Please enable JavaScript to use CodeHS

Standards Mapping

for Florida MJ Navigating Technology: Digital Literacy and Digital Citizenship

159

Standards in this Framework

112

Standards Mapped

70%

Mapped to Course

Standard Lessons
SC.6.CC.1.1
Demonstrate an ability to communicate through various online tools.
  1. 12.7 Project: Statistical Questions
  2. 12.9 Project: Tell Your Story
SC.6.CC.2.1
Create a digital product individually and collaboratively.
  1. 7.8 Project: Public Service Announcement
  2. 8.10 Project: Animate an Emoji
  3. 10.9 Complete Your Homepage
  4. 13.7 Create Your Site!
SC.6.CO.1.1
Identify multiple file format types.
  1. 10.5 Incorporating Images
  2. 13.3 Citing Image Sources
SC.6.CO.1.2
Identify applications that have different desktop and online versions.
  1. 4.2 Software
SC.6.CO.1.3
Identify the differences between wired and wireless computer networks.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
SC.6.CO.1.4
Describe how information is translated and communicated between computers and devices over a network.
  1. 6.2 The Need for Protocols
  2. 6.4 Cybersecurity
SC.6.CO.1.6
Research questions using digital information resources.
SC.6.CO.2.1
Identify and describe the major hardware components and functions of computer systems.
  1. 4.3 Hardware
SC.6.CO.3.1
Describe the essential characteristics of a software artifact.
  1. 4.2 Software
SC.6.CO.3.2
Describe the main functions of an operating system.
  1. 4.2 Software
SC.6.CO.3.3
Explain how an operating system provides user and system services.
  1. 4.2 Software
SC.6.CO.3.4
Describe the major software components and functions of computer systems.
  1. 4.2 Software
SC.6.CO.3.5
Evaluate various forms of input and output (IO) and peripheral devices.
  1. 4.2 Software
  2. 4.3 Hardware
SC.6.CS.1.1
Define the states of data.
SC.6.CS.1.2
Illustrate the concept of access control and how to limit access to authorized users.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.6.CS.1.3
Discuss the importance of cybersecurity.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.6.CS.1.4
Determine information that should remain confidential.
  1. 7.1 Digital Footprint and Reputation
  2. 7.3 Internet Safety
SC.6.CS.1.5
Identify the need for encryption.
  1. 6.4 Cybersecurity
  2. 6.6 Encryption
SC.6.CS.1.6
Recognize the importance of digital identity.
  1. 7.1 Digital Footprint and Reputation
SC.6.CS.2.1
Identify the need for security safeguards on personal devices.
  1. 7.4 Privacy & Security
SC.6.ET.1.1
Identify technology used to support specialized forms of human- computer interaction (HCI).
  1. 4.1 History of Computing
SC.6.ET.2.1
Identify the characteristics of Artificial Intelligence (AI).
  1. 4.6 Ethics and Legal Considerations
  2. 4.7 The Future of Computing
SC.6.ET.2.2
Discuss the benefits associated with Artificial Intelligence (AI).
  1. 4.6 Ethics and Legal Considerations
  2. 4.7 The Future of Computing
SC.6.ET.3.1
Explain why some tasks can be accomplished faster by computers.
SC.6.ET.3.2
Describe how humans and machines interact to accomplish tasks that neither can accomplish alone.
SC.6.HS.1.1
Identify the connection between strong passwords and Internet safety.
  1. 7.4 Privacy & Security
SC.6.HS.1.2
Discuss the need for downloads to come from trusted sources.
  1. 7.4 Privacy & Security
SC.6.HS.1.3
Describe safe practices when participating in digital communication.
  1. 7.1 Digital Footprint and Reputation
  2. 7.4 Privacy & Security
SC.6.HS.1.4
Evaluate a given website to determine if it is safe for users.
  1. 7.5 Information Literacy
SC.6.HS.2.1
Define the online disinhibition effect.
SC.6.HS.2.2
List negative impacts of excessive device usage.
