometric authentication, password managers
  • Evaluate different forms of authentication
  • Explain how to use privacy settings on their browser to enhance security
  • Consider the tradeoffs between usability and security measures
Description

In this lesson, students are introduced to the core concepts of cybersecurity, focusing on the importance of protecting information and devices in the digital world. Students will explore key vocabulary terms, security frameworks, and the potential risks associated with the Internet of Things (IoT).

Objective

Students will be able to:

  • Define basic cybersecurity terminology
  • Explain the importance of information security and the CIA Triad (Confidentiality, Integrity, Availability)
  • Analyze how the AAA Security Framework (Authentication, Authorization, and Accounting) helps protect online information
  • Identify potential security risks associated with the Internet of Things (IoT) devices.
Description

In this lesson, students will learn how to navigate the digital world safely by understanding common cyber threats and implementing protective measures. Through interactive activities and creative storytelling, students will explore various cyberattacks, their consequences, and strategies for defense. This awareness will empower them to make responsible choices online and protect themselves from cybercrime.

Objective

Students will be able to:

  • Identify and define different types of cyberattacks (malware, viruses, ransomware, spyware, phishing)
  • Explain the importance of preventative measures like antivirus software, updates, HTTPS, and firewalls
  • Analyze real-world examples of phishing attacks and develop strategies for identifying suspicious online activities
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of basic cybersecurity concepts and its impacts through a multiple choice quiz