Digital Solutions 2019 v1.2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Digital Solutions 2019 v1.

2
Unit 4 sample teaching, learning and assessment plan

Unit 4: Digital impacts


Unit description
In Unit 4, students learn how data is shared in both local and global contexts, particularly how digital solutions are increasingly required to exchange data securely and efficiently. Students will understand elements of
cybersecurity by exploring the conditions, environment and methods for enabling data to flow between different digital systems. They will analyse data privacy and data integrity risks associated with transferring data between
applications and evaluate the personal, social and economic impacts associated with the use and availability of both public and private data. Students will develop an application that simulates the exchange of data between
two applications.

Unit objectives
By the end of this unit, students will:
1. recognise and describe programming elements, components of data exchange systems, privacy principles and data exchange processes
2. symbolise and explain data structures and specifications, methods for exchanging data, algorithms and data-flow relationships within and between systems
3. analyse problems and information related to digital systems
4. determine solution requirements and prescribed and self-determined criteria
5. synthesise information and ideas to determine possible components of digital solutions
6. generate components of the digital solution
7. evaluate impacts, components and solutions against prescribed and self-determined criteria to make refinements and justified recommendations
8. make decisions about and use mode-appropriate features, language and conventions for particular purposes and contexts.

171865
Assessment plan
Assessment details % Objectives to be assessed Conditions Date

Summative internal assessment 3 (IA3): 25% 1. recognise and describe key elements of an application, components of data exchange systems, • Length Students may work
Project — folio and data security processes ­ 8–10 A3 pages on the response to
2. symbolise and explain data interface, structures and specifications; data flow relationships ­ 2–4 A4 pages of code with annotations the assessment
This assessment focuses on the within and between systems; and digital methods of exchanging data throughout the unit.
­ 1–2 minute demonstration of the
problem-solving process in Digital Solutions 3. analyse a data exchange problem and information related to data security functionality of the data exchange solution
that requires the application of a range of 4. determine data exchange system requirements, a security strategy for data, and prescribed and by video recording
cognitive, technical and creative skills and self-determined criteria • Other
theoretical understandings. The response is a 5. synthesise information and ideas to determine selected data, algorithms and coded
coherent work that documents the iterative ­ the reference list and appendixes are not
components of data exchange solutions included in the page count
process undertaken to develop a solution to a
6. generate components of the data exchange solution ­ schools implement authentication
problem. It may include written paragraphs and
annotations, data, tables, algorithms, diagrams, 7. evaluate impacts, coded components and a data exchange solution against prescribed and strategies that reflect QCAA guidelines
sketches, illustrations, digital prototypes and self-determined criteria to make refinements and justified recommendations (see Section 1.3.2).
models. 8. make decisions about and use mode-appropriate features, written language and conventions
This assessment occurs over an extended and for a technical audience.
defined period of time. Students may use class
time and their own time to develop the folio.

Summative external assessment (EA): 25% 1. recognise and describe programming elements, components of exchange systems, privacy • Time: 2 hours plus perusal (15 minutes) External assessment
Examination principles and data exchange processes • Combination response: This assessment will timetable to be set by
2. symbolise and explain programming ideas, data specifications, data exchange processes, and include a combination of one extended QCAA.
Summative external assessment is developed data flow within and between systems response, a number of short response
and marked by the QCAA. In Digital Solutions, 3. analyse problems and information related to a digital problem and/or multiple-choice questions.
it contributes 25% to a student’s overall subject 5. synthesise information and ideas to determine components of digital solutions • Length
result. 7. evaluate impacts, components and solutions against criteria to make refinements and justified ­ 800–1000 words in total, including
The external assessment in Digital Solutions is recommendations  50–250 words for short-response
common to all schools and administered under Note: Objectives 4, 6 and 8 are not assessed in the assessment instrument. answers
the same conditions, at the same time, on the
 400 words or more for the extended
same day.
response.
The examination is a supervised test that
assesses the application of a range of
cognitions to multiple provided items.
Student responses must be completed
individually, under supervised conditions, and
in a set timeframe.

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 2 of 12
Teaching and learning plan
Please be advised that this resource may contain images, voices, names or references to deceased persons. This may be in the form of photographs, film, audio recordings or printed material included or referenced as part of
this resource. Some references may contain terms or reflect attitudes that are inappropriate today but are provided in a historical context.

Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors

3 hours 1, 2, 4, 7, 8 Topic 1: Digital methods for exchanging data Audiovisual activity: Data openness, linked data and impacts Literacy skills • Tim Berners-Lee — TED2009, ‘The
• symbolise and explain Individually, students: • comprehending texts through next web’, TED
­ how application sub-systems, e.g. front end, • view TED talks, ‘The next web’ and ‘The year open data went listening, reading and viewing to www.ted.com/talks/tim_berners_lee
back end, work together to constitute a worldwide’. make meaning of digital _on_the_next_web
solution technologies text, words and • Tim Berners-Lee — TED2009, ‘The
­ secure data transmission techniques and visual knowledge year open data went worldwide’,
In small groups, students:
processes, including the use of encryption, • composing texts through TED
• explore reasons ‘for’ and ‘against’ sharing data www.ted.com/talks/tim_berners_lee
decryption, authentication, hashing and speaking, writing and creating to
checksums • explain the term ‘linked data’ and provide examples develop annotated drawings and _the_year_open_data_went_world
• explain the term ‘data mash-up’ detailed specifications wide#t-161027
• symbolise
• brainstorm and record the benefits of interconnected systems • composing texts through • Hand, D 2012, ‘Open data is a
­ representations of a digital solution
speaking, writing and creating to force for good, but not without
­ data flow through a system using data flow • symbolise and explain
communicate information and risks’, The Guardian, 10 July
diagrams. ­ how application sub-systems, for example front-end and back- www.theguardian.com/society/2012
ideas to a variety of audiences
end, work together to solve a problem /jul/10/open-data-force-for-good-
Topic 2: Complex digital data exchange ­ secure data transmission techniques and processes, including Numeracy skills risks
problems and solution requirements use of encryption, decryption, authentication, hashing and • estimating and calculating with • data.gov.au (Australian
checksums. whole numbers Government)
• determine data sources required to generate
data components • using numbers and number www.data.gov.au
• explain the purpose of code and/or algorithm Individually, students: concepts in programming • Open Data Queensland
statements using code comments and • read The Guardian article, ‘Open data is a force for good, but not • interpreting statistical information (Queensland Government)
annotations without risks’ through developing, testing and www.data.qld.gov.au
• communicate using • evaluate the possible risks and security impacts of linking data and refining components • Google Maps API StreetView
­ digital technologies–specific language open data. 21st century skills Service
­ sketches or diagrams to present information • critical thinking — analysing www.youtube.com/watch?v=Ui8Nd
and ideas about the problem and As a class, students: information to see or make new L0jQ9I
programmed digital solutions. • develop a benefits and risks register of linked data links to digital problems
• discuss the potential issues • collaboration and teamwork —
Topic 3: Prototype digital data exchanges relating to and interacting with
• suggest ideas to manage risks and flag unknown questions for others to solve problems in digital
• evaluate security impacts of data and its use, further exploration, for example how to manage risk and the technology contexts
dissemination, storage, accuracy and processes involved
ownership on personal, social and economic • personal and social interactions —
• list some of the key technical elements of data linking that Tim developing and demonstrating
needs. Berners-Lee identified, which need further exploration. adaptability and flexibility to create
digital solutions, enhanced
Exploration activity: Exploration of data sources resilience, mindfulness, open- and
In pairs, students: fair-mindedness, self-awareness
and the ability to self-manage
• investigate Australian Government data sources at
­ data.gov.au • Information & communication
technologies (ICT) skills —
­ Open Data Queensland
accessing, collating, evaluating,
• describe some of the data available analysing and presenting
­ what form does it take? information from primary and
­ is it sensitive or personal? secondary sources; being
• determine suitable data sources required to generate data productive ICT users
components by selecting one of the data sources and
­ exploring and evaluating
 rules and limitations associated with using the data
 licenses that have been granted
­ symbolising data flow through a system using data flow
diagrams.

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 3 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors
Audiovisual activity: Investigating data
Individually, students:
• view the YouTube video, Google Maps API StreetView Service
• identify types of data elements capable of being drawn from the
Google street view API
In pairs, students:
• brainstorm how data could be used and what data could be
returned to make the street view API a richer experience for users
• prepare a pitch to Google, which identifies and communicates
improvements to sharing the data
• symbolise their digital solution using a mind map.

Collaborative activity: Internet of things


Following a classroom discussion about what constitutes the
‘internet of things’ and how it can transform society, students break
into pairs to:
• investigate and explore two internet of things products from a
teacher supplied list or brainstorming start map
• symbolise and explain possible data exchanges and data elements
• identify and evaluate constraints, threats, benefits and
opportunities.

4 hours 1, 3, 7 Topic 1: Digital methods for exchanging data Collaborative activity: Data privacy Literacy skills • Privacy law in Australia
• explain Australian Privacy Principles (2014) During a class discussion, students collaborate to: • comprehending texts through www.youtube.com/watch?v=MQc-
and ethics applicable to the use of personally • share their discoveries relating to data sharing listening, reading and viewing to UjE560A
identifiable or sensitive data from a digital • identify, explain and record data privacy issues in a mind map make meaning of digital • Australian Government, Office of
systems perspective. technologies text, words and the Australian Information
• identify risks and remedy ideas. visual knowledge Commissioner, ‘NPPs — Plain
Topic 2: Complex digital data exchange • composing texts through English summary’
problems and solution requirements As a class, students: speaking, writing and creating to www.oaic.gov.au/privacy-
• view the YouTube video, Privacy law in Australia, which will communicate information and law/privacy-archive/privacy-
• analyse problems and information to
introduce the Australian privacy principles. ideas to a variety of audiences resources-archive/npps-plain-
determine
english-summary
­ factors and risks that affect data security, Numeracy skills
In pairs, students: • That Instagram hack is shaping up
including confidentiality, integrity and • using numbers and number to be way bigger than anyone
availability, and privacy • explore and discuss the question, ‘Is privacy a right or a privilege?’ concepts in programming thought
­ prescribed and self-determined criteria to • complete answers to questions in the video. • interpreting statistical information www.youtube.com/watch?v=MFeP
appraise the implementation, e.g. through developing, testing and YnXdIio
protection, security and interactions. refining components
In groups, students: Extra information
• explore the Australian privacy principles resource, ‘NPPs — Plain 21st century skills • HealthITSecurity, ‘What are data
Topic 3: Prototype digital data exchanges English summary’ • critical thinking — analysing security concerns with healthcare
• evaluate • view the YouTube video, That Instagram hack is shaping up to be information to see or make new APIs?’
­ security impacts of data and its use, way bigger than anyone thought links to digital problems www.healthitsecurity.com/news/wh
dissemination, storage, accuracy and • collaboration and teamwork — at-are-data-security-concerns-with-
• analyse the identified problems with Instagram to identify factors
ownership on personal, social and economic relating to and interacting with healthcare-apis
and risks that affect data security, including confidentiality, privacy,
needs others to solve problems in digital • Cimpanu, C 2016, ‘Battery status
integrity and availability
­ and make justified recommendations related technology contexts API being removed from Firefox
• using the Australian privacy principles as prescribed criteria,
to the security impacts of digital solutions, • personal and social interactions — due to privacy concerns’, Bleeping
evaluate Instagram to determine whether the business meets or
taking into consideration changes in developing and demonstrating Computer LLC,
breaks each principle
interactivity and ways information and data adaptability and flexibility to create 2 November
are created, used and shared. • make justified recommendations for improving Instagram data www.bleepingcomputer.com/news/
digital solutions,
sharing. software/battery-status-api-being-
enhanced resilience, mindfulness,
open- and fair-mindedness, removed-from-firefox-due-to-
Class activity: Continuum self-awareness and the ability to privacy-concerns/
As a class, students: self-manage • Aisling Moloney 2017, ‘Google
Maps now lets anyone add to street

