Standards in this Framework
Standard | Description |
---|---|
1.1.1 | Sit up straight |
1.1.2 | Feet flat on the floor |
1.1.3 | Body centered with the “G” and “H” keys |
1.1.4 | Fingers curved on home row (A, S, D, F, J, K, L, ;) |
1.1.5 | Wrists straight and elbows naturally at sides |
1.1.6 | Correct fingers used for keystrokes |
1.1.7 | Key by touch (eyes on copy or screen, not on keys) |
1.1.8 | Key with smooth rhythm |
2.1.1 | Define hardware as the physical components that make up a computing system, computer, or computing device. |
2.1.2.A | Identify primary hardware components of a computer: Monitor |
2.1.2.B | Identify primary hardware components of a computer: Keyboard |
2.1.2.C | Identify primary hardware components of a computer: System unit |
2.1.2.D | Identify primary hardware components of a computer: Motherboard |
2.1.2.E | Identify primary hardware components of a computer: Power supply |
2.1.2.F | Identify primary hardware components of a computer: Hard Drive/Solid State Drive (SDD) |
2.1.2.G | Identify primary hardware components of a computer: Central Processing Unit (CPU) |
2.1.2.H | Identify primary hardware components of a computer: Mouse/Touchpad/Touchscreen |
2.1.3 | Define peripheral devices as an internal or external device that connects directly to a computer but does not contribute to the primary function of a computer. |
2.1.4.A | Identify primary peripheral devices: Printer |
2.1.4.B | Identify primary peripheral devices: Camera |
2.1.4.C | Identify primary peripheral devices: Projector |
2.1.4.D | Identify primary peripheral devices: Speakers |
2.1.4.E | Identify primary peripheral devices: Headphones |
2.1.4.F | Identify primary peripheral devices: Microphone |
2.1.4.G | Identify primary peripheral devices: Game controller |
2.1.4.H | Identify primary peripheral devices: Virtual Reality (VR) headsets |
2.2.1 | Define software as a set of instruction that runs a computing system, computer, or other computing device. |
2.2.2.A | Define the two types of software for a computing system: Operating system is software that controls the communication between the hardware and application software of a computer. |
2.2.2.B | Define the two types of software for a computing system: Application software is developed to help the user perform specific tasks. |
2.2.3.A | Identify the primary operating system of a computing device: Windows |
2.2.3.B | Identify the primary operating system of a computing device: Mac OS |
2.2.3.C | Identify the primary operating system of a computing device: Android |
2.2.3.D | Identify the primary operating system of a computing device: iOS |
2.2.3.E | Identify the primary operating system of a computing device: Linux |
2.2.4.A | Identify the common application software for a computing device: Business software (i.e. word processing, spreadsheets, databases, presentation, email, calendaring) |
2.2.4.B | Identify the common application software for a computing device: Communication software (i.e. social media, email, video conference, instant messaging) |
2.2.4.C | Identify the common application software for a computing device: Entertainment software (i.e. virtual reality, streaming, gaming) |
2.2.4.D | Identify the common application software for a computing device: Multimedia software (i.e. photo, image, video, audio, speech to text, artificial intelligence (AI ) speech technology) |
2.2.4.E | Identify the common application software for a computing device: Education software (i.e. learning management system (LMS), gradebook, e-books) |
2.3.1 | Define input device as hardware equipment used to transfer data to a computing system for processing. |
2.3.2.A | Explain the function of primary input devices: Keyboard |
2.3.2.B | Explain the function of primary input devices: Mouse/Touchpad |
2.3.2.C | Explain the function of primary input devices: Touchscreen |
2.3.2.D | Explain the function of primary input devices: Microphone |
2.3.2.E | Explain the function of primary input devices: Camera |
2.3.2.F | Explain the function of primary input devices: Game controller |
2.4.1 | Define processing as interpreting input and producing output. |
2.4.2 | Define and explain the main processing device in a computer system: Central Processing Unit (CPU) is the master chip that controls all other aspects of the computer. |
2.4.3.A | Define the relationship of an algorithm, loop, and conditional in computer processing: Algorithm is a set of instructions to complete a task |
2.4.3.AA | The CPU uses the algorithm as an input to produce output: The CPU uses the algorithm as an input to produce output |
