Learning Resource Type

Classroom Resource

Computer Science Principles Unit 4 Chapter 1 Optional Lesson: Practice PT - Big Data and Cybersecurity Dilemmas

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

To conclude their study of big data and cryptography, students will complete a small research project related to a dilemma presented by Big Data or Cybersecurity, in the form of a Practice Performance Task. Students will pick one of two issues to research more deeply - either an issue related to big data, or one related to cybersecurity. Students will need to identify appropriate online resources to learn about the functionality, context, and impact of the technological innovation that gave rise to the dilemma they are investigating. After completing their research, students will present their findings both in a written summary and with an audio/visual artifact they found online. The written components students must complete are similar to those students will see in the AP Performance Tasks.

This project is an opportunity to practice many of the skills students will use when completing the Explore Performance Task on the AP® Exam at the end of the year. While an open-ended research project might be intimidating, students have built all the skills they need to complete this task.

Note: This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.

Students will be able to:
- identify reliable and authoritative sources of information about computing information.
- synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
- identify an artifact that clarifies an aspect of a computing topic not easily captured in writing.
- explain both the beneficial and harmful effects related to a modern social dilemma in computing.

Note: You will need to create a free account on code.org before you can view this resource.

    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.11

    Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

    Unpacked Content

    UP:DLCS18.HS.11

    Vocabulary

    • ethics
    • digital world
    a.
      cookies
    • virus
    • malware
    • packet sniffing
    • spyware
    • phishing
    b.
    • browser history
    c.
    • personal data
    d.
      data mining
    • digital marketing
    • online wallets
    • personal information
    • data accessibility
    • passwords.
    e.
    • cyberbullying
    • harassment
    • sexual communication
    f.
    • online safety

    Knowledge

    Students know:
    • safe, legal, and ethical behaviors for online behavior.
    a.
    • tracking methods are often used to improve digital tools and advertising.
    • hazards exist when unknown entities have access to a user's digital habits.
    b.
    • methods to counteract the use of tracking.
    c.
    • that often, end-user licensing agreements (EULA) are often written to protect the entity that created the digital tool, rather than the user of the digital tool.
    • that EULAs and terms of service agreements can grant access to the user's personal data.
    • that personal data can include images, posts, personal information (phone number, address, birth date, access to friends), and browsing data.
    d.
    • often there exists an inverse relationship between online privacy/personal security and convenience.
    e.
    • that inappropriate digital behavior can have physical, legal, and ethical consequences.
    f.
    • that negative digital behaviors can have lasting consequences.
    • that some behaviors are illegal.
    • strategies to lessen the impact of negative digital behaviors and assess when to apply them.

    Skills

    Students are able to:
    • interact digitally while exercising safe, legal, and ethical behaviors.
    a.
    • identify tracking methods used to gather data.
    • identify hazards that exist when tracking methods are used.
    b.
    • list techniques to avoid tracking.
    • apply techniques to avoid tracking.
    c.
    • interpret the terms of EULAs and terms of service agreements.
    • make an educated decision to agree to EULAs and terms of service agreements.
    d.
    • weigh the risks of using a digital tool to one's personal security.
    • identify potential risks to using various digital tools.
    • evaluate a digital tool's security.
    e.
    • identify inappropriate digital behaviors.
    • identify consequences of inappropriate digital behaviors.
    f.
    • identify negative digital behaviors.
    • share strategies to to lessen the impact of negative digital behaviors.

    Understanding

    Students understand that:
    • because the Internet can be such a persisting environment, it is vital to interact with safe, legal, and ethical behaviors.
    a.
    • entities use tracking methods to make products more appealing to their users.
    • hazards exists when tracking data can be tied to individual users.
    b.
    • privacy can be violated when tracking is used.
    • techniques exist to mitigate the effects of tracking methods.
    c.
    • nothing is free—you often give up data to use digital resources for no charge.
    • it is important to educate yourself on EULAs and terms of service agreements.
    d.
    • free digital tools can compromise one's privacy and security.
    • it is important to be aware of what one is trading for use of a service.
    e.
    • inappropriate digital behavior can have physical, legal, and ethical consequences.
    • consequences of inappropriate digital behaviors can have life-altering consequences.
    f.
    • digital identity is tied to online digital behavior.
    • negative digital behaviors can have lasting consequences.
    • some digital activity is illegal.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.12

    Describe how sensitive data can be affected by malware and other attacks.

    Unpacked Content

    UP:DLCS18.HS.12

    Vocabulary

    personal data, malware, cyber attacks

    Knowledge

    Students know:
    • how malware works.
    • how sensitive data can be affected by malware and other attacks.

    Skills

    Students are able to:
    • identify when a computer issue is potentially caused by malware.
    • remove malware from a computing device.
    • explain ways to protect computing devices from malware.

    Understanding

    Students understand that:
    • malware is harmful to computing devices and personal data.
    • software exists to remove malware from computing devices.
    • software exists to protect computing devices from a malware attack.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.13

    Compare various security measures of a computer system.

    Unpacked Content

    UP:DLCS18.HS.13

    Vocabulary

    Cyber security, computer systems

    Knowledge

    Students know:
    • how to identify security measures of a computing system.
    • how to evaluate usability, security, portability, or scalability of the security measures of a computing system.

    Skills

    Students are able to:
    • identify security measures of a computing system.
    • evaluate usability, security, portability, or scalability of the security measures of a computing system.

    Understanding

    Students understand that:
    • Usability, security, portability, or scalability are important features of computer security measures.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.14

    Compare ways to protect devices, software, and data.

    Unpacked Content

    UP:DLCS18.HS.14

    Vocabulary

    computing devices, software, and data

    Knowledge

    Students know:
    • that it is important to protect data, software, and devices.
    • why it is important to protect data, software, and devices.

    Skills

    Students are able to:
    • compare ways to protect devices.
    • compare ways to protect software.
    • compare ways to protect data.

    Understanding

    Students understand that:
    • multiple methods exist to protect data, software, and devices.
    • some methods are more effective than others at meeting specific criteria.
    • it is important to evaluate option for protection of data, software, and devices.
    Link to Resource

    CR Resource Type

    Lesson/Unit Plan

    Resource Provider

    Code.org
    Accessibility
    License

    License Type

    Custom
    ALSDE LOGO