Lesson 2
Permission to enter
In this lesson, students explore how computing systems control access to secure information. Building on their understanding from the previous lesson, students investigate how password checks protect information by allowing or denying access to users. Students discover how computers store user input using variables. Then, students write an algorithm to describe what a computer does when a user enters a password. Finally, students use their algorithm to assemble a Scratch program that demonstrates access control through password security.
school
Grade
7
local_library
Subject
Technology, Social studies
schedule
Length of lesson
50 minutes
Learning objective
Students will model password security using variables and conditionals.
Standards
🌐 CSTA Standards
- 2-AP-11: Create clearly named variables that represent different data types and perform operations on their values.
- 2-AP-12: Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
- 2-IC-20: Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
- 2-NI-05: Explain how physical and digital security measures protect electronic information.
🇺🇸 College, Career, and Civic Life (C3) Framework
- D2.Civ.10.6-8: Explain the relevance of personal interests and perspectives, civic virtues, and democratic principles when people address issues and problems in government and civil society.
Lesson contents
lock
Want to teach this lesson?
Log in and get access to the full curriculum for free.