2.4.3.B | Loop is a programming structure that repeats a set of instructions as long as a specific condition is true |
2.4.3.BB | Loop is a programming structure that repeats a set of instructions as long as a specific condition is true: The CPU uses the loop as an input to repeat the task to output data until the specific condition is true |
2.4.3.C | Conditional is a feature of a programming language that performs different computations or actions depending on whether a programmer-specified Boolean condition evaluate to true or false |
2.4.3.C.i | Conditional is a feature of a programming language that performs different computations or actions depending on whether a programmer-specified Boolean condition evaluate to true or false: The CPU uses the conditional as an input to continue to evaluate whether or not to send output data |
2.4.4 | Explain the role of the CPU, memory, and storage when purchasing a computing device based on the individual user’s needs |
2.5.1 | Define memory as temporarily stored data for immediate use in a computer system. |
2.5.2.A | Define the two types of memory for a computer system: Random Access Memory (RAM) is used by the operating system and application software while the computer is running |
2.5.2.B | Define the two types of memory for a computer system: Read Only Memory (ROM) is preloaded instructions for booting up the computer |
2.5.3 | Define storage as a place where data can be held and retrieved at a later time. |
2.5.4.A | Identify the benefits of using different types of primary storage: Define hard drive as an internal storage device that stores data |
2.5.4.B | Identify the benefits of using different types of primary storage: Define external hard drive as a portable storage device that stores data |
2.5.4.C | Identify the benefits of using different types of primary storage: Define flash drive as a small, portable storage device that uses electrical rewritable storage (flash) to store or transfer data (i.e. USB, thumb drive, memory stick, jump drive) |
2.5.4.D | Identify the benefits of using different types of primary storage: Define Solid-state drive (SSD) as a storage device that uses an electrical rewritable storage (flash) and performs tasks faster than a hard drive |
2.5.4.E | Identify the benefits of using different types of primary storage: Define memory card as a small, flat flash drive used in mobile devices and digital cameras (i.e. SD card, micro SD card). |
2.5.4.F | Identify the benefits of using different types of primary storage: Define cloud storage as storage where data is transmitted and stored on remote storage systems where it is maintained, managed, and backed up and made available to users over a network (i.e. Google Drive, iCloud, Dropbox, OneDrive) |
2.5.5 | Explain the role of memory and storage when purchasing a computing device based on the individual user’s needs. |
2.6.1 | Define output as information processed from a computing system and received by the user. |
2.6.2 | Define output device as hardware equipment used to transfer data out from a computer system. |
2.6.3.A | Explain the function of primary output devices: Monitor/Screen |
2.6.3.B | Explain the function of primary output devices: Printer |
2.6.3.C | Explain the function of primary output devices: Projector |
2.6.3.D | Explain the function of primary output devices: Speakers |
2.6.3.E | Explain the function of primary output devices: Headphones |
3.1.1 | Define network as a group of two or more digital devices connected to share information. |
3.1.2 | Define Internet as a global network. |
3.1.3 | Define bandwidth as the amount of information that can travel on an Internet connection in a certain timeframe. |
3.1.4 | Define uniform resource locator (URL) as an address for a worldwide webpage |
3.1.5 | Define Internet protocol (IP) address as a unique set of numbers separated by periods that identifies each digital device using the Internet to communicate. |
3.1.6 | Define Internet browser as an application used to access and view websites. |
3.1.7 | Define search engine as a program that searches for and identifies items in a database using keywords to find websites for information on the Internet. |
3.1.8 | Define server as a computer or computer program which manages access to databases of information in a network. |
3.2.1 | Identify the different components required for an Internet connection |
3.2.1.A | Define Internet service provider (ISP) as a company that provides subscribers with access to the Internet |
