Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons |
|---|---|
|
DLCS25.6.1
Create pseudocode using sequencing, selection, and iteration applying relational and logical operators to control program flow. |
|
|
DLCS25.6.2
Differentiate between flowcharts and pseudocode and create both to solve a task. |
|
|
DLCS25.6.3
Trace and debug pseudocode to identify outcomes and correct logic errors. |
|
|
DLCS25.6.4
Break a task into smaller steps and evaluate the purpose and effectiveness of each step to solve a problem. |
|
|
DLCS25.6.5
Explain how abstraction simplifies tasks, using real-life examples. |
|
|
DLCS25.6.6
Create a program that includes sequencing, selection, and iteration. |
|
|
DLCS25.6.7
Create an interactive program using sequential commands and user input to control basic program actions, like movement or responses. |
|
|
DLCS25.6.8
Differentiate between numeric and text data types and construct simple data structures. |
|
|
DLCS25.6.9
Explain why computers use a binary system. |
|
|
DLCS25.6.10
Create graphs or charts from simple datasets to identify patterns, and describe key findings. |
|
|
DLCS25.6.11
Generate and interpret descriptive statistics, including mean, median, and mode, to summarize data. |
|
|
DLCS25.6.12
Use basic models or simulations to test how changes in input affect outcomes. |
|
|
DLCS25.6.13
Explain the basic roles of routers, IP addresses, domain names, and servers in network communication. |
|
|
DLCS25.6.14
Differentiate between the Internet and the World Wide Web. |
|
|
DLCS25.6.15
Identify common online threats, including social engineering, and describe safe practices to protect personal information. |
|
|
DLCS25.6.16
Explain how strong passwords and multi-factor authentication help protect data. |
|
|
DLCS25.6.17
Compare safe and unsafe online behaviors related to social media use, personal identifiable information, and cyberbullying. |
|
|
DLCS25.6.18
Perform basic troubleshooting to solve hardware problems. |
|
|
DLCS25.6.19
Identify examples of system and application software, and match common applications to appropriate tasks |
|
|
DLCS25.6.20
Explain the purpose of an operating system and describe how it manages hardware and software resources. |
|
|
DLCS25.6.21
Identify a variety of careers that relate to or utilize computer science skills. |
|
|
DLCS25.6.22
Summarize major state and federal laws related to technology use, including those regulating copyright and intellectual property. |
|
|
DLCS25.6.23
Describe how AI systems are used in everyday life and examine the ethical considerations they raise. [AI] |
|
|
DLCS25.6.24
Explain how computing technologies have changed and will continue to change the way people communicate, learn, and work in their daily lives and communities |
|
|
DLCS25.6.25
Identify examples of relevant emerging technologies and describe their purposes. [AI] |
|
|
DLCS25.6.26
Evaluate accessibility features in digital tools and explain how they improve usability for individuals with diverse abilities. |
|
|
DLCS25.6.27
Analyze digital content for reliability and cite sources properly. |
|
|
DLCS25.6.28
Investigate their own digital footprints and describe the effects digital footprints can have on themselves and others. |
|
|
DLCS25.6.29
Create and apply a structured system for organizing files, folders, and subfolders to manage and retrieve digital work efficiently. |
|
|
DLCS25.6.30
Identify AI and non-AI technologies and features when using digital tools. [AI] |
|
|
DLCS25.6.31
Input text at a rate of 25 words per minute via keyboard or alternative text input method. |
|