Standards in this Framework
Standard | Description |
---|---|
R1 | R1) Identify, demonstrate, and apply personal safe use of digital devices. |
R2 | R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules. |
R3 | R3) Assess the validity and identify the purpose of digital content. |
R4 | R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues. |
R5 | R5) Locate and curate information from digital sources to answer research questions. |
R6 | R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools. |
1 | Remove background details from an everyday process to highlight essential properties. Examples: When making a sandwich, the type of bread, condiments, meats, and/or vegetables do not affect the fact that one is making a sandwich. |
2 | Define a process as a function. Example: Functions or sets of steps combined to produce a process: turning off your alarm + getting out of bed + brushing your teeth + getting dressed = morning routine. |
3 | Create pseudocode that uses conditionals. Examples: Using if/then/else (If it is raining then bring an umbrella else get wet). |
4 | Differentiate between flowcharts and pseudocode. Example: Flowcharts use shapes to indicate what to do at each step while pseudocode uses text. |
5 | Identify algorithms that make use of sequencing, selection or iteration. Examples: Sequencing is doing steps in order (put on socks, put on shoes, tie laces); selection uses a Boolean condition to determine which of two parts of an algorithm are used (hair is dirty? True, wash hair; false, do not); iteration is the repetition of part of an algorithm until a condition is met (if you’re happy and you know it clap your hands, when you’re no longer happy you stop clapping). |
6 | Identify steps in developing solutions to complex problems using computational thinking. |
7 | Describe how automation works to increase efficiency. Example: Compare the amount of time/work to hand wash a car vs. using an automated car wash. |
8 | Create a program that initializes a variable. Example: Create a flowchart in which the variable or object returns to a starting position upon completion of a task. |
9 | Differentiate between a secure and a non-secure website including how they affect personal data. Example: HTTP vs. HTTPS. |
10 | Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution. |
11 | Differentiate between appropriate and inappropriate digital content and the use of that content. |
12 | Define digital permanence. |
13 | Define personal privacy, digital footprint, and open communication. |
14 | Discuss digital globalization and Internet censorship. Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content. |
15 | Identify emerging technologies in computing. |
16 | Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems. |
17 | Type 30 words per minute with 95% accuracy using appropriate keyboarding techniques. |
18 | Define censorship. |
19 | Track data change from a variety of sources. Example: Use editing or versioning tools to track changes to data. |
20 | Identify data transferring protocols, visualization, and the purpose of data and methods of storage. Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database. |
21 | Identify varying data structures/systems and methods of classification, including decimal and binary. Examples: Difference between a bit and a byte, bit representation, pixels. |
22 | Summarize the purpose of the American Standard Code for Information Interchange (ASCII). |
23 | Discuss how digital devices may be used to collect, analyze, and present information. |
24 | Compare and contrast types of networks. Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet. |
25 | Differentiate between secure and non-secure systems. |
26 | Explain why professionals may use models as logical representations of physical, mathematical, or logical systems or processes. Example: Students will discuss why an engineer may build a model of a building before actually constructing the building. |
27 | Explain how simulations serve to implement models. |
28 | Define assistive technologies and state reasons they may be needed. |
29 | Define artificial intelligence and identify examples of artificial intelligence in the community. Examples: Image recognition, voice assistants. |
30 | Discuss and apply the components of the problem-solving process. Example: Students will devise a plan to alleviate traffic congestion around the school during drop-off and pick-up. |