Standards in this Framework
| Standard | Description | 
|---|---|
| R1 | R1) Identify, demonstrate, and apply personal safe use of digital devices. | 
| R2 | R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules. | 
| R3 | R3) Assess the validity and identify the purpose of digital content. | 
| R4 | R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues. | 
| R5 | R5) Locate and curate information from digital sources to answer research questions. | 
| R6 | R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools. | 
| 1 | Remove background details from an everyday process to highlight essential properties. Examples: When making a sandwich, the type of bread, condiments, meats, and/or vegetables do not affect the fact that one is making a sandwich. | 
| 2 | Define a process as a function. Example: Functions or sets of steps combined to produce a process: turning off your alarm + getting out of bed + brushing your teeth + getting dressed = morning routine. | 
| 3 | Create pseudocode that uses conditionals. Examples: Using if/then/else (If it is raining then bring an umbrella else get wet). | 
| 4 | Differentiate between flowcharts and pseudocode. Example: Flowcharts use shapes to indicate what to do at each step while pseudocode uses text. | 
| 5 | Identify algorithms that make use of sequencing, selection or iteration. Examples: Sequencing is doing steps in order (put on socks, put on shoes, tie laces); selection uses a Boolean condition to determine which of two parts of an algorithm are used (hair is dirty? True, wash hair; false, do not); iteration is the repetition of part of an algorithm until a condition is met (if you’re happy and you know it clap your hands, when you’re no longer happy you stop clapping). | 
| 6 | Identify steps in developing solutions to complex problems using computational thinking. | 
| 7 | Describe how automation works to increase efficiency. Example: Compare the amount of time/work to hand wash a car vs. using an automated car wash. | 
| 8 | Create a program that initializes a variable. Example: Create a flowchart in which the variable or object returns to a starting position upon completion of a task. | 
| 9 | Differentiate between a secure and a non-secure website including how they affect personal data. Example: HTTP vs. HTTPS. | 
| 10 | Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution. | 
| 11 | Differentiate between appropriate and inappropriate digital content and the use of that content. | 
| 12 | Define digital permanence. | 
| 13 | Define personal privacy, digital footprint, and open communication. | 
| 14 | Discuss digital globalization and Internet censorship. Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content. | 
| 15 | Identify emerging technologies in computing. | 
| 16 | Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems. | 
| 17 | Type 30 words per minute with 95% accuracy using appropriate keyboarding techniques. | 
| 18 | Define censorship. | 
| 19 | Track data change from a variety of sources. Example: Use editing or versioning tools to track changes to data. | 
| 20 | Identify data transferring protocols, visualization, and the purpose of data and methods of storage. Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database. | 
| 21 | Identify varying data structures/systems and methods of classification, including decimal and binary. Examples: Difference between a bit and a byte, bit representation, pixels. | 
| 22 | Summarize the purpose of the American Standard Code for Information Interchange (ASCII). | 
| 23 | Discuss how digital devices may be used to collect, analyze, and present information. | 
| 24 | Compare and contrast types of networks. Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet. | 
| 25 | Differentiate between secure and non-secure systems. | 
| 26 | Explain why professionals may use models as logical representations of physical, mathematical, or logical systems or processes. Example: Students will discuss why an engineer may build a model of a building before actually constructing the building. | 
| 27 | Explain how simulations serve to implement models. | 
| 28 | Define assistive technologies and state reasons they may be needed. | 
| 29 | Define artificial intelligence and identify examples of artificial intelligence in the community. Examples: Image recognition, voice assistants. | 
| 30 | Discuss and apply the components of the problem-solving process. Example: Students will devise a plan to alleviate traffic congestion around the school during drop-off and pick-up. |