Public Encryption Key

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

8, 9, 10, 11, 12

Overview

This video shows an entertaining way to introduce Computer Science to students. It also offers an explanation of a public encryption key in a way that students can easily grasp. Students find out things they thought were safe on the internet are not safe.

Digital Literacy and Computer Science (2018) Grade(s): 8

DLCS18.8.24

Compare and contrast common methods of cybersecurity.

UP:DLCS18.8.24

Vocabulary

  • cybersecurity

Knowledge

Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

Skills

Students are able to:
  • identify similarities and differences in types of cybersecurity.

Understanding

Students understand that:
  • many methods exist to protect data.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.29

Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.

UP:DLCS18.HS.29

Vocabulary

  • compression
  • encryption
  • metadata

Knowledge

Students know:
  • that when a file is altered in any way, changes may be seen in the file metadata.
  • compression and encryption are two methods used when sharing data.

Skills

Students are able to:
  • explain the roles of compression and encryption.
  • summarize the effects of compression and encryption on the metadata of a digital artifact.

Understanding

Students understand that:
  • any process applied to data has the potential to alter the structure of the data.
  • it is important to be aware of potential changes to data structure when electing to use a process.

CR Resource Type

Audio/Video

Resource Provider

Other

License Type

BY-SA

Resource Provider other

CSUnplugged

Accessibility

Video resources: includes closed captioning or subtitles
ALSDE LOGO