  1. 6.3 Impact of the Internet
  2. 7.3 Internet Safety
SC.6.HS.2.3
Implement the 20-20-20 rule for technology.
SC.6.HS.3.1
Explore the impact that digital media and communication has on our behavior.
  1. 6.3 Impact of the Internet
  2. 7.2 Cyberbullying
SC.6.TI.1.1
Recognize the data content sources that make your digital footprint.
  1. 7.1 Digital Footprint and Reputation
SC.6.TI.1.2
Explore the history of computer and other devices.
  1. 4.1 History of Computing
SC.6.TI.1.3
Create a timeline for the innovation of an electronic device.
SC.6.TI.1.4
Describe various technology-related career paths.
SC.6.TI.2.1
Recognize the consequences of plagiarism on the development of creative works.
  1. 13.3 Citing Image Sources
SC.6.TI.2.2
Demonstrate compliance with the school’s Acceptable Use Policy.
  1. 7.2 Cyberbullying
  2. 7.3 Internet Safety
SC.6.TI.2.3
Explain fair use for using copyrighted materials.
  1. 13.3 Citing Image Sources
SC.6.TI.2.4
Generate citations for text and non-text sources using a digital tool.
  1. 13.3 Citing Image Sources
SC.7.CC.1.1
Apply multimedia tools for local and global group collaboration.
SC.7.CC.1.2
Identify productivity tools for collaboration.
SC.7.CC.1.3
Identify individual roles within a collaborative team.
SC.7.CC.2.1
Organize compiled information using a digital tool.
  1. 13.3 Citing Image Sources
SC.7.CC.2.2
Analyze one’s own ideas with research-based information to create a unique digital artifact.
  1. 9.3 Categorizing Games
  2. 12.8 Project: Data Storytelling
  3. 12.9 Project: Tell Your Story
SC.7.CO.1.1
Identify the kinds of content associated with different file types.
  1. 10.1 Introduction to HTML
SC.7.CO.1.2
Differentiate between different file types.
  1. 7.1 Digital Footprint and Reputation
  2. 10.5 Incorporating Images
  3. 13.3 Citing Image Sources
SC.7.CO.1.3
Describe the relationship between hardware and software.
  1. 4.2 Software
  2. 4.3 Hardware
SC.7.CO.1.4
Utilize a set of websites to find information for a given topic.
  1. 12.4 Statistical Measures
  2. 12.9 Project: Tell Your Story
  3. 13.7 Create Your Site!
SC.7.CO.1.5
Utilize government websites to facilitate civic engagement.
SC.7.CO.1.6
Describe strategies for determining the reliability of resources or information on the Internet.
  1. 7.4 Privacy & Security
  2. 13.3 Citing Image Sources
SC.7.CO.2.1
Explain the difference between wired, local area, wireless and mobile networks.
  1. 6.1 What is the Internet?
SC.7.CO.2.2
Identify and describe the function of the main internal parts of a basic computing device.
  1. 4.3 Hardware
SC.7.CO.2.4
Explain the connection of natural resources on the manufacturing of computer hardware components.
  1. 4.3 Hardware
  2. 6.4 Cybersecurity
SC.7.CO.3.1
Differentiate between desktop applications and software as a service (SaaS).
  1. 4.2 Software
SC.7.CS.1.1
Describe data in its three states and potential threats to each state.
SC.7.CS.1.2
Explain the concept of access control and how to limit access to authorized users.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.7.CS.1.3
Examine the basics of cybersecurity needs for business, government and organizations.
  1. 6.4 Cybersecurity
SC.7.CS.1.4
List and define the elements of the confidentiality, integrity and availability (CIA) triad.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
SC.7.CS.1.5
Explain components of access control.
SC.7.CS.1.6
Identify the characteristics of strong versus weak passwords in data and identity security.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.7.CS.1.7
Explain the proper use and operation of security technologies.
  1. 6.4 Cybersecurity
SC.7.CS.1.8
