6.1. Unit Overview¶
This unit focuses on Computing Systems and Networks, one of the big ideas in computer science. The App Inventor lesson in this unit shows how to use the Internet in apps, including the ability to send text messages over wifi. The CS Principles lessons focus on the Internet, how it works, how it enables innovation and collaboration, and security concerns for using it. In this unit, you will complete a series of activities using network administration software tools such as Ping and traceroute as well as a Domain Name System (DNS) simulator app to explore how we communicate on the Internet with IP Addresses.
Technical Terms
Below is a table of all of the technical terms that you'll learn in this unit. You will find a vocabulary section similar to this at the end of each lesson. Hover over the terms to review the definitions. You'll be able to practice your knowledge of the vocabulary with a quizlet at the end of the unit.MIT App Inventor | ||
---|---|---|
function |
local variables |
Computer Science Principles | ||
---|---|---|
bandwidth |
biometrics |
certificate authority |
computing system |
decryption |
digital certificate |
digital divide |
encryption algorithm |
encryption key |
encryption |
fault-tolerant |
HTTP |
keylogger |
malware scanning software |
malware |
multi-factor authentication (MFA) |
network |
packet |
phishing |
protocol |
public key cryptography |
rogue access point |
router |
routing |
run-time error |
scalability |
server |
strong password |
symmetric encryption |
syntax error |
trust model |
virus |
World Wide Web |
General Computing | ||
---|---|---|
abstraction layer |
asymmetric cipher |
brute force attack |
cipher |
ciphertext |
client |
computer bug |
cryptography |
debugging |
Diffie-Hellman |
DNS |
domain name |
ethernet |
firewalls |
frequency analysis |
host |
HTML |
HTTPS |
Internet Service Provider |
intractable |
IP address |
IPv4 |
IPv6 |
key exchange problem |
LAN |
latency |
modem |
one time pad |
packet sniffer |
packet switching |
ping |
plaintext |
polyalphabetic substitution |
ransomware |
rsa |
semantic error |
SMTP/POP |
ssl |
substitution cipher |
symmetric cipher |
traceroute |
transposition cipher |
Trojan horse |
URI |
WAN |
wifi |
worm |
6.1.1. Self-Check¶
Q-1: Identify 1-2 vocabulary terms from the table above that you know and define them in your own words. If you don’t know any of these words yet, that’s ok! Instead, write 1-2 sentences on how you plan to practice learning the vocabulary for this unit.
Q-2: Identify 1-2 vocabulary terms from the table above that you have heard before but don’t know the definition for.
Q-3: Identify 1-2 vocabulary terms from the table above that you don’t know but want to learn in this unit.
6.1.2. Reflection: For Your Portfolio¶
Answer the following portfolio reflection questions as directed by your instructor. Questions are also available in this Google Doc - you will be prompted to make your own editable copy.