3.2.1.B | Define modem as a hardware component that converts packets into a usable signal to allow another device, such as a router, to connect to the Internet |
3.2.1.BB | Define packet as small bits of data sent over a network |
3.2.1.C | Define router as a device that transports the packets of information between the digital device and modem |
3.2.1.D | Define digital device as a device that utilizes hardware and software during the information processing cycle |
3.2.2.A | Identify types of Internet connections: Cellular |
3.2.2.B | Identify types of Internet connections: Digital Subscriber Line (DSL) |
3.2.2.C | Identify types of Internet connections: Fiber optic |
3.2.2.D | Identify types of Internet connections: Satellite |
3.2.2.E | Identify types of Internet connections: Wireless (WiFi) |
3.2.3 | Explain how Internet connection and bandwidth impact speed and accessibility. |
3.2.4 | Define uniform resource locator (URL) as an address of a World Wide webpage on the Intenet. |
3.2.5.A | Explain the component of a URL: Scheme (i.e. http://, https://) |
3.2.5.B | Explain the component of a URL: Sub-domain (WWW) |
3.2.5.C | Explain the component of a URL: Domain name (name of the website) |
3.2.5.D | Explain the component of a URL: Top Level Domain (i.e. .org, .com, .net., .edu., .gov) |
3.2.5.E | Explain the component of a URL: File path (description of the exact webpage location) |
3.2.6.A | Search Internet content efficiently and effectively: Search engine (i.e. Google, Bing) |
3.2.6.B | Search Internet content efficiently and effectively: Don’t use common words and punctuation |
3.2.6.C | Search Internet content efficiently and effectively: Specific keywords |
3.2.6.D | Search Internet content efficiently and effectively: Use quotation marks |
3.2.7.A | Demonstrate the use of common website navigation components: Menu - Chrome app launcher (waffle) |
3.2.7.AA | Demonstrate the use of common website navigation components: Menu - Three dots (kabob) |
3.2.7.AB | Demonstrate the use of common website navigation components: Menu - Three lines (hamburger) |
3.2.7.B | Demonstrate the use of common website navigation components: Home page |
3.2.7.C | Demonstrate the use of common website navigation components: Search bar |
3.2.7.D | Demonstrate the use of common website navigation components: Graphics |
3.2.7.E | Demonstrate the use of common website navigation components: Hyperlinks |
3.2.8.A | Identify components of credible online content: Author |
3.2.8.B | Identify components of credible online content: Date |
3.2.8.C | Identify components of credible online content: Verified sources |
3.2.8.D | Identify components of credible online content: Domain |
3.2.8.E | Identify components of credible online content: Design |
3.2.8.F | Identify components of credible online content: Writing style |
3.3.1.A | Identify different types of communication programs: Define email as messages distributed by email application software from one digital device to another using a network (i.e. Gmail, Outlook, Yahoo) |
3.3.1.B | Identify different types of communication programs: Define instant messaging as online chat that offers real-time text communication over the Internet (i.e. Google Chat, Instagram DM (Direct Message), Facebook Messenger) |
3.3.1.C | Identify different types of communication programs: Define video conference as a conference where participants, in different locations, are able to communicate with each other in sound and vision (i.e. Skype, Google Meet, Microsoft Teams, FaceTime, Zoom) |
3.3.1.D | Identify different types of communication programs: Define web authoring as a category of software that allows the user to develop a website using visual tools based on code (i.e. Weebly, Google Sites, Wix, Adobe Spark, WordPress). |
3.3.1.E | Identify different types of communication programs: Define social networking as the use of internet based social media sites to stay connected with others |
3.3.2.A | Identify the primary feature of an email: Define subject as an informative, catchy, and brief line of text seen when the email reaches the recipient’s inbox |
3.3.2.B | Identify the primary feature of an email: Define CC as a courtesy copy (previously known as carbon copy) including one or more recipients when a message is intended for one person but is relevant to other people as well |
3.3.2.C | Identify the primary feature of an email: Define BCC as a blind courtesy copy (previously known as blind carbon copy) to let others see an email without the main recipient knowing |