Identify actions that protect electronic devices.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.7.CS.2.1
Define the Internet of Things (IoT).
  1. 6.4 Cybersecurity
SC.7.CS.3.1
Identify the types of cyberattacks.
  1. 6.4 Cybersecurity
SC.7.CS.3.2
Explore social engineering attacks.
SC.7.CS.3.3
Identify data vulnerabilities.
  1. 6.4 Cybersecurity
SC.7.ET.1.1
Investigate the latest technologies and the potential they have to improve our lives at home, work and in society.
  1. 4.1 History of Computing
  2. 6.3 Impact of the Internet
SC.7.ET.1.2
Explore emerging technologies that have the potential to impact education.
SC.7.ET.2.1
Explore future technologies and the role artificial intelligence (AI) may play.
  1. 4.8 Project: Design the Computer of Tomorrow
SC.7.ET.3.1
Describe ways in which adaptive technologies can assist users in their daily lives.
SC.7.ET.3.2
Identify ways humans interact with computers.
  1. 9.6 Introducing Libraries
SC.7.ET.3.3
Identify ways humans interact with hardware components.
  1. 4.3 Hardware
SC.7.HS.1.1
Explain the possible consequences of cyberbullying.
  1. 7.2 Cyberbullying
SC.7.HS.1.2
Discuss the impact of online disinhibition on individuals and society.
  1. 7.2 Cyberbullying
SC.7.HS.1.3
Interpret writings and communications using terminology.
SC.7.HS.1.4
Categorize potential dangers to an individual’s safety and security.
  1. 7.2 Cyberbullying
  2. 7.3 Internet Safety
  3. 7.4 Privacy & Security
SC.7.HS.1.5
Recognize the importance of reporting suspicious behavior encountered on the Internet.
  1. 7.3 Internet Safety
SC.7.HS.1.6
Compare the risks and benefits of accessing the Internet.
  1. 6.1 What is the Internet?
  2. 7.3 Internet Safety
SC.7.HS.1.7
Examine safe practices for technology use.
SC.7.HS.2.1
Identify the digital practices that may affect your physical and mental well- being.
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
SC.7.HS.3.1
Discuss how device usage can affect sleeping patterns.
SC.7.HS.3.2
Discuss the potential risks of device addiction and how to prevent it.
  1. 7.3 Internet Safety
SC.7.HS.3.3
Explain the possible consequences of cyberbullying and inappropriate use of digital media and communication on personal life and society.
  1. 7.2 Cyberbullying
SC.7.TI.1.1
Discuss the ways that technology has increased the capacity for communication within a community.
SC.7.TI.1.2
Evaluate the responsible and irresponsible use of information on collaborative projects.
  1. 7.4 Privacy & Security
  2. 13.3 Citing Image Sources
SC.7.TI.1.3
Identify how media is used to influence information.
  1. 6.3 Impact of the Internet
  2. 7.1 Digital Footprint and Reputation
SC.7.TI.1.4
Analyze technology-related career paths.
SC.7.TI.1.5
Summarize the historical impact of digital media and communication.
SC.7.TI.1.6
Explore the innovation of computer components.
  1. 4.1 History of Computing
SC.7.TI.2.1
Describe legal and ethical behaviors when using information and technology and describe the consequences of misuse.
  1. 7.1 Digital Footprint and Reputation
SC.7.TI.2.2
Describe and model responsible use of modern communication media and devices.
  1. 7.2 Cyberbullying
  2. 7.3 Internet Safety
SC.7.TI.2.3
Recognize the legal use of modern communication media and devices.
  1. 7.4 Privacy & Security
  2. 13.3 Citing Image Sources
SC.7.TI.2.4
Explore the ethical use of collected data.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.7.TI.2.5
Explain how copyright law and licensing protect the owner of intellectual property.
  1. 7.1 Digital Footprint and Reputation
  2. 7.6 Creative Credit & Copyright
  3. 13.3 Citing Image Sources
SC.8.CC.1.1
Design a digital product.
  1. 7.8 Project: Public Service Announcement
