Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
SC.6.CC.1.1
Demonstrate an ability to communicate through various online tools. |
|
SC.6.CC.2.1
Create a digital product individually and collaboratively. |
|
SC.6.CO.1.1
Identify multiple file format types. |
|
SC.6.CO.1.2
Identify applications that have different desktop and online versions. |
|
SC.6.CO.1.3
Identify the differences between wired and wireless computer networks. |
|
SC.6.CO.1.4
Describe how information is translated and communicated between computers and devices over a network. |
|
SC.6.CO.1.6
Research questions using digital information resources. |
|
SC.6.CO.2.1
Identify and describe the major hardware components and functions of computer systems. |
|
SC.6.CO.3.1
Describe the essential characteristics of a software artifact. |
|
SC.6.CO.3.2
Describe the main functions of an operating system. |
|
SC.6.CO.3.3
Explain how an operating system provides user and system services. |
|
SC.6.CO.3.4
Describe the major software components and functions of computer systems. |
|
SC.6.CO.3.5
Evaluate various forms of input and output (IO) and peripheral devices. |
|
SC.6.CS.1.1
Define the states of data. |
|
SC.6.CS.1.2
Illustrate the concept of access control and how to limit access to authorized users. |
|
SC.6.CS.1.3
Discuss the importance of cybersecurity. |
|
SC.6.CS.1.4
Determine information that should remain confidential. |
|
SC.6.CS.1.5
Identify the need for encryption. |
|
SC.6.CS.1.6
Recognize the importance of digital identity. |
|
SC.6.CS.2.1
Identify the need for security safeguards on personal devices. |
|
SC.6.ET.1.1
Identify technology used to support specialized forms of human- computer interaction (HCI). |
|
SC.6.ET.2.1
Identify the characteristics of Artificial Intelligence (AI). |
|
SC.6.ET.2.2
Discuss the benefits associated with Artificial Intelligence (AI). |
|
SC.6.ET.3.1
Explain why some tasks can be accomplished faster by computers. |
|
SC.6.ET.3.2
Describe how humans and machines interact to accomplish tasks that neither can accomplish alone. |
|
SC.6.HS.1.1
Identify the connection between strong passwords and Internet safety. |
|
SC.6.HS.1.2
Discuss the need for downloads to come from trusted sources. |
|
SC.6.HS.1.3
Describe safe practices when participating in digital communication. |
|
SC.6.HS.1.4
Evaluate a given website to determine if it is safe for users. |
|
SC.6.HS.2.1
Define the online disinhibition effect. |
|
SC.6.HS.2.2
List negative impacts of excessive device usage. |
|
SC.6.HS.2.3
Implement the 20-20-20 rule for technology. |
|
SC.6.HS.3.1
Explore the impact that digital media and communication has on our behavior. |
|
SC.6.TI.1.1
Recognize the data content sources that make your digital footprint. |
|
SC.6.TI.1.2
Explore the history of computer and other devices. |
|
SC.6.TI.1.3
Create a timeline for the innovation of an electronic device. |
|
SC.6.TI.1.4
Describe various technology-related career paths. |
|
SC.6.TI.2.1
Recognize the consequences of plagiarism on the development of creative works. |
|
SC.6.TI.2.2
Demonstrate compliance with the school’s Acceptable Use Policy. |
|
SC.6.TI.2.3
Explain fair use for using copyrighted materials. |
|
SC.6.TI.2.4
Generate citations for text and non-text sources using a digital tool. |
|
SC.7.CC.1.1
Apply multimedia tools for local and global group collaboration. |
|
SC.7.CC.1.2
Identify productivity tools for collaboration. |
|
SC.7.CC.1.3
Identify individual roles within a collaborative team. |
|
SC.7.CC.2.1
Organize compiled information using a digital tool. |
|
SC.7.CC.2.2
Analyze one’s own ideas with research-based information to create a unique digital artifact. |
|
SC.7.CO.1.1
Identify the kinds of content associated with different file types. |
|
SC.7.CO.1.2
Differentiate between different file types. |
|
SC.7.CO.1.3
Describe the relationship between hardware and software. |
|
SC.7.CO.1.4
Utilize a set of websites to find information for a given topic. |
|
SC.7.CO.1.5
Utilize government websites to facilitate civic engagement. |
|
SC.7.CO.1.6
Describe strategies for determining the reliability of resources or information on the Internet. |
|
SC.7.CO.2.1
Explain the difference between wired, local area, wireless and mobile networks. |
|
SC.7.CO.2.2
Identify and describe the function of the main internal parts of a basic computing device. |
