Standards in this Framework
Standard | Lessons |
---|---|
CS.3.1.1a
Students can refine multiple algorithms (step-by-step instructions) for the same task. |
|
CS.3.2.1a
Students can discuss real-world cybersecurity problems and how personal information can be protected. |
|
CS.3.2.1b
Students can demonstrate safe cloud computing practices. |
|
CS.3.2.1c
Students can explain the vulnerabilities of connecting devices. |
|
CS.3.4.1a
Students can define personally identifiable information (PII). |
|
CS.3.5.1a
Students can describe how AI-powered services are used in daily life. |
|
CS.3.5.1b
Students can identify changes in how sectors of society operate due to the introduction of AI. |
|
CS.3.5.1c
Students can describe how a job will change due to the introduction of AI or robotic technologies. |
|
CS.3.6.1a
Students can discuss and provide examples of cyberbullying and methods of age-appropriate intervention. |
|
CS.3.6.1b
Students can describe the concept of a digital footprint. |
|
CS.3.6.1c
Students can recognize the different motivations that influence appropriate and inappropriate online behaviors. |
|
CS.3.6.1d
Students can discuss examples of cyber-attacks. |
|