Upon completion of the Data Structures lesson, students will:
1) Develop a program to validate input,
2) Test whether inputs to a program are producing the expected output, and
3) Represent data in various types, including numbers, strings, lists, and Booleans.
All materials in this Cybersecurity Concept Lesson is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5). C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.