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 4 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors

• physically position themselves on a ‘right to privacy’ continuum • Information & communication view, if you have a very expensive
relating to open and free information technologies (ICT) skills — camera’, Metro News, 6 October
• explain and justify their position. accessing, collating, evaluating, www.metro.co.uk/2017/10/06/googl
analysing and presenting e-maps-now-lets-anyone-add-to-
information from primary and street-view-if-you-have-a-very-
As a class, students refer to the ‘risks and remedies’ mind map secondary sources; being expensive-camera-6980169
summary previously developed to: productive ICT users • Condé Nast — Wired videos,
• select some security-related elements, including encryption ‘Google Maps Is upgrading street
• explore methods of encryption as they relate to the following view and you can help’
processes: www.wired.com/video/2017/09/goo
­ transmission including key encryption via HTTPS (SSL) gle-maps-is-upgrading-street-view-
­ in-place data including encryption/decryption and hashing and-you-can-help
­ data access including username/passwords, for example
authentication tokens.
Allocate one security measure to each student, then students
individually:
• explore and investigate their security measure
• summarise how and where the security method is used, giving
examples.

8 hours 1, 2, 4, 6, 8 Topic 1: Digital methods for exchanging data Audiovisual activity: Cryptography/encryption Literacy skills • How Stuff Works 2018, ‘How
• recognise and describe As a class, students view the video, ‘How encryption works’. • comprehending texts through encryption works’
­ encryption and authentication strategies listening, reading and viewing to computer.howstuffworks.com/encry
appropriate for securing data transmissions make meaning of digital ption5.htm
Individually, students:
and their differences technologies text, words and • Microsoft, ‘.NET framework
• describe in a summary, the purpose of encryption and decryption
­ how data compression, encryption and visual knowledge cryptography model’
within databases specifically focusing on how this can be achieved
hashing are used in the storage and transfer within data stores • composing texts through docs.microsoft.com/en-
of data speaking, writing and creating to us/dotnet/standard/security/cryptogr
• explore, describe, compare and contrast application level
­ how simple algorithms consist of input, develop annotated drawings and aphy-model
encryption and storage, and database management system
process and output at various stages detailed specifications • Twenty C# Questions Explained —
storage procedure encryption processes
­ how useability principles are used to inform • composing texts through How to encrypt and decrypt a string
• identify and describe other potential encryption methods.
solution development speaking, writing and creating to in .NET
­ how the elements and principles of visual communicate information and www.youtube.com/watch?v=LbVR
In pairs, students: ideas to a variety of audiences wqrMnZs
communication inform user interface
development • identify, symbolise, explain, compare and contrast different data Numeracy skills • Hashing and password storage
storage encryption algorithms used in the industry (How to store passwords)
• symbolise and explain • estimating and calculating with
• determine quality characteristics and practical usage constraints or www.youtube.com/watch?v=z8tUW
­ secure data transmission techniques and whole numbers
limitations of each type of encryption algorithm. 8Z96dI
processes, including the use of encryption, • using numbers and number
decryption, authentication, hashing and • Encrypt your passwords with MD5
concepts in programming
checksums. Class activity: Encryption libraries hashing in C#
21st century skills www.youtube.com/watch?v=NiW5R
Lead the class to explore the resource, ‘.NET framework
• collaboration and teamwork — iPkQdI
Topic 2: Complex digital data exchange cryptography model’, to relate the exploration of cryptographs to
relating to and interacting with • Code Beautify, ‘Online encrypt
problems and solution requirements libraries available within visual studio.
others to solve problems in digital decrypt string’
• determine manageable aspects of a problem technology contexts codebeautify.org/encrypt-decrypt
through a decomposition and analysis of Exploration activity: What is hashing? Exploration of • Information & communication
encryption/decryption data scenario activities • What is CHECKSUM? What does
­ constraints technologies (ICT) skills — CHECKSUM mean? CHECKSUM
­ risks In pairs, students test and explore encryption/decryption data accessing, collating, evaluating, meaning, definition & explanation
scenarios (in preparation for later activities where they will verify their analysing and presenting
­ available tools and code libraries www.youtube.com/watch?v=9THS
coded solutions) by: information from primary and
­ data storage and output requirements ViMDQf4
• viewing the following videos and completing the simple secondary sources; being
­ data interface encryption/decryption activities productive ICT users
• explain the purpose of code and/or algorithm ­ How to encrypt and decrypt a string in .NET
statements using code comments and
­ Hashing and password storage (How to store passwords)
annotations. Extra information
­ Encrypt your passwords with MD5 hashing in C#
• MD5 Hash Tutorial — What the
• using the web resource, ‘Online encrypt decrypt string’, to replicate MD5 hash means and how to use it