3.3.2.CA | Define BCC as a blind courtesy copy (previously known as blind carbon copy) to let others see an email without the main recipient knowing: Explain a variety of scenarios where CC and BCC would be used in an email. |
3.3.2.D | Define attachment as a file sent with an email message (i.e. image, video, text document). Often represented by a paperclip icon |
3.3.2.E | Define inline image as an image that is placed inside the body of the email. This allows the recipient to view the image without having to open the attachment |
3.3.2.EA | Explain a variety of scenarios where attachment and incline image would be used in an email |
3.3.2.F | Define signature block as a personalized block of text automatically included at the bottom of an email. A signature can include name, address, phone number, website, and other business information |
3.3.2.G | Define reply as the response to an email that goes to a single person (the person who sent the original email or the person who sent the last message in the email thread) |
3.3.2.H | Define reply all as the response to an email that goes to everyone who was included in the email, including CC |
3.3.2.HA | Explain a variety of scenarios where reply and reply all would be used in an email |
3.3.2.I | Define forward as the operation of re-sending an email message delivered to one email address to one or more different email addresses |
3.3.3.A | Identify the primary email folders: Inbox |
3.3.3.B | Identify the primary email folders: Deleted/Trash |
3.3.3.C | Identify the primary email folders: SPAM/Junk Mail |
4.1.1 | Define digital citizenship as continuously developing norms of appropriate, responsible, and empowered technology use. |
4.1.2 | Define digital footprint as the information about a particular person that exists on the Internet as a result of their online activity. |
4.2.1 | Define online safety as being aware of online risks and maximizing the user’s personal safety. |
4.2.2.A | Identify guidelines to protect users from various types of online predators: Avoid using suggestive screen names or photos |
4.2.2.B | Identify guidelines to protect users from various types of online predators: Avoid using suggestive screen names or photos |
4.2.2.C | Identify guidelines to protect users from various types of online predators: Be aware of excessive attention |
4.2.2.D | Identify guidelines to protect users from various types of online predators: Do not talk to anyone that wants to get too personal |
4.2.2.E | Identify guidelines to protect users from various types of online predators: Keep in mind that people are not always who they say they are |
4.2.2.F | Identify guidelines to protect users from various types of online predators: Never arrange to meet with someone you only know online in person |
4.2.2.G | Identify guidelines to protect users from various types of online predators: Tell a trusted adult if you encounter a problem |
4.2.3 | Define digital security as tools used to secure identify and data online. |
4.2.4.A | Identify threats in the digital world: Define adware as software that automatically displays unwanted advertising material when a user in online (i.e. pop-up advertisements) |
4.2.4.B | Identify threats in the digital world: Define computer worm virus as a malicious software that replicates itself to spread to other digital devices through a network |
4.2.4.C | Identify threats in the digital world: Define denial of service attacks as an attack to shut down a computer device or network by flooding it with traffic to make it inaccessible to the intended users |
4.2.4.D | Identify threats in the digital world: Define hackers as a person or program that uses computers to gain unauthorized access to data |
4.2.4.E | Identify threats in the digital world: Define malware as software that is specifically designed to disrupt, damage, or gain unauthorized access to a digital device |
4.2.4.F | Identify threats in the digital world: Define ransomware as a type of malicious software that is used to block access to a digital device until a sum of money is paid |
4.2.4.G | Identify threats in the digital world: Define spyware as software that enables a user to obtain private information about another’s computer activity by transmitting data secretly from their hard drive |
4.2.4.H | Identify threats in the digital world: Define Trojan Horse as a malicious code that looks legitimate and takes control of your computer to damage, disrupt, and destroy your data |
