||R1) Identify, demonstrate, and apply personal safe use of digital devices.
||R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
||R3) Assess the validity and identify the purpose of digital content.
||R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
||R5) Locate and curate information from digital sources to answer research questions.
||R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
||Design a function using a programming language that demonstrates abstraction.
Example: Create a program that utilizes functions in an effort remove repetitive sequences of steps.
||Explain how abstraction is used in a given function.
Example: Examine a set of block-based code and explain how abstraction was used.
||Create an algorithm using a programming language that includes the use of sequencing, selections, or iterations.
Example: Use a block-based or script programming language
Step 1: Start
Step 2: Declare variables a, b and c.
Step 3: Read variables a, b and c.
Step 4: If a>b
Display a is the largest number.
Display c is the largest number.
Display b is the largest number.
Display c is the greatest number.
Step 5: Stop
||Create a function to simplify a task.
Example: 38 = 3*3*3*3*3*3*3*3; =(Average) used in a spreadsheet to average a given list of grades.
||Discuss the efficiency of an algorithm or technology used to solve complex problems.
||Describe how algorithmic processes and automation increase efficiency.
||Create a program that includes selection, iteration, or abstraction, and initializes, and updates, at least two variables.
Examples: Make a game, interactive card, story, or adventure game.
||Compare and contrast common methods of securing data.
||Secure a file or other data.
Examples: lock spreadsheet cell(s), password protect, encrypt.
||Analyze different modes of social engineering and their effectiveness.
Examples: Phishing, hoaxes, impersonation, baiting, spoofing.
||Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.
Example: Students create a brochure that highlights the consequences of illegally downloading media.
||Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.
||Evaluate the impact of digital globalization on public perception and ways Internet censorship can affect free and equitable access to information.
||Analyze current events related to computing and their effects on education, the workplace, individuals, communities, and global society.
||Critique computational artifacts, including options for accessibility for all users, with respect to the needs of a global culture.
||Present content designed for specific audiences through an appropriate medium.
Example: Create and share a help video for a senior's center that provides tips for online safety.
||Communicate and publish individually or collaboratively to persuade peers, experts, or community about issues and problems.
||Type 40 words per minute with 95% accuracy using appropriate keyboarding techniques.
||Critique the impacts of censorship as it impacts global society.
Example: Create a presentation outlining the social implications of limiting access to web content by favoring or blocking particular products or websites.
||Examine an artifact that demonstrates bias through distorting, exaggerating, or misrepresenting data and redesign it using factual, relevant, unbiased content to more accurately reflect the truth.
||Differentiate types of data storage and apply most efficient structure.
Examples: Stack, array, queue, table, database.
||Encrypt and decrypt various data.
Example: Create and decipher a message sent in a secret code.
||Design a digital artifact to propose a solution for a content-related problem.
Example: Create a presentation outlining how to create a cost-efficient method to melt snow on roads during the winter.
||Compare and contrast common methods of cybersecurity.
Example: Discuss how password protections and encryption are similar and different.
||Create a model that represents a system.
Example: Food chain, supply and demand.
||Create a simulation that tests a specific model.
Examples: Demonstrate that pressure changes with temperature in a controlled environment; demonstrate that rocket design affects the height of a rocket’s launch; demonstrate that the amount of water changes the height of a plant.
||Analyze assistive technologies and how they improve the quality of life for users.
Example: Research multiple speech to text technologies and write a persuasive essay in favor of one over another.
||Develop a logical argument for and against artificial intelligence.
Examples: Students debate the use of artificial intelligence in self-driving vehicles.
Students write a persuasive essay to argue for or against digital personal assistants.
||Create an artifact to solve a problem using ideation and iteration in the problem-solving process.
Examples: Create a public service announcement or design a computer program, game, or application.