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 5 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors
Topic 3: Prototype digital data exchanges these scenarios in a suitable programming environment. to verify file integrity
• use a suitable programming environment to www.youtube.com/watch?v=33QT7
­ implement algorithms using modularisation Individually, students: xohUvI
­ incorporate existing code libraries (where • explore different hashing algorithms, such as MD5, SHA256 and • Dream in code, ‘AES encryption
applicable) SHA512 and C# — A very basic intro to
cryptography In C#’
• manipulate data from an external source • evaluate the benefits and weaknesses of using each hashing www.dreamincode.net/forums/topic/
• generate within programmed methods algorithm 156922-aes-encryption-and-c%23
­ sequence • respond to the question, ‘How can MD5 still be used if weaknesses • Mudassar Ahmed Khan 2013,
­ selection, i.e. use of single and nested, exist?’ (Direct students to the concept of salt cryptography.) ‘Encrypt and decrypt username or
simple or compound conditions • use the YouTube video, Encrypt your passwords with MD5 password stored in database in
­ iterations, including nesting or simple or hashing in C#, and use teacher supplied code examples to ASP.Net using C# and VB.Net’,
compound conditions demonstrate MD5 hash (salt cryptography optional) ASP Snippets, 18 October
­ use of code-specific arithmetic comparison www.aspsnippets.com/Articles/Encr
and logical operators, including real division, Individual activity: Programming ypt-and-Decrypt-Username-or-
integer division, modulus Using a teacher provided database with security issues, students Password-stored-in-database-in-
analyse a security problem and individually generate a security ASPNet-using-C-and-VBNet.aspx
­ use of data types, error-checking functions
and conversions solution for the database by: • Nitansh, Agarwal, ‘SQL server
• specifying requirements using a system data flow diagram (DFD) column level encryption example
­ use of structures, including one-dimensional
and user interface (UI) sketch, with justification from a user and using symmetric keys’, MSSQL
collections, e.g. arrays and lists.
programming perspective Tips
www.mssqltips.com/sqlservertip/24
• developing a login algorithm 31/sql-server-column-level-
• generating a sample login page with data linkage encryption-example-using-
• developing an ‘on-the-fly hash’ of a user entered password symmetric-keys
• justifying their reasoning for the selected hash algorithm • C# Corner, ‘Convert string to MD5
• generating code to update the password to the datastore, using in SQL server’
hash and update SQL. www.c-
sharpcorner.com/blogs/convert-
string-to-md5-in-sql-server
Group activity: What is a checksum?
• DreamInHex 2006, ‘Using MD5
Students: encryption with C# and MSSQL
• view the YouTube video, What is CHECKSUM? What does 2000’, Code Project, 10 October
CHECKSUM mean? CHECKSUM meaning, definition & www.codeproject.com/Articles/1260
explanation 2/Using-MD-Encryption-with-C-and-
• use MD5 checksums to apply the instructions to a MSSQL
self-selected file, then transmit the file to another member of the
group via email and perform a checksum on the received file.

6 hours 1, 2, 3, 4, 6 Topic 1: Digital methods for exchanging data Individual activity: Exploring the OSI model Literacy skills • CCNA Training, ‘Open systems
• recognise and describe Students: • composing texts through interconnection (OSI) model
­ encryption and authentication strategies • use the ‘Open systems interconnection (OSI) model tutorial’ to speaking, writing and creating to tutorial’
appropriate for securing data transmissions explore and explain the develop annotated drawings and www.9tut.com/osi-model-tutorial
and their differences ­ OSI model detailed specifications • OSI model explained —
­ how data compression, encryption and • composing texts through Real-world example
­ seven layers of the OSI model
hashing are used in the storage and transfer speaking, writing and creating to www.youtube.com/watch?v=LANW
 application 3m7UgWs
of data communicate information and
 presentation ideas to a variety of audiences • Lifewire, ‘The layers of the OSI
­ how simple algorithms consist of input,
 session model illustrated’
process and output at various stages Numeracy skills
 transport www.lifewire.com/layers-of-the-osi-
• explain • using numbers and number
 network model-illustrated-818017
­ network transmission principles, including concepts in programming
latency, jitter, guarantee and timeliness of  data link
• interpreting statistical information
delivery, and protocols relevant to the  physical
through developing, testing and
transmission of data over the internet, e.g. • summarise definitions for each layer of the OSI model refining components • What is HTTP and why web is built
HTTP, HTTPS, FTP, VPN, streaming and • identify and describe examples within the application/presentation on it?
21st century skills
broadcasting data packets and session layers. www.youtube.com/watch?v=4_-
• critical thinking — analysing KdOLZWLs
­ methods for data exchange used to transfer
information to see or make new