  2. 8.10 Project: Animate an Emoji
  3. 10.9 Complete Your Homepage
  4. 13.7 Create Your Site!
SC.8.CC.1.2
Evaluate the benefits of collaboration compared to individual product creation.
SC.8.CC.2.1
Publish a digital product individually and collaboratively.
  1. 7.8 Project: Public Service Announcement
  2. 8.10 Project: Animate an Emoji
  3. 10.9 Complete Your Homepage
  4. 13.7 Create Your Site!
SC.8.CO.1.1
Integrate information from multiple file formats into a single artifact.
  1. 10.5 Incorporating Images
  2. 13.3 Citing Image Sources
SC.8.CO.1.2
Create a collaborative project utilizing an online digital application.
  1. 8.10 Project: Animate an Emoji
  2. 10.9 Complete Your Homepage
  3. 12.9 Project: Tell Your Story
  4. 13.2 Webpage Design
  5. 13.7 Create Your Site!
SC.8.CO.2.1
Explain how to disassemble or reassemble a desktop computer.
SC.8.CO.2.2
Explore different hardware specifications and their impact on the performance of the computer.
  1. 4.3 Hardware
SC.8.CO.2.3
Identify the major components of a network.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
SC.8.CO.3.1
Compare the benefits and limitations of desktop applications and their complimentary online subscription version.
SC.8.CS.1.1
Analyze threats and vulnerabilities to information security for individuals and organizations.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.8.CS.1.2
Explain how authentication and authorization methods can protect users.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.8.CS.1.3
Describe defense in-depth strategies to protect simple networks.
  1. 6.4 Cybersecurity
SC.8.CS.1.4
Explain how malicious actions threaten network security.
  1. 6.4 Cybersecurity
SC.8.CS.1.5
Explain how malicious actions threaten physical security.
  1. 7.4 Privacy & Security
SC.8.CS.1.6
Describe defense in depth and how physical access controls work together.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.8.CS.1.7
Explore the process of protecting computer hardware from exploitation.
  1. 6.4 Cybersecurity
SC.8.CS.2.1
Evaluate security and privacy issues that relate to computer networks and Internet of Things (IoT) devices.
  1. 6.4 Cybersecurity
SC.8.CS.2.2
Describe security and privacy issues that relate to computer networks.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
SC.8.CS.2.3
Describe the permanency of data on the Internet, online identity and personal privacy.
  1. 7.3 Internet Safety
  2. 7.4 Privacy & Security
SC.8.CS.3.1
Discuss ransomware attacks.
  1. 7.3 Internet Safety
  2. 7.7 Hacking Ethics
SC.8.CS.3.2
Discuss the necessity of immediate security updates of a program.
  1. 6.2 The Need for Protocols
  2. 6.5 The CIA Triad
  3. 7.4 Privacy & Security
  4. 7.7 Hacking Ethics
SC.8.CS.3.3
Identify the steps of the social engineering attack cycle.
SC.8.ET.1.1
Identify the emerging features of mobile devices, smart devices and vehicles.
SC.8.ET.1.2
Identify challenges faced by users when learning to use computer interfaces.
SC.8.ET.1.3
Identify the impact of natural resources on the manufacturing of computer hardware components.
SC.8.ET.2.1
Explore the use of an artificial intelligence (AI) device to accomplish a task.
SC.8.ET.2.2
Discuss the utilization of intelligent behavior in technology.
SC.8.ET.3.1
Investigate the advancement of robotics.
SC.8.HS.1.1
Describe the impacts of the presence of technology and the lack of technology on everyday life.
  1. 4.1 History of Computing
  2. 6.3 Impact of the Internet
SC.8.HS.1.2
Develop procedures to protect personal information while accessing the Internet.
  1. 7.3 Internet Safety
  2. 7.4 Privacy & Security
SC.8.HS.1.3
Model a procedure to mitigate risks to personal safety while accessing the Internet.
