Unit 5 – Security and Encryption | Unit 6 – Networks



Daily Lesson Plans 

This material contains a comprehensive collection of 90-minute lesson plans for a semester’s worth of instruction in AP Computer Science Principles to serve as a companion to this textbook. Each lesson plan includes clear objectives, related requirements, a list of necessary materials, a detailed procedure, an assessment method, and a reflection section. The lessons are designed to be engaging and interactive, incorporating a variety of teaching techniques to help students understand and apply the key concepts of computer science. In order to modify the course for a year-long course with approximately 180 instruction days, each lesson plan can easily be spread across two days of instruction. 


Textbook 

Computer Science Principles: The Foundational Concepts of Computer Science, 5th Edition, Kevin Hare – Yellow Dart Publishing – 2024


Daily Practice Questions

Enjoy complimentary access to a daily selection of 5 random questions from our extensive pool of over 500 thoughtfully crafted questions – even if you’re not a member. Dive into the excitement of learning with these free, rotating questions that change every 24 hours, offering a taste of the variety and depth our content and book have to offer.


Lessons:

Unit Duration:

  • 1.5 hours | 1 class period (90-minutes)

Project, Test, and Quiz Resources:


Lesson 36 | Impact of Computing 

Lesson Objectives: 

  • Understand the concept of the digital divide and its impact on society
  • Define and differentiate between copyright, trademark, and patent 
  • Explain the importance of intellectual property rights 
  • Understand the concept of Creative Commons and its benefits 
  • Define and explain Free and Open Source Software (FOSS) and its significance 

Related Requirements: 

  • Access to the internet and a device to watch videos 
  • Basic knowledge of computing and the internet

Lesson Materials: 

Lesson Procedure: 

  1. Introduction (10 minutes): 
    • Introduce the topic of the impact of computing and its effect on society
    • Define the objectives of the lesson 
    • Ask students about their experience with computing and the internet 
    • Provide a brief overview of the topics to be covered 
  2. Body (60 minutes): 
    • Introduce the topics: the impact of computing, including the digital divide, intellectual property, Creative Commons, and FOSS 
    • Define and explain key terms and concepts 
    • Watch the videos and pause after each video for a brief discussion on the topic presented in the video 
    • Encourage students to ask questions and provide examples to reinforce understanding 
  3. Activity (15 minutes): 
    • Divide students into small groups of 3-4 
    • Provide each group with a scenario related to computing and the topics covered in the lesson 
    • Ask the groups to brainstorm a solution to the scenario provided, taking into account the concepts learned in the lesson 
    • After 10 minutes, ask each group to present their solution to the class and have a class discussion about the different solutions presented 
  4. Conclusion (5 minutes): 
    • Summarize the key points covered in the lesson 
    • Ask students for feedback on the lesson 

Assessment Method: 

  • Monitor students’ participation and engagement during the lesson 
  • Evaluate students’ comprehension through class discussion and the activity
  • Provide a short quiz at the end of the lesson to assess knowledge retention 

Lesson Reflection: 

  • Review students’ feedback on the lesson and make adjustments for future lessons
  • Evaluate the effectiveness of the activity and consider modifying it for future lessons
  • Identify areas for improvement and develop strategies for addressing them in future lessons. 

Mapped Standards:

College Board AP Computer Science Principles (CSP) Framework:
  • IOC-1.A.2 As computing evolves, the way people complete tasks often changes to incorporate new computing innovations.
  • IOC-1.A.4 A single effect can be viewed as both beneficial and harmful based on an individual’s perspectives.
  • IOC-1.D.1 Computing innovations can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation.
  • IOC-1.E.1 Widespread access to information and public data facilitates the identification of problems, development of solutions, and dissemination of results.
  • IOC-2.A.1 Personally identifiable information (PII) is information about an individual that identifies, links, relates, is unique to, or describes them. Examples of PII include: social security number; age; race; phone number(s); medical information; financial information; and biometric data.
  • IOC-2.A.2 Search engines can record and maintain a history of searches made by users.
  • IOC-2.A.3 Websites can record and maintain a history of individuals who have viewed their pages.
  • IOC-2.A.4 Devices, websites, and networks can collect information about a user’s location.
  • IOC-2.A.5 Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions.
  • IOC-2.A.6 Search engines can use search history to suggest websites or for target marketing.
  • IOC-2.A.7 Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.
  • IOC-2.A.8 PII and other information placed online can be used to enhance a user’s online experiences.
  • IOC-2.A.9 PII stored online can be used to simplify making online purchases.
  • IOC-2.A.10 Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.
  • IOC-2.A.11 Information placed online can be used in ways that were not intended and in ways that may have a harmful impact. For example, an email message may be forwarded, tweets can be retweeted, social media posts can be viewed by potential employers.
  • IOC-2.A.12 PII can be used to stalk or steal the identity of a person, or to aid in the planning of criminal acts.
  • IOC-2.A.13 It is difficult to delete information once it has been placed online.
  • IOC-2.A.14 Applications can collect your location and record where you have been, how you got there, and how long you have been at a given location.
  • IOC-2.A.15 Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.
CSTA Standards:
  • 1B-IC-19: Analyze how computing influences, and is influenced by, cultural, social, and legal practices.
  • 2-IC-24: Discuss issues of intellectual property with respect to software and digital innovations.
  • 3A-IC-31: Evaluate the impacts of equitable access to computing and technology in local and global contexts.

Unit 5 – Security and Encryption | Unit 6 – Networks


Membership

For those hungry for more, our membership unlocks the full spectrum of over 500 questions, providing a comprehensive exploration of the diverse topics covered in our content and book. Delve deeper into the world of computer science, enhance your understanding, and master the principles that matter. Our membership also grants you exclusive access to detailed units from the comprehensive book and on our website. From foundational concepts to advanced topics, our units offer invaluable resources to support your learning journey. Elevate your exploration of computer science and make the most of your membership!

Ready to take the plunge into the world of computer science? Start Your Membership Today and enjoy free daily questions along with a treasure trove of over 500 more!


Subscribe to our Newsletter


Unit 5 – Security and Encryption | Unit 6 – Networks