Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons | 
|---|---|
| 6.NI.1 Explain how data is sent across networks. | 
 | 
| 7.NI.1 Model how data is sent from one computer to another across networks. | 
 | 
| 8.NI.1 Investigate how data is sent from one computer to another across networks. | 
 | 
| 6.HS.1 Use hardware and/or software to complete a task. | 
 | 
| 7.HS.1 Compare and contrast hardware and/or software options to complete a task. | 
 | 
| 8.HS.1 Choose appropriate device/hardware/software to complete a task. | 
 | 
| 6.HS.2 Use software features to accomplish a goal. | 
 | 
| 6.HS.3 Organize, store, and retrieve digital information with guidance. |  | 
| 7.HS.3 Organize, store, and retrieve digital information with minimal guidance. |  | 
| 8.HS.3 Organize, store, and retrieve digital information efficiently. |  | 
| 6.HS.4 Identify threats to technology systems. | 
 | 
| 7.HS.4 Describe threats to technology systems. | 
 | 
| 8.HS.4 Describe ways to protect against threats to technology systems. | 
 | 
| 6.HS.5 Identify security measures to protect technology systems. | 
 | 
| 7.HS.5 Explain how security measures protect technology systems. | 
 | 
| 8.HS.5 Compare and contrast security measures used to protect technology systems. | 
 | 
| 6.T.1 Apply basic troubleshooting strategies. | 
 | 
| 6.PSA.1 Identify and test an algorithm to solve a problem. | 
 | 
| 7.PSA.1 Modify and test an algorithm to solve a problem. | 
 | 
| 8.PSA.1 Create and test an algorithm to solve a problem across disciplines. |  | 
| 6.PSA.2 Debug a program that includes sequencing, loops, or conditionals. | 
 | 
| 6.PSA.3 Compare and contrast the efficiencies of multiple solutions to a task. |  | 
| 6.DCA.1 Collect and analyze data to support a claim. |  | 
| 7.DCA.1 Represent data, in more than one way, to defend your claim. |  | 
| 8.DCA.1 Represent data from multiple sources in order to defend or refute a claim. |  | 
| 6.DD.1 Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. | 
 | 
| 7.DD.1 Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. | 
 | 
| 8.DD.1 Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. | 
 | 
| 6.A.1 Use a variety of strategies to refine and revise search results. | 
 | 
| 8.A.1 Use advanced search strategies to locate information online. | 
 | 
| 6.E.1 Evaluate information and its sources. | 
 | 
| 7.E.1 Independently, evaluate information and its sources using student selected processes and strategies. | 
 | 
| 6.C.1 Repurpose or remix original works following fair use guidelines. | 
 | 
| 6.IP.1 With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. | 
 | 
| 7.IP.1 With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. | 
 | 
| 8.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain. | 
 | 
| 6.IP.2 Cite a variety of sources using the appropriate format. | 
 | 
| 6.IP.3 Describe negative consequences of piracy and plagiarism. | 
 | 
| 7.IP.3 Identify strategies to avoid personal works and the works of others from being pirated and plagiarized. | 
 | 
| 8.IP.3 Debate the risks and benefits of sharing personal works online. | 
 | 
| 6.IC.1 Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility. | 
 | 
| 7.IC.1 Compare and contrast the impacts of technology, including bias and accessibility. | 
 | 
| 8.IC.1 Explore and create solutions for the negative impacts of technology, including bias and accessibility. | 
 | 
| 6.SI.1 Use collaborative technology. |  | 
| 7.SI.1 Use collaborative technology to gather and share information. |  | 
| 8.SI.1 Use collaborative technology to communicate information to a specific audience. |  | 
| 6.SI.2 Identify how social interactions can impact a person’s self-image. | 
 | 
| 6.SE.1 Identify steps for responding to uncomfortable situations when interacting online. | 
 | 
| 6.SE.2 Identify basic methods to maintain digital privacy and security. | 
 | 
| 7.SE.2 Identify a variety of methods to maintain digital privacy and security. | 
 | 
| 8.SE.2 Identify advanced methods to maintain digital privacy and security. | 
 | 
| 6.SE.3 Recognize that data-collection technology can be used to track navigation online. | 
 | 
| 6.SE.4 Identify threats to personal cybersecurity. | 
 | 
| 7.SE.4 Describe how to respond to threats to personal cybersecurity. | 
 | 
| 8.SE.4 Discuss the consequences of identity theft. |  | 
| 6.RU.1 Identify different forms of cyberbullying. | 
 | 
| 7.RU.1 Describe different forms of cyberbullying and the effects on all parties involved. | 
 | 
| 6.RU.2 Identify strategies to stop cyberbullying. | 
 | 
| 7.RU.2 Identify strategies to prevent and stop cyberbullying. | 
 | 
| 8.RU.2 Identify strategies to prevent and stop cyberbullying. | 
 | 
| 6.RU.3 Use approprite digital etiquette in a variety of situations. | 
 | 
| 6.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 7.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 8.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 6.DI.1 Describe personal online usage and determine how it affects identity on- and offline. | 
 | 
| 7.DI.1 Evaluate how digital identity can impact a person now and in the future. | 
 |