SC.8.HS.2.1
Determine the association between hand-eye coordination and the use of digital devices.
SC.8.HS.2.2
Investigate the causes of headaches associated with digital device usage.
SC.8.HS.2.3
Investigate the causes of physical body changes due to device usage.
SC.8.HS.2.4
Identify the effects on cognitive function as a result of technology use.
SC.8.HS.3.1
Discuss how regulating the use of digital media and communication is important for mental and physical well-being.
  1. 6.3 Impact of the Internet
  2. 7.1 Digital Footprint and Reputation
  3. 7.2 Cyberbullying
SC.8.HS.3.2
Analyze how digital media and communication influence behavior.
  1. 6.3 Impact of the Internet
  2. 7.2 Cyberbullying
SC.8.TI.1.1
Examine the historical progression and impact of digital media and communication.
SC.8.TI.1.2
Describe the influence of access-to-information technologies over time.
SC.8.TI.2.1
Describe legal and ethical behaviors when using technology.
  1. 4.6 Ethics and Legal Considerations
SC.8.TI.2.2
Use a local or federal government website to engage with a public official.
SC.8.TI.2.3
Compare various technology-related career paths.
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
  1. 3.1 Intro to Tracy's Grid World
  2. 7.5 Information Literacy
  3. 9.2 Unpacking a Game
  4. 9.3 Categorizing Games
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
  1. 5.4 Multiple Functions
SC.K12.CTR.3.1
Complete tasks with digital fluency.
  1. 6.7 Project: Steganography
  2. 9.10 The Physics of Sprites
SC.K12.CTR.4.1
Express solutions as computational steps.
  1. 5.9 Karel Challenges
  2. 6.7 Project: Steganography
  3. 9.5 Variables
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
  1. 5.9 Karel Challenges
  2. 6.7 Project: Steganography
  3. 8.10 Project: Animate an Emoji
  4. 9.5 Variables
  5. 9.10 The Physics of Sprites
  6. 10.9 Complete Your Homepage
  7. 13.7 Create Your Site!
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
  1. 3.1 Intro to Tracy's Grid World
  2. 7.5 Information Literacy
  3. 9.2 Unpacking a Game
  4. 9.3 Categorizing Games
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
  1. 3.1 Intro to Tracy's Grid World
  2. 5.5 For Loops
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
  1. 3.1 Intro to Tracy's Grid World
  2. 5.5 For Loops
  3. 9.10 The Physics of Sprites
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
  1. 3.2 Debugging with Error Messages
  2. 5.9 Karel Challenges
  3. 9.10 The Physics of Sprites
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. 3.1 Intro to Tracy's Grid World
  2. 5.9 Karel Challenges
  3. 9.10 The Physics of Sprites
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
  1. 7.6 Creative Credit & Copyright
  2. 9.2 Unpacking a Game
  3. 9.3 Categorizing Games
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
  1. 4.5 Internet of Things
  2. 6.2 The Need for Protocols
  3. 6.7 Project: Steganography
ELA.K12.EE.3.1
Make inferences to support comprehension.
  1. 12.4 Statistical Measures
  2. 12.6 Models
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
  1. 3.1 Intro to Tracy's Grid World
  2. 7.5 Information Literacy
  3. 12.9 Project: Tell Your Story
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
  1. 10.3 Formatting Text
  2. 10.9 Complete Your Homepage
  3. 13.3 Citing Image Sources
  4. 13.5 Creating a Sitemap
  5. 13.6 Wireframing
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
  1. 7.8 Project: Public Service Announcement
  2. 10.9 Complete Your Homepage
  3. 12.8 Project: Data Storytelling
  4. 12.9 Project: Tell Your Story
  5. 13.7 Create Your Site!
ELD.K12.ELL.MA.1
English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.