4.2.5 | Explain the importance of using anti-virus protection software on your digital device: Define anti-virus protection software as software designed to protect your computing device and destroy computer viruses. |
4.2.5.A | Explain the importance of using anti-virus protection software on your digital device. |
4.2.6 | Define online privacy as the protection of private data and communication. |
4.2.7.A | Identify threats to online transactions: Browser extensions |
4.2.7.B | Identify threats to online transactions: Credit card fraud |
4.2.7.C | Identify threats to online transactions: Data misuse |
4.2.7.D | Identify threats to online transactions: Hacking |
4.2.7.E | Identify threats to online transactions: Money theft |
4.2.7.F | Identify threats to online transactions: Unprotective services |
4.2.8.A | Identify threats to email and online communication: Catfishing |
4.2.8.B | Identify threats to email and online communication: Email scams |
4.2.8.C | Identify threats to email and online communication: Hacking |
4.2.8.D | Identify threats to email and online communication: Phishing |
4.2.8.E | Identify threats to email and online communication: Spoofing |
4.2.9.A | Explain the importance of different security measures on your digital devices: Password/passphrase |
4.2.9.B | Explain the importance of different security measures on your digital devices: Two-factor authentication |
4.2.9.C | Explain the importance of different security measures on your digital devices: Firewalls |
4.2.9.D | Explain the importance of different security measures on your digital devices: Secure website (HTTPS) |
4.2.9.E | Explain the importance of different security measures on your digital devices: Updates |
4.3.1 | Define intellectual property as a creative work or idea for which an individual has ownership rights. |
4.3.2.A | Define copyrights as the exclusive legal right given to the creator of works printed, posted, published, filmed, or recorded. |
4.3.2.B | Define creative commons as licenses that allow for the distribution of copyrighted works when the creator wants to give other people the right to share, use, or build upon what they have created. |
4.3.2.C | Define patents as the legal right granted to an inventor. |
4.3.2.D | Define public domain as intellectual property that is available for public use. |
4.3.2.E | Define trade secrets as formulas, patterns, or methods used to produce a creative work that is generally not known outside a company. |
4.3.2.F | Define trademarks as a distinctive protected mark or feature that identifies a person or thing. |
4.3.3 | Identify intellectual property violations. |
4.3.3.A | Define plagiarism as the practice of taking someone else’s intellectual property and using it as your own (i.e. copy/paste, images). |
4.3.3.B | Define copyright infringement (piracy) as the unauthorized use of or reproduction of another’s work for financial gain (i.e. music, movies, images). |
4.3.4 | Define digital ethics as how to manage oneself ethically and professionally when using digital device. |
4.3.5 | Define netiquette as being courteous and respectful when communicating online. |
4.3.6 | Explain the personal responsibilities of being ethical in a digital world. |
4.3.6.A | Explain the personal responsibilities of being ethical in a digital world. |
4.3.6.B | Explore appropriate and safe sites. |
4.3.6.C | Follow copyright laws. |
4.3.6.D | Help prevent cyberbullying. |
4.3.6.E | Maintain a positive digital footprint. |
4.3.6.F | Always use netiquette. |
4.4.1 | Define digital wellness as the preventative measures aimed at regulating and improving the healthy use of technology. |
4.4.2 | Identify measures to achieve personal digital wellness. |
4.4.2.A | Understand device use (i.e. get a detailed understanding of technology use) |
4.4.2.B | Create boundaries (i.e. set limits for certain apps and sites, limit notifications) Understand device use (i.e. get a detailed understanding of technology use) |
4.4.2.C | Make adjustments to device screen (i.e. remove distracting apps on your screen, adjust light preferences) |
4.4.2.D | Try single-tasking (i.e. to improve focus, try reducing the number of screens around you) |
4.4.3 | Define cyberbullying as the use of electronic communication to bully a person, typically by sending messages of an intimidating, embarrassing, or threatening nature. |
4.4.4 | Identify strategies to deal with cyberbullying. |
4.4.4.A | Seek assistance from a trusted adult. |
4.4.4.B | Be assertive (not aggressive, fighting, or teasing back). |
4.4.4.C | Avoid unsafe websites. |
4.4.4.D | Use positive statements to maintain positive self-esteem. |
