||R1) Identify, demonstrate, and apply personal safe use of digital devices.
||R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
||R3) Assess the validity and identify the purpose of digital content.
||R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
||R5) Locate and curate information from digital sources to answer research questions.
||R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
||Remove background details from an everyday process to highlight essential properties.
Examples: When making a sandwich, the type of bread, condiments, meats, and/or vegetables do not affect the fact that one is making a sandwich.
||Define a process as a function.
Example: Functions or sets of steps combined to produce a process: turning off your alarm + getting out of bed + brushing your teeth + getting dressed = morning routine.
||Create pseudocode that uses conditionals.
Examples: Using if/then/else (If it is raining then bring an umbrella else get wet).
||Differentiate between flowcharts and pseudocode.
Example: Flowcharts use shapes to indicate what to do at each step while pseudocode uses text.
||Identify algorithms that make use of sequencing, selection or iteration.
Examples: Sequencing is doing steps in order (put on socks, put on shoes, tie laces); selection uses a Boolean condition to determine which of two parts of an algorithm are used (hair is dirty? True, wash hair; false, do not); iteration is the repetition of part of an algorithm until a condition is met (if you’re happy and you know it clap your hands, when you’re no longer happy you stop clapping).
||Identify steps in developing solutions to complex problems using computational thinking.
||Describe how automation works to increase efficiency.
Example: Compare the amount of time/work to hand wash a car vs. using an automated car wash.
||Create a program that initializes a variable.
Example: Create a flowchart in which the variable or object returns to a starting position upon completion of a task.
||Differentiate between a secure and a non-secure website including how they affect personal data.
Example: HTTP vs. HTTPS.
||Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.
||Differentiate between appropriate and inappropriate digital content and the use of that content.
||Define digital permanence.
||Define personal privacy, digital footprint, and open communication.
||Discuss digital globalization and Internet censorship.
Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content.
||Identify emerging technologies in computing.
||Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems.
||Type 30 words per minute with 95% accuracy using appropriate keyboarding techniques.
||Track data change from a variety of sources.
Example: Use editing or versioning tools to track changes to data.
||Identify data transferring protocols, visualization, and the purpose of data and methods of storage.
Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database.
||Identify varying data structures/systems and methods of classification, including decimal and binary.
Examples: Difference between a bit and a byte, bit representation, pixels.
||Summarize the purpose of the American Standard Code for Information Interchange (ASCII).
||Discuss how digital devices may be used to collect, analyze, and present information.
||Compare and contrast types of networks.
Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet.
||Differentiate between secure and non-secure systems.
||Explain why professionals may use models as logical representations of physical, mathematical, or logical systems or processes.
Example: Students will discuss why an engineer may build a model of a building before actually constructing the building.
||Explain how simulations serve to implement models.
||Define assistive technologies and state reasons they may be needed.
||Define artificial intelligence and identify examples of artificial intelligence in the community.
Examples: Image recognition, voice assistants.
||Discuss and apply the components of the problem-solving process.
Example: Students will devise a plan to alleviate traffic congestion around the school during drop-off and pick-up.