Unit 4: How the Internet Works

Lab 1: Computer Networks

Lab 1, Page 1: Internet, Computer Network, Computing System, Computing Device, and World Wide Web
Lab 1, Page 1: Router and ISP
Lab 1, Page 1: Bandwidth and The Cloud
Lab 1, Page 2: Path, Routing, Scalability, Redundancy, and Fault tolerance
CSN-1.A.5, CSN-1.A.6, CSN-1.B.6, CSN-1.E.2, CSN-1.E.5
Lab 1, Page 3: Protocol, IP Address, Packet, and Packet Switching
CSN-1.B.3, CSN-1.C.1
Lab 1, Page 3: TCP/IP

TCP/IP is a pair of protocols that provide two levels of abstraction:

Lab 2: Cybersecurity

Lab 2, Page 1: Encryption and Decryption
IOC-2.B.5
Lab 2, Page 1: Symmetric Encryption
IOC-2.B.5

Substitution ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.

Lab 2, Page 3: Public Key Encryption
IOC-2.B.5

Public key encryption uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it.

Lab 2, Page 3: SSL/TLS

SSL/TLS (secure sockets layer/transport layer security) is the standard used for cryptographically secured information transfer on the Internet.

Lab 2, Page 3: Certificate Authorities
IOC-2.B.6

Certificate authorities are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.

Instead of trusting that the website is who they say they are, you now have to trust that the Certificate Authority is reliable.

Lab 2, Page 5: Malware, Keylogging Software, Computer Virus, Antivirus or Anti-Malware Software, Firewall, and Phishing
malware: IOC-2.B.9, keylogging: IOC-2.C.2, virus: IOC-2.B.8, antivirus or anti-malware software: IOC-2.B.7, phishing: IOC-2.C.1
Lab 2, Page 5: DDoS (Distributed Denial of Service) attack

A DDoS (Distributed Denial of Service) attack uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.

Lab 2, Page 5: Rogue Access Point

A rogue access point is a wireless access point that gives access to a secure network without the authorization of the network administrator.

Lab 3: Community and Online Interactions

Lab 3, Page 5: Digital Divide
IOC-1.C.1, IOC-1.C.2, IOC-1.C.3

The digital divide refers to unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors. The digital divide affects both individuals within a country and countries themselves.

Lab 3, Page 6: Citizen Science and Crowdsourcing
Lab 3, Page 6: Computing Innovation
CRD-1.A.1, CRD-1.A.2

Lab 4: Data Representation and Compression

Lab 4, Page 1: Bit
DAT-1.A.3

A bit is a single unit of data that can only have one of two values. We usually represent the two values as 0 (off) and 1 (on).

Lab 4, Page 1: Byte and Word
DAT-1.A.4

A byte is eight bits.

A word is a sequence of however many bits the CPU processes at a time. As of 2017, words are 32 or 64 bits.

Lab 4, Page 2: Binary Sequence

A binary sequence (also called a bitstream) is a string of ones and zeros.

Lab 4, Page 2: Analog, Sampling, and Sampling Rate

Analog data have values that change smoothly, unlike digital data which change in discrete intervals.

Sampling means measuring values, called samples, of an analog signal at regular intervals.

The sampling rate is the number of samples measured per second.

Lab 4, Page 3: Width and Word

width: the number of bits that a CPU processes at a time

word: a binary sequence of that many bits

Lab 4, Page 4: Floating Point

Scientific notation (such as 2,350,000 = 2.35 × 106) uses powers of ten to represent very large or very small values. Floating point is the same idea but with powers of two.

Lab 4, Page 5: Bit
DAT-1.A.3

The word "bit" is an abbreviation for binary digit.

Lab 4, Page 6: Lossless Compression

Lossless data compression algorithms (such as PNG) are reversible (there is no loss in quality); you can reconstruct the original data.

Lab 4, Page 6: Lossy Compression

Lossy data compression algorithms are not fully reversible; you can reconstruct only an approximation of the original data.