Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
6.NI.1
Explain how data is sent across networks. |
|
7.NI.1
Model how data is sent from one computer to another across networks. |
|
8.NI.1
Investigate how data is sent from one computer to another across networks. |
|
6.HS.1
Use hardware and/or software to complete a task. |
|
7.HS.1
Compare and contrast hardware and/or software options to complete a task. |
|
8.HS.1
Choose appropriate device/hardware/software to complete a task. |
|
6.HS.2
Use software features to accomplish a goal. |
|
6.HS.3
Organize, store, and retrieve digital information with guidance. |
|
7.HS.3
Organize, store, and retrieve digital information with minimal guidance. |
|
8.HS.3
Organize, store, and retrieve digital information efficiently. |
|
6.HS.4
Identify threats to technology systems. |
|
7.HS.4
Describe threats to technology systems. |
|
8.HS.4
Describe ways to protect against threats to technology systems. |
|
6.HS.5
Identify security measures to protect technology systems. |
|
7.HS.5
Explain how security measures protect technology systems. |
|
8.HS.5
Compare and contrast security measures used to protect technology systems. |
|
6.T.1
Apply basic troubleshooting strategies. |
|
6.PSA.1
Identify and test an algorithm to solve a problem. |
|
7.PSA.1
Modify and test an algorithm to solve a problem. |
|
8.PSA.1
Create and test an algorithm to solve a problem across disciplines. |
|
6.PSA.2
Debug a program that includes sequencing, loops, or conditionals. |
|
6.PSA.3
Compare and contrast the efficiencies of multiple solutions to a task. |
|
6.DCA.1
Collect and analyze data to support a claim. |
|
7.DCA.1
Represent data, in more than one way, to defend your claim. |
|
8.DCA.1
Represent data from multiple sources in order to defend or refute a claim. |
|
6.DD.1
Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
|
7.DD.1
Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
|
8.DD.1
Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types. |
|
6.A.1
Use a variety of strategies to refine and revise search results. |
|
8.A.1
Use advanced search strategies to locate information online. |
|
6.E.1
Evaluate information and its sources. |
|
7.E.1
Independently, evaluate information and its sources using student selected processes and strategies. |
|
6.C.1
Repurpose or remix original works following fair use guidelines. |
|
6.IP.1
With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. |
|
7.IP.1
With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. |
|
8.IP.1
Properly use copyrighted works, works in the creative commons, and works in the public domain. |
|
6.IP.2
Cite a variety of sources using the appropriate format. |
|
6.IP.3
Describe negative consequences of piracy and plagiarism. |
|
7.IP.3
Identify strategies to avoid personal works and the works of others from being pirated and plagiarized. |
|
8.IP.3
Debate the risks and benefits of sharing personal works online. |
|
6.IC.1
Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility. |
|
7.IC.1
Compare and contrast the impacts of technology, including bias and accessibility. |
|
8.IC.1
Explore and create solutions for the negative impacts of technology, including bias and accessibility. |
|
6.SI.1
Use collaborative technology. |
|
7.SI.1
Use collaborative technology to gather and share information. |
|
8.SI.1
Use collaborative technology to communicate information to a specific audience. |
|
6.SI.2
Identify how social interactions can impact a person’s self-image. |
|
6.SE.1
Identify steps for responding to uncomfortable situations when interacting online. |
|
6.SE.2
Identify basic methods to maintain digital privacy and security. |
|
7.SE.2
Identify a variety of methods to maintain digital privacy and security. |
|
8.SE.2
Identify advanced methods to maintain digital privacy and security. |
|
6.SE.3
Recognize that data-collection technology can be used to track navigation online. |
|
6.SE.4
Identify threats to personal cybersecurity. |
|
7.SE.4
Describe how to respond to threats to personal cybersecurity. |
|
8.SE.4
Discuss the consequences of identity theft. |
|
6.RU.1
Identify different forms of cyberbullying. |
|
7.RU.1
Describe different forms of cyberbullying and the effects on all parties involved. |
|
6.RU.2
Identify strategies to stop cyberbullying. |
|
7.RU.2
Identify strategies to prevent and stop cyberbullying. |
|
8.RU.2
Identify strategies to prevent and stop cyberbullying. |
|
6.RU.3
Use approprite digital etiquette in a variety of situations. |
|
6.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
7.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
8.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
6.DI.1
Describe personal online usage and determine how it affects identity on- and offline. |
|
7.DI.1
Evaluate how digital identity can impact a person now and in the future. |
|