Standards in this Framework
Standard | Description |
---|---|
6.NI.1 | Explain how data is sent across networks. |
7.NI.1 | Model how data is sent from one computer to another across networks. |
8.NI.1 | Investigate how data is sent from one computer to another across networks. |
6.HS.1 | Use hardware and/or software to complete a task. |
7.HS.1 | Compare and contrast hardware and/or software options to complete a task. |
8.HS.1 | Choose appropriate device/hardware/software to complete a task. |
6.HS.2 | Use software features to accomplish a goal. |
6.HS.3 | Organize, store, and retrieve digital information with guidance. |
7.HS.3 | Organize, store, and retrieve digital information with minimal guidance. |
8.HS.3 | Organize, store, and retrieve digital information efficiently. |
6.HS.4 | Identify threats to technology systems. |
7.HS.4 | Describe threats to technology systems. |
8.HS.4 | Describe ways to protect against threats to technology systems. |
6.HS.5 | Identify security measures to protect technology systems. |
7.HS.5 | Explain how security measures protect technology systems. |
8.HS.5 | Compare and contrast security measures used to protect technology systems. |
6.T.1 | Apply basic troubleshooting strategies. |
6.PSA.1 | Identify and test an algorithm to solve a problem. |
7.PSA.1 | Modify and test an algorithm to solve a problem. |
8.PSA.1 | Create and test an algorithm to solve a problem across disciplines. |
6.PSA.2 | Debug a program that includes sequencing, loops, or conditionals. |
6.PSA.3 | Compare and contrast the efficiencies of multiple solutions to a task. |
6.DCA.1 | Collect and analyze data to support a claim. |
7.DCA.1 | Represent data, in more than one way, to defend your claim. |
8.DCA.1 | Represent data from multiple sources in order to defend or refute a claim. |
6.DD.1 | Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
7.DD.1 | Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
8.DD.1 | Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
6.A.1 | Use a variety of strategies to refine and revise search results. |
8.A.1 | Use advanced search strategies to locate information online. |
6.E.1 | Evaluate information and its sources. |
7.E.1 | Independently, evaluate information and its sources using student selected processes and strategies. |
6.C.1 | Repurpose or remix original works following fair use guidelines. |
6.IP.1 | With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. |
7.IP.1 | With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. |
8.IP.1 | Properly use copyrighted works, works in the creative commons, and works in the public domain. |
6.IP.2 | Cite a variety of sources using the appropriate format. |
6.IP.3 | Describe negative consequences of piracy and plagiarism. |
7.IP.3 | Identify strategies to avoid personal works and the works of others from being pirated and plagiarized. |
8.IP.3 | Debate the risks and benefits of sharing personal works online. |
6.IC.1 | Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility. |
7.IC.1 | Compare and contrast the impacts of technology, including bias and accessibility. |
8.IC.1 | Explore and create solutions for the negative impacts of technology, including bias and accessibility. |
6.SI.1 | Use collaborative technology. |
7.SI.1 | Use collaborative technology to gather and share information. |
8.SI.1 | Use collaborative technology to communicate information to a specific audience. |
6.SI.2 | Identify how social interactions can impact a person’s self-image. |
6.SE.1 | Identify steps for responding to uncomfortable situations when interacting online. |
6.SE.2 | Identify basic methods to maintain digital privacy and security. |
7.SE.2 | Identify a variety of methods to maintain digital privacy and security. |
8.SE.2 | Identify advanced methods to maintain digital privacy and security. |
6.SE.3 | Recognize that data-collection technology can be used to track navigation online. |
6.SE.4 | Identify threats to personal cybersecurity. |
7.SE.4 | Describe how to respond to threats to personal cybersecurity. |
8.SE.4 | Discuss the consequences of identity theft. |
6.RU.1 | Identify different forms of cyberbullying. |
7.RU.1 | Describe different forms of cyberbullying and the effects on all parties involved. |
6.RU.2 | Identify strategies to stop cyberbullying. |
7.RU.2 | Identify strategies to prevent and stop cyberbullying. |
8.RU.2 | Identify strategies to prevent and stop cyberbullying. |
6.RU.3 | Use approprite digital etiquette in a variety of situations. |
6.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
7.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
8.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
6.DI.1 | Describe personal online usage and determine how it affects identity on- and offline. |
7.DI.1 | Evaluate how digital identity can impact a person now and in the future. |