Safety, Privacy, and Security
| |||||||||||||
|
R1) Identify, demonstrate, and apply personal safe use of digital devices. |
||||||||||||
Legal and Ethical Behavior
| |||||||||||||
|
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules. |
||||||||||||
Impact of Computing
| |||||||||||||
|
R3) Assess the validity and identify the purpose of digital content. |
||||||||||||
Systems
| |||||||||||||
|
R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues. |
||||||||||||
Collaborative Research
| |||||||||||||
|
R5) Locate and curate information from digital sources to answer research questions. |
||||||||||||
Digital Tools
| |||||||||||||
|
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools. |
||||||||||||
Computational Thinker
| |||||||||||||
Abstraction
| |||||||||||||
|
1) Construct a complex system of numbers or letters to represent information. Example: Student-created complex secret codes using more than one form to solve a problem or answer a question. |
||||||||||||
Algorithms
| |||||||||||||
|
2) Create an algorithm to solve a problem while detecting and debugging logical errors within the algorithm. Examples: Program the movement of a character, robot, or person through a maze. Define a variable that can be changed or updated. |
||||||||||||
|
3) Create an algorithm that is defined by simple pseudocode. |
||||||||||||
|
4) Create a simple pseudocode. |
||||||||||||
|
5) Develop and recommend solutions to a given problem and explain the process to an audience. |
||||||||||||
Programming and Development
| |||||||||||||
|
6) Create a working program in a block-based visual programming environment using arithmetic operators, conditionals, and repetition in programs. |
||||||||||||
|
7) Identify variables. |
||||||||||||
|
8) Demonstrate that programs require known starting values that may need to be updated appropriately during the execution of programs. Examples: Set initial value of a variable, updating variables. |
||||||||||||
Citizen of a Digital Culture
| |||||||||||||
Safety, Privacy, and Security
| |||||||||||||
|
9) Explain the proper use and operation of security technologies. Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies. |
||||||||||||
|
10) Identify appropriate and inappropriate uses of communication technology and discuss the permanence of actions in the digital world. |
||||||||||||
Legal and Ethical Behavior
| |||||||||||||
|
11) Explain that laws and tools exist to help ensure that people of varying abilities can access electronic and information technology. Examples: Section 508, Telecommunication Act of 1996, Braille, closed captioning, text to speech. |
||||||||||||
Digital Identity
| |||||||||||||
|
12) Explain the different forms of web advertising and why websites, digital resources, and artifacts may include advertisements that may collect personal information. Examples: personalized web experiences based on tailored web searches, maintaining search history, quicker access to relevant information. |
||||||||||||
Impact of Computing
| |||||||||||||
|
13) Share knowledge of resources in the community that can give people access to technology. Example: student created print and/or digital resource to share WiFi or other connectivity opportunities within the community. |
||||||||||||
|
14) Analyze the impact of social media on individuals, families, and society. |
||||||||||||
|
15) Explore and predict how advances in computing technologies affect job opportunities and/or processes now and in the future. |
||||||||||||
Global Collaborator
| |||||||||||||
Communication
| |||||||||||||
|
16) Use advanced features of digital tools and media-rich resources to communicate key ideas and details in a way that informs, persuades, and/or entertains. |
||||||||||||
|
17) Publish organized information in different ways to make it more useful or relevant. Examples: Infographic, student created website. |
||||||||||||
Digital Tools
| |||||||||||||
|
18) Type 25 words per minute with 95% accuracy using appropriate keyboarding techniques. |
||||||||||||
Collaborative Research
| |||||||||||||
|
19) Conduct advanced keyword searches to produce valid, appropriate results and evaluate results for accuracy, relevance, and appropriateness. Examples: Search techniques, check for credibility and validity. |
||||||||||||
Social Interactions
| |||||||||||||
|
20) Collaborate locally and globally using online digital tools under teacher supervision. |
||||||||||||
Computing Analyst
| |||||||||||||
Data
| |||||||||||||
|
21) Manipulate data to answer a question using a variety of computing methods and tools to collect, organize, graph, analyze, and publish the resulting information. |
||||||||||||
Systems
| |||||||||||||
|
22) Identify computing services that may be initially turned on by default. Examples: Geolocations, geotagging. |
||||||||||||
|
23) Identify the key components of a network. Examples: Links, nodes, networking devices. |
||||||||||||
|
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security. Examples: Logging in at school, logging personal devices to public networks. |
||||||||||||
Modeling and Simulations
| |||||||||||||
|
25) Analyze the concepts, features, and behaviors illustrated by a simulation. Examples: Object motion, weather, ecosystem, predator/prey. |
||||||||||||
|
26) Connect data from a simulation to real-life events. |
||||||||||||
Innovative Designer
| |||||||||||||
Human/Computer Partnerships
| |||||||||||||
|
27) Define social engineering and discuss possible defenses. Examples: Phishing, impersonating |
||||||||||||
Design Thinking
| |||||||||||||
|
28) Develop, test, and refine prototypes as part of a cyclical design process to solve a complex problem. Examples: Design backpack for a specific user's needs; design a method to collect and transport water without the benefit of faucets; design boats that need to hold as much payload as possible before sinking; design models of chairs based on specific user needs. |