Standards in this Framework
| Standard | Description |
|---|---|
| 6.NI.1 | Explain how data is sent across networks. |
| 7.NI.1 | Model how data is sent from one computer to another across networks. |
| 8.NI.1 | Investigate how data is sent from one computer to another across networks. |
| 6.HS.1 | Use hardware and/or software to complete a task. |
| 7.HS.1 | Compare and contrast hardware and/or software options to complete a task. |
| 8.HS.1 | Choose appropriate device/hardware/software to complete a task. |
| 6.HS.2 | Use software features to accomplish a goal. |
| 6.HS.3 | Organize, store, and retrieve digital information with guidance. |
| 7.HS.3 | Organize, store, and retrieve digital information with minimal guidance. |
| 8.HS.3 | Organize, store, and retrieve digital information efficiently. |
| 6.HS.4 | Identify threats to technology systems. |
| 7.HS.4 | Describe threats to technology systems. |
| 8.HS.4 | Describe ways to protect against threats to technology systems. |
| 6.HS.5 | Identify security measures to protect technology systems. |
| 7.HS.5 | Explain how security measures protect technology systems. |
| 8.HS.5 | Compare and contrast security measures used to protect technology systems. |
| 6.T.1 | Apply basic troubleshooting strategies. |
| 6.PSA.1 | Identify and test an algorithm to solve a problem. |
| 7.PSA.1 | Modify and test an algorithm to solve a problem. |
| 8.PSA.1 | Create and test an algorithm to solve a problem across disciplines. |
| 6.PSA.2 | Debug a program that includes sequencing, loops, or conditionals. |
| 6.PSA.3 | Compare and contrast the efficiencies of multiple solutions to a task. |
| 6.DCA.1 | Collect and analyze data to support a claim. |
| 7.DCA.1 | Represent data, in more than one way, to defend your claim. |
| 8.DCA.1 | Represent data from multiple sources in order to defend or refute a claim. |
| 6.DD.1 | Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
| 7.DD.1 | Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
| 8.DD.1 | Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
| 6.A.1 | Use a variety of strategies to refine and revise search results. |
| 8.A.1 | Use advanced search strategies to locate information online. |
| 6.E.1 | Evaluate information and its sources. |
| 7.E.1 | Independently, evaluate information and its sources using student selected processes and strategies. |
| 6.C.1 | Repurpose or remix original works following fair use guidelines. |
| 6.IP.1 | With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. |
| 7.IP.1 | With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. |
| 8.IP.1 | Properly use copyrighted works, works in the creative commons, and works in the public domain. |
| 6.IP.2 | Cite a variety of sources using the appropriate format. |
| 6.IP.3 | Describe negative consequences of piracy and plagiarism. |
| 7.IP.3 | Identify strategies to avoid personal works and the works of others from being pirated and plagiarized. |
| 8.IP.3 | Debate the risks and benefits of sharing personal works online. |
| 6.IC.1 | Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility. |
| 7.IC.1 | Compare and contrast the impacts of technology, including bias and accessibility. |
| 8.IC.1 | Explore and create solutions for the negative impacts of technology, including bias and accessibility. |
| 6.SI.1 | Use collaborative technology. |
| 7.SI.1 | Use collaborative technology to gather and share information. |
| 8.SI.1 | Use collaborative technology to communicate information to a specific audience. |
| 6.SI.2 | Identify how social interactions can impact a person’s self-image. |
| 6.SE.1 | Identify steps for responding to uncomfortable situations when interacting online. |
| 6.SE.2 | Identify basic methods to maintain digital privacy and security. |
| 7.SE.2 | Identify a variety of methods to maintain digital privacy and security. |
| 8.SE.2 | Identify advanced methods to maintain digital privacy and security. |
| 6.SE.3 | Recognize that data-collection technology can be used to track navigation online. |
| 6.SE.4 | Identify threats to personal cybersecurity. |
| 7.SE.4 | Describe how to respond to threats to personal cybersecurity. |
| 8.SE.4 | Discuss the consequences of identity theft. |
| 6.RU.1 | Identify different forms of cyberbullying. |
| 7.RU.1 | Describe different forms of cyberbullying and the effects on all parties involved. |
| 6.RU.2 | Identify strategies to stop cyberbullying. |
| 7.RU.2 | Identify strategies to prevent and stop cyberbullying. |
| 8.RU.2 | Identify strategies to prevent and stop cyberbullying. |
| 6.RU.3 | Use approprite digital etiquette in a variety of situations. |
| 6.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 7.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 8.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 6.DI.1 | Describe personal online usage and determine how it affects identity on- and offline. |
| 7.DI.1 | Evaluate how digital identity can impact a person now and in the future. |