|
SC.7.CO.2.4
Explain the connection of natural resources on the manufacturing of computer hardware components. |
|
SC.7.CO.3.1
Differentiate between desktop applications and software as a service (SaaS). |
|
SC.7.CS.1.1
Describe data in its three states and potential threats to each state. |
|
SC.7.CS.1.2
Explain the concept of access control and how to limit access to authorized users. |
|
SC.7.CS.1.3
Examine the basics of cybersecurity needs for business, government and organizations. |
|
SC.7.CS.1.4
List and define the elements of the confidentiality, integrity and availability (CIA) triad. |
|
SC.7.CS.1.5
Explain components of access control. |
|
SC.7.CS.1.6
Identify the characteristics of strong versus weak passwords in data and identity security. |
|
SC.7.CS.1.7
Explain the proper use and operation of security technologies. |
|
SC.7.CS.1.8
Identify actions that protect electronic devices. |
|
SC.7.CS.2.1
Define the Internet of Things (IoT). |
|
SC.7.CS.3.1
Identify the types of cyberattacks. |
|
SC.7.CS.3.2
Explore social engineering attacks. |
|
SC.7.CS.3.3
Identify data vulnerabilities. |
|
SC.7.ET.1.1
Investigate the latest technologies and the potential they have to improve our lives at home, work and in society. |
|
SC.7.ET.1.2
Explore emerging technologies that have the potential to impact education. |
|
SC.7.ET.2.1
Explore future technologies and the role artificial intelligence (AI) may play. |
|
SC.7.ET.3.1
Describe ways in which adaptive technologies can assist users in their daily lives. |
|
SC.7.ET.3.2
Identify ways humans interact with computers. |
|
SC.7.ET.3.3
Identify ways humans interact with hardware components. |
|
SC.7.HS.1.1
Explain the possible consequences of cyberbullying. |
|
SC.7.HS.1.2
Discuss the impact of online disinhibition on individuals and society. |
|
SC.7.HS.1.3
Interpret writings and communications using terminology. |
|
SC.7.HS.1.4
Categorize potential dangers to an individual’s safety and security. |
|
SC.7.HS.1.5
Recognize the importance of reporting suspicious behavior encountered on the Internet. |
|
SC.7.HS.1.6
Compare the risks and benefits of accessing the Internet. |
|
SC.7.HS.1.7
Examine safe practices for technology use. |
|
SC.7.HS.2.1
Identify the digital practices that may affect your physical and mental well- being. |
|
SC.7.HS.3.1
Discuss how device usage can affect sleeping patterns. |
|
SC.7.HS.3.2
Discuss the potential risks of device addiction and how to prevent it. |
|
SC.7.HS.3.3
Explain the possible consequences of cyberbullying and inappropriate use of digital media and communication on personal life and society. |
|
SC.7.TI.1.1
Discuss the ways that technology has increased the capacity for communication within a community. |
|
SC.7.TI.1.2
Evaluate the responsible and irresponsible use of information on collaborative projects. |
|
SC.7.TI.1.3
Identify how media is used to influence information. |
|
SC.7.TI.1.4
Analyze technology-related career paths. |
|
SC.7.TI.1.5
Summarize the historical impact of digital media and communication. |
|
SC.7.TI.1.6
Explore the innovation of computer components. |
|
SC.7.TI.2.1
Describe legal and ethical behaviors when using information and technology and describe the consequences of misuse. |
|
SC.7.TI.2.2
Describe and model responsible use of modern communication media and devices. |
|
SC.7.TI.2.3
Recognize the legal use of modern communication media and devices. |
|
SC.7.TI.2.4
Explore the ethical use of collected data. |
|
SC.7.TI.2.5
Explain how copyright law and licensing protect the owner of intellectual property. |
|
SC.8.CC.1.1
Design a digital product. |
|
SC.8.CC.1.2
Evaluate the benefits of collaboration compared to individual product creation. |
|
SC.8.CC.2.1
Publish a digital product individually and collaboratively. |
|
SC.8.CO.1.1
Integrate information from multiple file formats into a single artifact. |
|
SC.8.CO.1.2
Create a collaborative project utilizing an online digital application. |
|
SC.8.CO.2.1
Explain how to disassemble or reassemble a desktop computer. |
|
SC.8.CO.2.2
Explore different hardware specifications and their impact on the performance of the computer. |
|
SC.8.CO.2.3
Identify the major components of a network. |
|
SC.8.CO.3.1
Compare the benefits and limitations of desktop applications and their complimentary online subscription version. |
