eBook
Khan Academy

Khan Academy: Public Key Encryption

For Students 9th - 10th
Learn how public key encryption can protect computer data.
eBook
Khan Academy

Khan Academy: Symmetric Encryption Techniques

For Students 9th - 10th
Learn how symmetric encryption techniques help protect computer data.
eBook
Khan Academy

Khan Academy: Encryption, Decryption, and Cracking

For Students 9th - 10th
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
eBook
Khan Academy

Khan Academy: The Need for Encryption

For Students 9th - 10th
Find out why we need to encrypt computer data to avoid hackers.
eBook
Khan Academy

Khan Academy: Conditionals With If, Else, and Booleans

For Students 9th - 10th
A tutorial explainning the use of if, else, and Boolean logic in computer programming.
eBook
Khan Academy

Khan Academy: Nested Conditionals

For Students 9th - 10th
Learn how nested conditionals work in computer programming.
eBook
Khan Academy

Khan Academy: Compound Booleans With Logical Operators

For Students 9th - 10th
Learn about computer programming using compound booleans with logical operators.
eBook
Khan Academy

Khan Academy: Internet Routing Protocol

For Students 9th - 10th
Learn how computers split messages into packets and those packets hop from router to router on the way to their destination.
eBook
Khan Academy

Khan Academy: Physical Network Connections

For Students 9th - 10th
Learn that the internet is a network of computers connected to each other. But what does each physical connection look like? It depends on the needs of the connection and the size of the network.
eBook
Khan Academy

Khan Academy: Number Limits, Overflow, and Roundoff

For Students 9th - 10th
Learn about the limitations of storing numbers in computer programming.
eBook
Khan Academy

Khan Academy: Random Numbers

For Students 9th - 10th
See how we can generate random values in our computer programs, and use those to make decisions and simulate natural processes.
eBook
Khan Academy

Khan Academy: String Operations

For Students 9th - 10th
Computer programs don't just store strings, they also manipulate them. With string operations, we can chop strings up, mash strings together, or transform strings in all sorts of ways. Learn how here.
Unit Plan
Khan Academy

Khan Academy: Unit: Online Data Security

For Students 9th - 10th
Readings and practice problems about online data security.
Article
Khan Academy

Khan Academy: Secondary Memory

For Students 9th - 10th
Types of long term storage of data on the computer and retrieval are examined.
Article
Khan Academy

Khan Academy: File Types

For Students 9th - 10th
Computers store all files as binary data, long strings of 111s and 000s. Files represent all types of data: images, videos, documents, text files, spreadsheets, and applications. Files are stored as binary data.
Article
Khan Academy

Khan Academy: File Sizes

For Students 9th - 10th
Small and large computer file sizes are examined with examples of storage data.
Article
Khan Academy

Khan Academy: Input & Output Devices

For Students 9th - 10th
Computer input and output devices are examined in this article.
Article
Khan Academy

Khan Academy: Hexadecimal Numbers

For Students 9th - 10th
The Hexadecimal number is explained as well as its relationship and need in computers.
eBook
Khan Academy

Khan Academy: Numbered Repetition of Instructions

For Students 9th - 10th
Computer programs are full of repetition, since our programs automate and simulate the world around us. Programmers use for loops to repeat a set of instructions a specific number of times.
Article
Khan Academy

Khan Academy: Using Heuristics

For Students 11th - 12th
Using Heuristics when solving computer problems.
Article
Khan Academy

Khan Academy: Undecidable Problems

For Students 9th - 10th
Problems a computer can never solve are called "undecidable problems". No algorithm exist that can answer the problem on all inputs.
Article
Khan Academy

Khan Academy: Public Key Encryption

For Students 9th - 10th
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.
eBook
Khan Academy

Khan Academy: Bit Rate, Bandwidth, and Latency

For Students 9th - 10th
Explore how binary information is sent and how quickly they can be sent.
Activity
Khan Academy

Khan Academy: The Internet Protocol Suite Practice

For Students 9th - 10th
Practice problems with the internet protocol suite of networks.