||R1) Identify, demonstrate, and apply personal safe use of digital devices.
||R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
||R3) Assess the validity and identify the purpose of digital content.
||R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
||R5) Locate and curate information from digital sources to answer research questions.
||R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
||Create a function to simplify a task.
Example: Get a writing utensil, get paper, jot notes can collectively be named “note taking”.
||Create complex pseudocode using conditionals and Boolean statements.
Example: Automated vacuum pseudocode – drive forward until the unit encounters an obstacle; reverse 2"; rotate 30 degrees to the left, repeat.
||Create algorithms that demonstrate sequencing, selection or iteration.
Examples: Debit card transactions are approved until the account balance is insufficient to fund the transaction = iteration, do until.
||Design a complex algorithm that contains sequencing, selection or iteration.
Examples: Lunch line algorithm that contains parameters for bringing your lunch and multiple options available in the lunch line.
||Solve a complex problem using computational thinking.
||Create and organize algorithms in order to automate a process efficiently.
Example: Set of recipes (algorithms) for preparing a complete meal.
||Create a program that updates the value of a variable in the program.
Examples: Update the value of score when a coin is collected (in a flowchart, pseudocode or program).
||Formulate a narrative for each step of a process and its intended result, given pseudocode or code.
||Identify common methods of securing data.
Examples: Permissions, encryption, vault, locked closet.
||Explain social engineering, including countermeasures, and its impact on a digital society.
Examples: Phishing, hoaxes, impersonation, baiting, spoofing.
||Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.
||Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.
||Compare and contrast information available locally and globally.
Example: Review an article published in the United States and compare to an article on the same subject published in China.
||Discuss current events related to emerging technologies in computing and the effects such events have on individuals and the global society.
||Discuss unique perspectives and needs of a global culture when developing computational artifacts, including options for accessibility for all users.
Example: Would students create a webpage aimed at reaching a village of users that have no way access to the Internet?
||Construct content designed for specific audiences through an appropriate medium.
Examples: Design a multi-media children’s e-book with an appropriate readability level.
||Publish content to be available for external feedback.
||Type 35 words per minute with 95% accuracy using appropriate keyboarding techniques.
||Discuss the benefits and limitations of censorship.
||Evaluate the validity and accuracy of a data set.
||Compare common transfer protocols.
Examples: FTP, HTTP
||Compare data storage structures.
Examples: Stack, array, queue, table, database.
||Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.
||Diagram a network given a specific setup or need.
Examples: Home network, public network, business network.
||List common methods of system cybersecurity.
Examples: Various password requirements, two-factor authentication, biometric, geolocation.
||Categorize models based on the most appropriate representation of various systems.
||Identify data needed to create a model or simulation of a given event.
Examples: When creating a random name generator, the program needs access to a list of possible names.
||Classify types of assistive technologies.
Examples: Hardware, software, stylus, sticky keys.
||Compare and contrast human intelligence and artificial intelligence.
||Apply the problem-solving process to solve real-world problems.