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 6 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors
data across networked systems, e.g. REST, In pairs, students use the internet as a resource to: links to digital problems • W3Schools, ‘HTTP request
JSON and XML • view the YouTube video, OSI model explained — Real-world • creative thinking — generating methods: Compare GET vs. POST’
• describe data using appropriate naming example and applying new ideas to create www.w3schools.com/tags/ref_http
conventions, data formats and structures and identify strategies to develop methods.asp
• explore, symbolise and explain network transmission basics,
• symbolise and explain secure data packet switching across networks and network latency innovative solutions • Man-in-the-Middle Attacks —
transmission techniques and processes, • identify which OSI layers are responsible for packet switching, • collaboration and teamwork — CompTIA Security+ SY0–401: 3.2
including the use of encryption, decryption, using standards like TCP/IP relating to and interacting with www.youtube.com/watch?v=p4pLV
authentication, hashing and checksums. others to solve problems in digital N_hVsU
• analyse and explore compounding network issues, including
technology contexts • Comodo CA Limited 2018, ‘What is
bandwidth, throughput, round-trips and latency
Topic 2: Complex digital data exchange HTTPS? HTTP vs HTTPS’
• explore packet jitter and the issues it causes along with network www.instantssl.com/ssl-certificate-
problems and solution requirements layer (jitter buffer) products/https.html
• analyse and explain a system’s data process • write a description of each layer and its purpose.
by developing data flow diagrams that link • REST API concepts and examples
external entities, data sources, processes and www.youtube.com/watch?v=7YcW
data storage In groups, students symbolise in a mind map the answers to the 25PHnAA
following questions: • Step-by-step tutorial — C# REST
• determine data sources required to generate
data components • What is security over networks? client
• Why is it important? www.youtube.com/watch?v=11f5Kz
• symbolise algorithmic steps as pseudocode.
VNQ90
• What are some real-world examples?
• Microsoft, ‘Build RESTful APIs with
Topic 3: Prototype digital data exchanges • How do these real-world examples operate?
ASP.NET Web API’
• use a suitable programming environment to https://docs.microsoft.com/en-
­ receive data from an external source, and Support students to: us/aspnet/web-api/overview/older-
process and display the data in an • read and discuss, ‘The layers of the OSI model illustrated’ and the versions/build-restful-apis-with-
appropriate format ‘OSI model explained — real-world example’ aspnet-web-api
­ incorporate existing code libraries (where • find examples of data security issues in the stack Extra information
applicable) • categorise the examples of ISO levels. • Finjan Team 2016, ‘Application
• manipulate data from an external source layer security and the OSI model’,
• generate within programmed methods Finjan Cybersecurity,
In groups, students focus on data security to:
11 October
­ sequence • identify and explain security and vulnerabilities at each ISO level blog.finjan.com/application-layer-
­ selection, i.e. use of single and nested, • compare and contrast security methods between session and security-and-the-osi-model/
simple or compound conditions application levels
­ iterations, including nesting or simple or • identify and explain the principles, standards and/or protocols used
compound conditions at each level.
­ use of code-specific arithmetic comparison
and logical operators, including real division,
Audiovisual activity: ‘What is http?’
integer division, modulus
­ use of data types, error-checking functions Students view the YouTube video, What is HTTP and why web is
and conversions built on it? and record their understanding of basic network
transmission principles as they relate to the transfer of information.
­ use of structures, including one-dimensional
collections, e.g. arrays and lists
Analysis activity: HTTP overview, parameters, requests,
• generate a prototype digital solution that uses
responses and methods
appropriate data structures including JSON or
XML, to exchange data. Students:
• read the resource, ‘HTTP request methods: Compare GET vs.
POST’, then identify core features of HTTP
• analyse and summarise ‘GET’ and ‘POST’ methods and provide
several examples for each.

Audiovisual activity: Identification of web security problems


In pairs, students:
• view the YouTube video, Man-in-the-Middle Attacks — CompTIA
Security+ SY0–401: 3.2 to better understand security issues and
the importance of web security
• explore the website, ‘What is HTTPS? HTTP VS HTTPS’

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 7 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors

• apply the problem-solving process to evaluate whether HTTPS


could be a solution for the identified eavesdropping problem
• investigate web data-interconnections to find information that
justifies the statement, ‘It isn’t just humans generating requests via
a web browser’
• view the YouTube video, REST API concepts and examples and
generate a proposal with examples identifying how RESTful Web
Services and its representational state protocol might also be used
to solve this problem
• write a response to the following questions / tasks
­ How does REST use HTTP to transfer information?
­ What are the characteristics of HTTP requests for REST?
­ describe a header and rest payload and give examples
­ compare and contrast JSON and XML scenarios
­ How is a JSON request made secure using
 access tokens, for oauth or oauth2
 SSL?

Think-Pair-Share activity: What is a REST Web API?


In groups, students:
• identify two different REST Web API services freely available and
explain the features, access methods and sample GET/POST
requests
• share their findings with the class
• summarise the findings and highlight common threads, such as
data requests and data returns. (The teacher should help guide
students to carefully do this.)
Individually, students:
• view the YouTube video, Step-by-step tutorial — C# REST client
and generate a basic REST API from C# using Visual Studio
• generate a simple web API using ASP.NET (C#) by doing the
Microsoft exercises, ‘Build RESTful APIs with ASP.NET Web API’.