4.4.4.E | Avoid getting emotionally upset. |
4.4.5 | Identify the steps to report cyberbullying. |
4.4.5.A | Don’t respond to and don’t forward the cyberbullying messages. |
4.4.5.B | Keep evidence of cyberbullying. |
4.4.5.BA | Record dates, times and descriptions of instance when cyberbullying occurred. |
4.4.5.BB | Save and print screenshots, emails, and text messages. |
4.4.5.C | Block the person who is cyberbullying. |
4.4.5.D | Tell a trusted adult. |
4.4.6 | Identify consequences of cyberbullying for the perpetrator and victim. |
4.4.6.A | Perpetrator |
4.4.6.AA | Criminal record |
4.4.6.AB | Internet or app restrictions |
4.4.6.AC | Negative digital footprint |
4.4.6.AD | School discipline |
4.4.6.B | Victim |
4.4.6.BA | Anxious/Depression |
4.4.6.BB | Changes in appetite |
4.4.6.BC | Stress of being in a constant state of fear |
5.1.1 | Identify the primary structural elements of the user interface |
5.1.1.A | Define icons as an image that represents a capability of a computer and is usually selected |
5.1.1.B | Define menus as list of options or commands to help the user find information or complete a task |
5.1.1.C | Define tabs as part of a computer window that allows the user to go to different parts of the program or website |
5.1.1.D | Define toolbar as a set of icons used to perform certain functions. |
5.1.1.E | Define window as a viewing area on a computer. |
5.1.2 | Identify the primary interaction elements of the user interface. |
5.1.2.A | Define adjustment handle as a small box that appears on the corners and edges of an element allowing the user to adjust size and shape |
5.1.2.B | Define command button as an element the user interacts with to tell the digital device to complete a task |
5.1.2.C | Define cursor as a movable indicator on a computer screen, identifying the point that will be affected by input from the user |
5.1.2.D | Define insertion point as the blinking vertical line in your document where you can enter text on your page |
5.1.3 | Identify primary keyboard shortcuts |
5.1.3.A | Identify primary keyboard shortcuts: Cut |
5.1.3.B | Identify primary keyboard shortcuts: Copy |
5.1.3.C | Identify primary keyboard shortcuts: Paste |
5.1.3.D | Identify primary keyboard shortcuts: Undo |
5.1.3.E | Identify primary keyboard shortcuts: Redo |
5.1.3.F | Identify primary keyboard shortcuts: Save |
5.1.3.G | Identify primary keyboard shortcuts: Print |
5.1.3.H | Identify primary keyboard shortcuts: Find |
5.1.4 | Identify the difference between Save and Save As. |
5.1.4.A | Define Save as a command that creates an original file and location or updates changes made in a document while keeping the original file name and location |
5.1.4.B | Define Save As as a command that creates a copy of a current document and allows the user to rename and/or relocate the document |
5.2.1 | Perform basic file management system tasks |
5.2.2 | Define file management system as software that manages the storage of data files |
5.2.2.A | Create and delete files |
5.2.2.AA | Define file as storage of computer recorded data |
5.2.2.B | Create and delete folders |
5.2.2.BA | Define folders as an icon on a computer used to access a directory of file storage |
5.2.2.C | Create subfolders |
5.2.2.CA | Define subfolders as a folder contained within another folder |
5.2.2.D | Duplicate files |
5.2.3 | Identify where deleted content is contained (i.e. recycle bin, trash can, permanently deleted). |
5.2.4 | Demonstrate the ability to sort and locate files based on search terms and file type |
5.2.5 | Rename files and save in a new location |
5.3.1 | Perform basic tasks by using word processing software |
5.3.1.A | Open a new document |
5.3.1.B | Print a document |
5.3.1.C | Save a document |
5.3.2 | Perform primary page layout tasks |
5.3.2.A | Perform primary page layout tasks: Page orientation |
5.3.2.B | Perform primary page layout tasks: Page margins |
5.3.3 | Perform basic text formatting tasks |
5.3.3.A | Perform basic text formatting tasks: Alignment (Left, Right, Center, Justify) |
5.3.3.B | Perform basic text formatting tasks: Bold |
5.3.3.C | Perform basic text formatting tasks: Font |
5.3.3.D | Perform basic text formatting tasks: Font color |
5.3.3.E | Perform basic text formatting tasks: Font highlight |
5.3.3.F | Perform basic text formatting tasks: Font size |
5.3.3.G | Perform basic text formatting tasks: Italics |
5.3.3.H | Perform basic text formatting tasks: Underline |
5.3.4.A | Insert and format a table: Insert table |
