- Home
- /
- CS Thinking
- /
- Systems, Networks & Impact
Systems, Networks & Impact
16 concepts in CS Thinking
Systems, networks, and the impact of computing explore the infrastructure that makes modern digital life possible and the responsibilities that come with it. Students learn what a computing system is — hardware and software working together — and how operating systems manage resources, storage, and files. They study computer networks from local connections to the global internet, understanding how data travels in packets following agreed-upon protocols and how encryption helps protect information in transit. The topic extends to the societal dimensions of computing: cybersecurity and how we protect systems from attack, privacy and how personal data is collected and used, intellectual property and the rights of creators, accessibility and inclusive design, and the ethical questions that arise as computing reshapes work, communication, and society. In upper grades, this strand also introduces modern topics such as parallel computing and artificial intelligence so students understand not just how technology works, but how to use it responsibly and think critically about its effects.
Suggested learning path: Start with computing systems, operating systems, and storage, then study networks, packets, protocols, and encryption, and finally explore cybersecurity, privacy, AI, ethics, and the broader impacts of computing on society.
Hardware & Software
Hardware is the physical components of a computer (processor, memory, storage, peripherals) that you can touch. Software is the set of instructions (programs) that tell hardware what to do. Together they form a complete computing system—hardware provides the capability, and software provides the purpose.
Computing System
A complete, functioning combination of hardware, software, and data that processes information and performs tasks. Computing systems follow the input-process-output model: they receive data, process it according to programmed instructions, and produce results.
Operating System
System software that manages hardware resources (processor, memory, storage, devices) and provides services for application programs. The operating system acts as the intermediary between the user and the hardware, handling tasks like multitasking, file management, and device communication.
Storage
Storage is the part of a computing system that keeps data over time, even when the power is turned off. Files, photos, apps, and operating systems all live in storage devices such as SSDs, hard drives, and flash memory.
Network
A group of interconnected computing devices that can communicate and share resources with each other. Networks range from small local area networks (LANs) connecting devices in one building to wide area networks (WANs) spanning cities or countries, up to the global internet.
Internet
A global network of interconnected computer networks that communicate using standardized protocols (TCP/IP). The internet is decentralized—no single authority controls it. It connects billions of devices worldwide by routing data as packets through a shared infrastructure of cables, routers, and wireless links.
Packet
A small unit of data transmitted over a network, containing both the data payload (the actual information) and routing information in headers (source address, destination address, sequence number). Large messages are split into many packets, sent independently, and reassembled at the destination.
Protocol
A set of rules that define how data is formatted, transmitted, and received over a network. Protocols specify message formats, sequencing, error handling, and authentication so that devices from different manufacturers can communicate reliably.
Cybersecurity
The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity encompasses three core goals: confidentiality (only authorized users can access data), integrity (data is not tampered with), and availability (systems remain operational).
Privacy
The right of individuals to control what personal information is collected about them, how it is stored, who can access it, and how it is used. Digital privacy encompasses data collection practices, consent mechanisms, encryption, and legal protections like GDPR.
Encryption
Encryption is the process of transforming readable data into an unreadable form so only someone with the right key can recover the original message. It is used to protect stored files, passwords, and data moving across networks.
Intellectual Property
Legal rights that protect creations of the mind — inventions, literary and artistic works, designs, symbols, names, and images used in commerce. In computing, intellectual property covers software licenses, open source agreements, Creative Commons content, patents on algorithms, and fair use provisions.
Accessibility
The design of products, devices, and environments so that people with disabilities can use them effectively. Accessibility (often abbreviated a11y) includes features like screen readers, captions, keyboard navigation, high-contrast modes, and alt-text for images.
Parallel Computing
Parallel computing is the practice of dividing work so multiple processors, cores, or computers can perform parts of the computation at the same time. It is useful when one large task can be separated into smaller tasks that can run together.
Artificial Intelligence
Artificial intelligence is the field of building systems that perform tasks that normally require human-like perception, pattern detection, prediction, or decision making. Many AI systems learn patterns from large sets of data rather than following only hand-written rules.
Ethics of Computing
The study of moral issues and responsibilities that arise from the development and use of computing technology. Computing ethics examines questions of fairness, bias, privacy, intellectual property, environmental impact, and the societal consequences of automation and artificial intelligence.