6 hours 1, 6, 7 Topic 1: Digital methods for exchanging data Investigation activity: Adding a local structured data store to Literacy skills • Robles, P 2018, ‘Eagle eye updates
• recognise and describe the application (from the previous activity) using web API • composing texts through its video API platform’,
requests speaking, writing and creating to Programmable Web, 26 January
­ encryption and authentication strategies
appropriate for securing data transmissions In pairs, students consider the following two models: develop annotated drawings and www.programmableweb.com/news/
and their differences • Model 1 — use structured data and a web API to pass/update data detailed specifications eagle-eye-updates-its-video-api-
to/from distant consumers • composing texts through platform/brief/2018/01/26
­ how data compression, encryption and
hashing are used in the storage and transfer speaking, writing and creating to Extra information
• Model 2 — value add data with mashed data from web REST
of data services to a data-driven application. communicate information and • PostgreSQL studio
• explain For each model: ideas to a variety of audiences www.postgresql.org
­ network transmission principles, including ­ explore whether structured local data stores and inter-connected Numeracy skills • W3Resource 2018, ‘PostgresSQL
latency, jitter, guarantee and timeliness of data could be used in conjunction with each other • interpreting statistical information tutorial’
delivery, and protocols relevant to the ­ read the article, ‘Eagle eye updates its video API platform’ and through developing, testing and www.w3resource.com/PostgreSQL/
transmission of data over the internet, e.g. scope out two possible mashed data-driven applications that use refining components tutorial.php
HTTP, HTTPS, FTP, VPN, streaming and a REST data source and a localised database • using spatial reasoning to work
broadcasting data packets ­ identify a typical REST response dataset and requirements of • Access PostgreSQL from C# on
with digital models
­ methods for data exchange used to transfer the solution Windows 10
• recognising and using patterns
data across networked systems including ­ list and explain REST calls to be made www.youtube.com/watch?v=xdkXJ
and relationships during
REST, JSON and XML nyPPBs
­ evaluate it against the following criteria — effectiveness, viability, computational thinking when
• describe data using appropriate naming performance and need — and justify the chosen solution. planning, developing and • Using PostgreSQL with .NET Core
conventions, data formats and structures. generating best-fit solutions 2.0
21st century skills www.youtube.com/watch?v=md20l
As a class, students:

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 8 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors
Topic 2: Complex digital data exchange • vote on the best student-derived solution to be used in the next • critical thinking — analysing Qut9EE
problems and solution requirements activity information to see or make new
• communicate using • use a teacher provided database plan, to generate a database for links to digital problems
­ digital technologies–specific language this solution in PostgreSQL. • creative thinking — generating
­ language conventions; textual features such and applying new ideas to create
as annotations, paragraphs and sentences; Individual exploration activity: Exploration of SQL and identify strategies to develop
and referencing conventions to convey innovative solutions
Students explore how the following SQL statements can be used to
information to particular audiences about generate and edit a datastore that supports a data exchange • Information & communication
digital solutions solution: technologies (ICT) skills —
­ the modes of visual, written and spoken accessing, collating, evaluating,
• SQL CREATE, DROP and ALTER statements
communication to present data and analysing and presenting
• SQL INSERT and UPDATE information from primary and
information about digital solutions.
secondary sources; being
productive ICT users
Topic 3: Prototype digital data exchanges
• generate data structures using
­ SQL CREATE, DROP and ALTER
statements
­ SQL INSERT and UPDATE
­ SQL SELECT query, including WHERE,
GROUP BY, HAVING, ORDER BY,
sub-selection and inner-joins clauses.

16 hours 1, 2, 3, 6, 8 Topic 1: Digital methods for exchanging data State crime data case study: Modelling success Literacy skills
• recognise and describe Students use systems thinking and a teacher-generated internal • comprehending texts through
­ encryption and authentication strategies simulated QLD Police database including crimes, locations, listening, reading and viewing to
appropriate for securing data transmissions suspects, evidence etc. to generate a proposal of how the class- make meaning of digital
and their differences selected case solution (data exchange program) will be developed, technologies text, words and
­ how data compression, encryption and including the: visual knowledge
hashing are used in the storage and transfer • identification of prescribed and self-determined criteria • composing texts through
of data. • database speaking, writing and creating to
• de-identification of data develop annotated drawings and
detailed specifications
Topic 2: Complex digital data exchange • programming environment
problems and solution requirements • composing texts through
• SQL statements speaking, writing and creating to
• analyse problems and information to • security within the database – hashing of password communicate information and
determine
• transmission security requirements ideas to a variety of audiences
­ boundary of scope of given problems
• data flow diagram (DFD) of functionality Numeracy skills
­ constraints and limitations of environments
­ requirements of the solution components • success criteria — evaluating impacts such as security and privacy • interpreting statistical information
­ necessary coded modularity and features • use of JSON and XML with reasons and justifications through developing, testing and
• pseudocode of data interactions refining components
­ factors and risks that affect data security,
including confidentiality, integrity and • testing plan • using spatial reasoning to work
availability, and privacy with digital models
• evaluation of the proposed solution against prescribed and
­ existing code within inbuilt libraries self-determined criteria with justified recommendations for • recognising and using patterns
improvement. and relationships during
­ prescribed and self-determined criteria to
computational thinking when
appraise the implementation, e.g.
planning, developing and
protection, security and interactions
generating best-fit solutions
• analyse, evaluate and make refinements to 21st century skills
data to ensure completeness, consistency and
integrity. • critical thinking — analysing
information to see or make new
links to digital problems
Topic 3: Prototype digital data exchanges
• creative thinking — generating
• synthesise information and ideas to determine and applying new ideas to create
prototype components of data exchange and identify strategies to develop
solutions innovative solutions

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 9 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors

• generate data structures using • collaboration and teamwork —


­ SQL CREATE, DROP and ALTER relating to and interacting with
statements others to solve problems in digital
­ SQL INSERT and UPDATE technology contexts
SQL SELECT query, including WHERE, • personal and social interactions —
GROUP BY, HAVING, ORDER BY, developing and demonstrating
sub-selection and inner-joins clauses adaptability and flexibility to create
digital solutions, enhanced
• evaluate
resilience, mindfulness, open- and
­ the solution against prescribed and fair-mindedness, self-awareness
self-determined criteria and the ability to self-manage
­ solutions by testing to refine their accuracy, • Information & communication
reliability, maintainability, efficiency, technologies (ICT) skills —
effectiveness and useability accessing, collating, evaluating,
­ and make justified recommendations related analysing and presenting
to the security impacts of digital solutions, information from primary and
taking into consideration changes in secondary sources; being
interactivity and ways information and data productive ICT users
are created, used and shared.