5.3.4.B | Insert and format a table: Add/delete columns and rows |
5.3.4.C | Insert and format a table: Merge cells |
5.3.4.D | Insert and format a table: Split cells |
5.3.4.E | Insert and format a table: Border/Shading |
5.3.5.A | Insert and format an image: Insert image |
5.3.5.B | Insert and format an image: Wrap text |
5.3.5.C | Insert and format an image: Adjust size |
5.3.6 | Perform a spelling and grammar check on a document |
5.4.1 | Identify the primary components of a spreadsheet |
5.4.1.A | Define active cell as the selected cell ready to input data |
5.4.1.B | Define cell as the intersection between a row and a column on a spreadsheet |
5.4.1.C | Define row as the horizontal cells identified by numbers |
5.4.1.D | Define column as the vertical cells identified by letters |
5.4.1.E | Define fill handle as a command that fills data in spreadsheet cells based on an existing pattern |
5.4.2 | Create basic mathematical formulas and functions in a spreadsheet |
5.4.2.A | Define cell range as a group of cells within a row and/or column |
5.4.2.B | Define formula as any calculation in a spreadsheet |
5.4.2.C | Define formula as any calculation in a spreadsheet |
5.4.3 | Perform the following formulas in a spreadsheet |
5.4.3.A | Perform the following formulas in a spreadsheet: Addition |
5.4.3.B | Perform the following formulas in a spreadsheet: Subtraction |
5.4.3.C | Perform the following formulas in a spreadsheet: Division |
5.4.3.D | Perform the following formulas in a spreadsheet: Multiplication |
5.4.4 | Perform the following functions in a spreadsheet |
5.4.4.A | Perform the following functions in a spreadsheet: SUM |
5.4.4.B | Perform the following functions in a spreadsheet: MIN |
5.4.4.C | Perform the following functions in a spreadsheet: MAX |
5.4.4.D | Perform the following functions in a spreadsheet: COUNT |
5.4.4.E | Perform the following functions in a spreadsheet: AVERAGE |
5.4.5 | Insert a column and pie chart using data from a cell range. |
5.4.5.A | Insert a column and pie chart using data from a cell range: Include a title |
5.4.5.B | Insert a column and pie chart using data from a cell range: Include a legend |
5.4.5.BA | Insert a column and pie chart using data from a cell range: Include a legend (Define legend as the box that contains small samples of each color on the chart as well as a short description of what each color means) |
5.5.1 | Apply different layouts to a slide |
5.5.1.A | Apply different layouts to a slide: Title Slide |
5.5.1.B | Apply different layouts to a slide: Title and Content |
5.5.1.C | Apply different layouts to a slide: Two Content |
5.5.2 | Perform basic functions in a presentation |
5.5.2.A | Perform basic functions in a presentation: Define animation as movement of an object or image within a slide |
5.5.2.B | Perform basic functions in a presentation: Define animation as movement of an object or image within a slide |
5.5.3 | Add images and/or media content to a presentation |
5.6.1 | Define field as a single piece of data |
5.6.2 | Define record as a group of fields and contains all the data about one person, company or item |
5.6.3 | Define query as a request for information from a database table |
5.6.4 | Define table as a database composed of records and fields that hold data |
5.6.5 | Identify different real-world uses for databases |
5.7.1 | Create events and/or appointments with the following features |
5.7.1.A | Create events and/or appointments with the following features: Individual |
5.7.1.B | Create events and/or appointments with the following features: Recurring |
5.7.1.C | Create events and/or appointments with the following features: Location |
5.7.1.D | Create events and/or appointments with the following features: Time Zone |
5.7.1.E | Create events and/or appointments with the following features: Notes |
5.7.1.F | Create events and/or appointments with the following features: Invitations |
6.1.1 | Understand platform compatibility |
6.1.2 | Define streaming as use of real-time audio and video over the Internet |
6.1.3 | Define downloading as saving a file from the Internet or other digital device to be used offline |
6.2.4.A | Audio: Record |
6.2.4.B | Audio: Trim |
6.2.4.C | Audio: Volume level |
6.2.5.A | Image: Crop |
6.2.5.B | Image: Brightness/Contrast |
6.2.5.C | Image: Export as a variety of file types (i.e. .jpeg, .png, .pdf, .gif) |
6.2.6.A | Video: Record |
6.2.6.B | Video: Trim |
6.2.6.C | Video: Volume level |
6.2.6.D | Video: Add audio track |
6.2.7.A | Voice: Record |
6.2.7.B | Voice: Trim |
6.2.7.C | Voice: Volume level |