Standards in this Framework
| Standard | Description |
|---|---|
| DLCS25.6.1 | Create pseudocode using sequencing, selection, and iteration applying relational and logical operators to control program flow. |
| DLCS25.6.2 | Differentiate between flowcharts and pseudocode and create both to solve a task. |
| DLCS25.6.3 | Trace and debug pseudocode to identify outcomes and correct logic errors. |
| DLCS25.6.4 | Break a task into smaller steps and evaluate the purpose and effectiveness of each step to solve a problem. |
| DLCS25.6.5 | Explain how abstraction simplifies tasks, using real-life examples. |
| DLCS25.6.6 | Create a program that includes sequencing, selection, and iteration. |
| DLCS25.6.7 | Create an interactive program using sequential commands and user input to control basic program actions, like movement or responses. |
| DLCS25.6.8 | Differentiate between numeric and text data types and construct simple data structures. |
| DLCS25.6.9 | Explain why computers use a binary system. |
| DLCS25.6.10 | Create graphs or charts from simple datasets to identify patterns, and describe key findings. |
| DLCS25.6.11 | Generate and interpret descriptive statistics, including mean, median, and mode, to summarize data. |
| DLCS25.6.12 | Use basic models or simulations to test how changes in input affect outcomes. |
| DLCS25.6.13 | Explain the basic roles of routers, IP addresses, domain names, and servers in network communication. |
| DLCS25.6.14 | Differentiate between the Internet and the World Wide Web. |
| DLCS25.6.15 | Identify common online threats, including social engineering, and describe safe practices to protect personal information. |
| DLCS25.6.16 | Explain how strong passwords and multi-factor authentication help protect data. |
| DLCS25.6.17 | Compare safe and unsafe online behaviors related to social media use, personal identifiable information, and cyberbullying. |
| DLCS25.6.18 | Perform basic troubleshooting to solve hardware problems. |
| DLCS25.6.19 | Identify examples of system and application software, and match common applications to appropriate tasks |
| DLCS25.6.20 | Explain the purpose of an operating system and describe how it manages hardware and software resources. |
| DLCS25.6.21 | Identify a variety of careers that relate to or utilize computer science skills. |
| DLCS25.6.22 | Summarize major state and federal laws related to technology use, including those regulating copyright and intellectual property. |
| DLCS25.6.23 | Describe how AI systems are used in everyday life and examine the ethical considerations they raise. [AI] |
| DLCS25.6.24 | Explain how computing technologies have changed and will continue to change the way people communicate, learn, and work in their daily lives and communities |
| DLCS25.6.25 | Identify examples of relevant emerging technologies and describe their purposes. [AI] |
| DLCS25.6.26 | Evaluate accessibility features in digital tools and explain how they improve usability for individuals with diverse abilities. |
| DLCS25.6.27 | Analyze digital content for reliability and cite sources properly. |
| DLCS25.6.28 | Investigate their own digital footprints and describe the effects digital footprints can have on themselves and others. |
| DLCS25.6.29 | Create and apply a structured system for organizing files, folders, and subfolders to manage and retrieve digital work efficiently. |
| DLCS25.6.30 | Identify AI and non-AI technologies and features when using digital tools. [AI] |
| DLCS25.6.31 | Input text at a rate of 25 words per minute via keyboard or alternative text input method. |