6 hours 6 Topic 3: Prototype digital data exchanges Individual activity: Advanced SQL tasks Literacy skills • W3Resource 2018, ‘SQL exercises,
• generate data structures using Students generate data structures by completing the activities, ‘SQL • comprehending texts through practice, solution’
­ SQL CREATE, DROP and ALTER exercises, practice, solution’ and ‘SQLCourse2.com exercises’ listening, reading and viewing to www.w3resource.com/sql-exercises
statements relating to: make meaning of digital • IT Business Edge,
­ SQL INSERT and UPDATE • SELECT – multiple conditions technologies text, words and ‘SQLCourse2.com exercises’
• GROUP BY / HAVING visual knowledge www.sqlcourse2.com/intro2.html
­ SQL SELECT query, including WHERE,
GROUP BY, HAVING, ORDER BY, • subqueries • composing texts through • PostgreSQL Exercises, ‘Joins and
sub-selection and inner-joins clauses. speaking, writing and creating to subqueries’
• inner joins. communicate information and www.pgexercises.com/questions/joi
ideas to a variety of audiences ns
Supply students with a relational schema and data dictionary, so
Numeracy skills
they can:
• using spatial reasoning to work
• create a new database
with digital models
• create and alter tables
• recognising and using patterns
• generate insert queries to enter new records and relationships during
• provide testing scenarios to update existing data computational thinking when
• generate SQL commands to delete records based on a WHERE planning, developing and
condition. generating best-fit solutions
21st century skills
Individually, students use a teacher-supplied data source and • creative thinking — generating
complex SQL examples from the resource, ‘Joins and subqueries’ to and applying new ideas to create
determine and generate data structures using SQL queries that: and identify strategies to develop
• GROUP data (GROUP BY) innovative solutions
• filter GROUPED data (GROUP BY HAVING) • collaboration and teamwork —
relating to and interacting with
• involve table joins others to solve problems in digital
• involve table joins and grouped data (GROUP BY) technology contexts
• use sub queries to present data results • Information & communication
• use sub queries and data grouping to present data results technologies (ICT) skills —
• could involve a combination of grouping, table joins or subqueries. accessing, collating, evaluating,
analysing and presenting
information from primary and
secondary sources; being
productive ICT users

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 10 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors

6 hours 1, 2, 7, 8 Topic 1: Digital methods for exchanging data Audiovisual activity: Overview of symmetric and asymmetric Literacy skills • Symmetric vs. Asymmetric
• recognise and describe cryptography • comprehending texts through encryption — CompTIA Security+
­ encryption and authentication strategies Individually, students: listening, reading and viewing to SY0-401:6.1
appropriate for securing data transmissions • view the YouTube video, Symmetric vs. Asymmetric encryption — make meaning of digital www.youtube.com/watch?v=z2aue
and their differences CompTIA Security+ SY0-401:6.1 technologies text, words and ocJE8Q
­ features of symmetric (Data Encryption • download, read and explore the ‘Classical encryption techniques’ visual knowledge • Salem, O 2013. ‘Classical
Standard — DES, Triple DES, AES — application • composing texts through encryption techniques’,
Advanced Encryption Standard, Blowfish • using ‘Classical encryption techniques’ explore the application and speaking, writing and creating to CodeProject,1 March
and Twofish) and assymetric (RSA) supplied code and test sample (demo) encryptions communicate information and www.codeproject.com/Articles/6343
encryption algorithms ideas to a variety of audiences 2/Classical-Encryption-Techniques
• summarise their understanding of how encryption algorithms
­ how data compression, encryption and (ciphers) are deployed by describing symmetric and asymmetric Numeracy skills • Khan Academy 2018, ‘The Caesar
hashing are used in the storage and transfer cryptography. cipher’
• using numbers and number
of data www.khanacademy.org/computing/
concepts in programming
­ how simple algorithms consist of input, computer-
Individually, students: • interpreting statistical information science/cryptography/crypt/v/caesa
process and output at various stages
• view the video, ‘The Caesar cipher’ through developing, testing and r-cipher
• symbolise and explain the basic constructs of refining components
an algorithm, including assignment, sequence, • use the ‘Classical encryption techniques’ application to generate • Crypto Corner, ‘Cryptography
examples of Caeser ciphers • using spatial reasoning to work worksheet —The Caesar Shift’
selection, condition, iteration and
with digital models (PDF)
modularisation • complete the ‘Cryptography worksheet —The Caesar Shift’
• recognising and using patterns www.crypto.interactive-
• symbolise, analyse and evaluate Caesar, • symbolise algorithmic steps as pseudocode by generating an
and relationships during maths.com/uploads/1/1/3/4/113457
Polyalphabetic (e.g. Vigenere and Gronsfield), encryption and decryption algorithm
computational thinking when 55/shift.pdf
and one-time pad encryption algorithms • complete further activities from the ‘Cryptography worksheet’ and planning, developing and • The John Hopkins University
• symbolise representations of a digital solution. unpack classical encryption algorithms (ciphers) with increased generating best-fit solutions Applied Physics Laboratory LLC,
complexity.
21st century skills ‘Cryptography worksheet’ (PDF)
Topic 2: Complex digital data exchange • critical thinking — analysing https://secwww.jhuapl.edu/MESA/H
problems and solution requirements The following three encryption algorithms (ciphers) demonstrate information to see or make new ome/MESADays
• symbolise algorithmic steps as pseudocode symmetric encryption: Vigenère Cipher, One-time Pad and Playfair links to digital problems • 5. Simplified Data Encryption
Cipher. Students individually: Standard (SDES) — Simplified
• communicate using • creative thinking — generating
­ digital technologies–specific language • explore and identify three online examples for each and then and applying new ideas to create DES — with an example
symbolise them in pseudocode and identify strategies to develop www.youtube.com/watch?v=QcKHf
­ language conventions; textual features such
• ‘Bench test’ algorithms by swapping with another student across innovative solutions Mgcnbw
as annotations, paragraphs and sentences;
and referencing conventions to convey the classroom. • collaboration and teamwork — • Gordon, S 2011, ‘Block ciphers and
information to particular audiences about relating to and interacting with DES’ (PDF), Sirindhorn
digital solutions In pairs, students: others to solve problems in digital International Institute of Technology
­ the modes of visual, written and spoken technology contexts Thammasat University, 29
• use annotated pseudocode to symbolise and explain a unique
communication to present data and December
encryption/decryption algorithm (could use a combination of • personal and social interactions —
information about digital solutions. ict.siit.tu.ac.th/~steven/css322y11s
existing algorithms) developing and demonstrating
2/unprotected/CSS322Y11S2L03-
• generate sample code snippets to test and evaluate the adaptability and flexibility to create
Block-Ciphers-and-DES.pdf
Topic 3: Prototype digital data exchanges algorithms. digital solutions, enhanced
resilience, mindfulness, • Matovic, S 2003, ‘The RSA
• develop simple Caesar, Polyalphabetic algorithm explained using simple
open- and fair-mindedness,
(e.g. Vigenere and Gronsfeld), and one-time At home, students view the video, 5. Simplified Data Encryption pencil and paper method’, Serge
self-awareness and the ability
pad encryption algorithms Standard (SDES) — Simplified DES — with an example, and read Matovic, 14 August
to self-manage
• generate a well-ordered and unambiguous the PDF document, ‘Block ciphers and DES’. sergematovic.tripod.com/rsa1.html
• Information & communication
algorithm to solve defined problems using • Rhyous, ‘The step-by-step RSA
technologies (ICT) skills —
pseudocode In groups, students: algorithm’
accessing, collating, evaluating,
• evaluate by desk checking algorithms to • explore commonly used modern encryption algorithms (ciphers), analysing and presenting www.rhyous.com/2011/10/27/the-
predict the output for a given input, identify for example AES, PGP, Triple-DES and Blowfish information from primary and step-by-step-rsa-algorithm
errors and validate algorithms secondary sources; being
• identify and describe the following features used in the encryption
• evaluate solutions by testing to refine their algorithms (ciphers) productive ICT users Extra information
accuracy, reliability, maintainability, efficiency, • Michigan Technological University
effectiveness and useability. ­ rearrangement
­ shifts — Information Technology, ‘The
Vigenère cipher encryption and
­ swaps decryption’
­ XOR www.pages.mtu.edu/~shene/NSF-
­ expansion 4/Tutorial/VIG/Vig-Base.html

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 11 of 12
Notional Unit objectives Subject matter Sample learning experiences Teaching and learning Possible resources
hours — underpinning factors
­ split • Tutorials Point, ‘Cryptography just
• use the flow chart algorithm from 5:36 minutes into the video, for beginners’ (PDF)
5. Simplified Data Encryption Standard (SDES) — Simplified DES www.tutorialspoint.com/cryptograph
— with an example’, and the PDF document, ‘Block Ciphers and y/cryptography_tutorial.pdf
DES’ to develop a key generation algorithm in pseudocode • Khan Academy 2018, ‘The one-
• use these ideas to develop an encryption/decryption algorithm in time pad’
pseudocode. www.khanacademy.org/computing/
computer-
science/cryptography/crypt/v/one-
As a class, students:
time-pad
• discuss asymmetric cryptography
• Code.Org, ‘Lesson 6: Encryption
• review the YouTube video, Symmetric vs. Asymmetric encryption with keys and passwords’
— CompTIA Security+ SY0-401:6.1. (The teacher should highlight curriculum.code.org/csp/unit4/6/#en
links to the OSI model, specifically SSL and TLS in HTTPS.) cryption-with-keys-and-passwords9
• Khan Academy 2018, ‘Encryption
In pairs, students: and public keys’
• read ‘The RSA algorithm explained using simple pencil and paper www.khanacademy.org/computing/
method’ and complete ‘The step-by-step RSA algorithm’ learning computer-science/internet-
exercise intro/internet-works-intro/v/the-
• generate an algorithm in pseudocode to desk check (The teacher internet-encryption-and-public-keys
should support students to do this by reviewing individual progress
and offering help as needed)
• demonstrate a desk check of the algorithm to ensure it encrypts
and decrypts
• refine the solutions’ accuracy, reliability, maintainability, efficiency,
effectiveness and useability after desk checking.

Digital Solutions 2019 v1.2 Queensland Curriculum & Assessment Authority


Unit 4 sample teaching, learning and assessment plan June 2018
Page 12 of 12

You might also like