Standards in this Framework
Standard | Description |
---|---|
CS.D.6.a | Identify the benefits and limitations of a given computing device's functions (including individual components) to explain how the functions and components work together to create the computing system. |
CS.HS.6.a | Identify ways that hardware and software work together as a system to collect and exchange data. |
CS.T.6.a | Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others. |
NI.N.6.a | Identify the role of hardware components to understand the infrastructure of networks and the internet (including cloud servers). |
NI.N.6.b | Identify protocols (i.e., rules) and explain why they are used to transmit data across networks and the internet. |
NI.C.6.a | Identify cybersecurity concerns and measures needed to protect electronic information. |
NI.C.6.b | Identify the different types of malware to understand threats to data security. |
NI.C.6.c | Identify ways to protect private information. |
NI.IOT.6.a | Define and explore aspects of embedded devices, smart devices and intelligent devices and the way they record, observe and mimic human habits. |
NI.IOT.6.b | Identify and define blockchains to recognize how every device made has unique identifiers and the weaknesses that allow programmers and hackers to see personally identifiable information. |
DA.DCS.6.a | Identify and use an appropriate digital data collection tool to compile information. |
DA.DCS.6.b | Select and utilize appropriate file formats to organize collected data. |
DA.DCS.6.c | Utilize a file structure to logically organize data to support individual and collaborative work. |
DA.VC.6.a | Identify and label patterns in models or representations to infer connections between data sets. |
DA.VC.6.b | Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data. |
DA.IM.6.a | Identify and utilize data sets to support or refute a hypothesis. |
ATP.A.6.a | Compare and refine multiple algorithms for the same task to determine which is the most efficient. |
ATP.VDR.6.a | Identify unknown values that need to be represented by a variable within a multi-step process. |
ATP.VDR.6.b | Create variables and use them within a multi-step process. |
ATP.CS.6.a | Identify and trace decisions and loops that exist in a multi-step process within a program. |
ATP.M.6.a | Decompose problems into parts to facilitate the design, implementation and review of programs. |
ATP.PD.6.a | Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression. |
ATP.PD.6.b | Test and trace to debug and refine code |
AI.P.6.a | Give examples of different types of computer perception that can extract meaning from sensory signals to understand how computers collect information from sensors. |
AI.P.6.b | Give examples of how humans combine information from multiple modalities to understand how computers use sensors to collect data. |
AI.P.6.c | Give examples of different types of computer perception that can extract meaning from sensory signals to show the connection between sensors and computer perception. |
AI.P.6.d | Classify a given image (e.g., "traffic scene", "nature scene", "social gathering", etc.) and then describe the kinds of knowledge a computer would need in order to understand scenes of this type to utilize the image in an algorithm. |
AI.RR.6.a | Illustrate how a computer can solve a maze, find a route on a map or reason about concepts in a knowledge graph by drawing a search tree. |
AI.ML.6.a | Contrast the unique characteristics of human learning with the ways machine learning systems operate to identify the limitations of machine learning. |
AI.ML.6.b | Illustrate the structure of a neural network to describe how its parts form a set of functions that compute an output. |
AI.NI.6.a | Individually and collaboratively compare language processing algorithms to solve a problem based on a given criteria (e.g., time, resource, accessibility). |
AI.NI.6.b | Identify and describe how computers mimic human behavior to better serve humans. |
AI.SI.6.a | Identify and explain how humans have control in curating training datasets to identify bias in machine learning. |
AI.SI.6.b | Identify and explain how algorithmic bias impacts artificial intelligence systems to prevent bias in future datasets. |
IC.Cu.6.a | Identify the change that current technologies have on people's everyday activities to understand the impact within a society. |
IC.Cu.6.b | Identify issues of bias and accessibility in the design of existing technologies to address equality and equity in society. |
IC.Cu.6.c | Identify and explore careers related to the field of computer science. |
IC.SI.6.a | Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions. |
IC.SLE.6.a | Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making. |
IC.SLE.6.b | Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas. |
IC.SLE.6.c | Evaluate the development of new technologies in communication, entertainment and business to understand the impact. |
IC.SLE.6.d | Provide appropriate credit when using resources or artifacts that are not our own. |
IC.SLE.6.e | Differentiate between the appropriate and inappropriate content on the internet and identify unethical and illegal online behavior. |