|
SC.8.CS.1.1
Analyze threats and vulnerabilities to information security for individuals and organizations. |
|
SC.8.CS.1.2
Explain how authentication and authorization methods can protect users. |
|
SC.8.CS.1.3
Describe defense in-depth strategies to protect simple networks. |
|
SC.8.CS.1.4
Explain how malicious actions threaten network security. |
|
SC.8.CS.1.5
Explain how malicious actions threaten physical security. |
|
SC.8.CS.1.6
Describe defense in depth and how physical access controls work together. |
|
SC.8.CS.1.7
Explore the process of protecting computer hardware from exploitation. |
|
SC.8.CS.2.1
Evaluate security and privacy issues that relate to computer networks and Internet of Things (IoT) devices. |
|
SC.8.CS.2.2
Describe security and privacy issues that relate to computer networks. |
|
SC.8.CS.2.3
Describe the permanency of data on the Internet, online identity and personal privacy. |
|
SC.8.CS.3.1
Discuss ransomware attacks. |
|
SC.8.CS.3.2
Discuss the necessity of immediate security updates of a program. |
|
SC.8.CS.3.3
Identify the steps of the social engineering attack cycle. |
|
SC.8.ET.1.1
Identify the emerging features of mobile devices, smart devices and vehicles. |
|
SC.8.ET.1.2
Identify challenges faced by users when learning to use computer interfaces. |
|
SC.8.ET.1.3
Identify the impact of natural resources on the manufacturing of computer hardware components. |
|
SC.8.ET.2.1
Explore the use of an artificial intelligence (AI) device to accomplish a task. |
|
SC.8.ET.2.2
Discuss the utilization of intelligent behavior in technology. |
|
SC.8.ET.3.1
Investigate the advancement of robotics. |
|
SC.8.HS.1.1
Describe the impacts of the presence of technology and the lack of technology on everyday life. |
|
SC.8.HS.1.2
Develop procedures to protect personal information while accessing the Internet. |
|
SC.8.HS.1.3
Model a procedure to mitigate risks to personal safety while accessing the Internet. |
|
SC.8.HS.2.1
Determine the association between hand-eye coordination and the use of digital devices. |
|
SC.8.HS.2.2
Investigate the causes of headaches associated with digital device usage. |
|
SC.8.HS.2.3
Investigate the causes of physical body changes due to device usage. |
|
SC.8.HS.2.4
Identify the effects on cognitive function as a result of technology use. |
|
SC.8.HS.3.1
Discuss how regulating the use of digital media and communication is important for mental and physical well-being. |
|
SC.8.HS.3.2
Analyze how digital media and communication influence behavior. |
|
SC.8.TI.1.1
Examine the historical progression and impact of digital media and communication. |
|
SC.8.TI.1.2
Describe the influence of access-to-information technologies over time. |
|
SC.8.TI.2.1
Describe legal and ethical behaviors when using technology. |
|
SC.8.TI.2.2
Use a local or federal government website to engage with a public official. |
|
SC.8.TI.2.3
Compare various technology-related career paths. |
|
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively. |
|
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem. |
|
SC.K12.CTR.3.1
Complete tasks with digital fluency. |
|
SC.K12.CTR.4.1
Express solutions as computational steps. |
|
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal. |
|
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information. |
|
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking. |
|
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively. |
|
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways. |
|
MA.K12.MTR.3.1
Complete tasks with mathematical fluency. |
|
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others. |
|
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts. |
|
MA.K12.MTR.6.1
Assess the reasonableness of solutions. |
|
MA.K12.MTR.7.1
Apply mathematics to real-world contexts. |
|
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning. |
|
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently. |
|
ELA.K12.EE.3.1
Make inferences to support comprehension. |
|
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations. |
|
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work. |
|
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing. |
|
ELD.K12.ELL.MA.1
English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics. |
|