Lesson 2

Permission to enter

In this lesson, students explore how computing systems control access to secure information. Building on their understanding from the previous lesson, students investigate how password checks protect information by allowing or denying access to users. Students discover how computers store user input using variables. Then, students write an algorithm to describe what a computer does when a user enters a password. Finally, students use their algorithm to assemble a Scratch program that demonstrates access control through password security.

school
Grade 7
local_library
Subject Technology, Social studies
schedule
Length of lesson 50 minutes

Learning objective

Students will model password security using variables and conditionals.

Standards

🌐 CSTA Standards

  • 2-AP-11: Create clearly named variables that represent different data types and perform operations on their values.
  • 2-AP-12: Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  • 2-IC-20: Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  • 2-NI-05: Explain how physical and digital security measures protect electronic information.

🇺🇸 College, Career, and Civic Life (C3) Framework

  • D2.Civ.10.6-8: Explain the relevance of personal interests and perspectives, civic virtues, and democratic principles when people address issues and problems in government and civil society.