R1 |
R1) Identify, demonstrate, and apply personal safe use of digital devices. |
Lessons
|
R2 |
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules. |
Lessons
|
R3 |
R3) Assess the validity and identify the purpose of digital content. |
Lessons
|
R4 |
R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues. |
Lessons
|
R5 |
R5) Locate and curate information from digital sources to answer research questions. |
Lessons
|
R6 |
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools. |
Lessons
|
1 |
Remove background details from an everyday process to highlight essential properties.
Examples: When making a sandwich, the type of bread, condiments, meats, and/or vegetables do not affect the fact that one is making a sandwich. |
Lessons
|
2 |
Define a process as a function.
Example: Functions or sets of steps combined to produce a process: turning off your alarm + getting out of bed + brushing your teeth + getting dressed = morning routine. |
Lessons
|
3 |
Create pseudocode that uses conditionals.
Examples: Using if/then/else (If it is raining then bring an umbrella else get wet). |
Lessons
|
4 |
Differentiate between flowcharts and pseudocode.
Example: Flowcharts use shapes to indicate what to do at each step while pseudocode uses text. |
Lessons
|
5 |
Identify algorithms that make use of sequencing, selection or iteration.
Examples: Sequencing is doing steps in order (put on socks, put on shoes, tie laces); selection uses a Boolean condition to determine which of two parts of an algorithm are used (hair is dirty? True, wash hair; false, do not); iteration is the repetition of part of an algorithm until a condition is met (if you’re happy and you know it clap your hands, when you’re no longer happy you stop clapping). |
Lessons
|
6 |
Identify steps in developing solutions to complex problems using computational thinking. |
Lessons
|
7 |
Describe how automation works to increase efficiency.
Example: Compare the amount of time/work to hand wash a car vs. using an automated car wash. |
Lessons
|
8 |
Create a program that initializes a variable.
Example: Create a flowchart in which the variable or object returns to a starting position upon completion of a task. |
Lessons
|
9 |
Differentiate between a secure and a non-secure website including how they affect personal data.
Example: HTTP vs. HTTPS. |
Lessons
|
10 |
Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution. |
Lessons
|
11 |
Differentiate between appropriate and inappropriate digital content and the use of that content. |
Lessons
|
12 |
Define digital permanence. |
Lessons
|
13 |
Define personal privacy, digital footprint, and open communication. |
Lessons
|
14 |
Discuss digital globalization and Internet censorship.
Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content. |
Lessons
|
15 |
Identify emerging technologies in computing. |
Lessons
|
16 |
Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems. |
Lessons
|
17 |
Type 30 words per minute with 95% accuracy using appropriate keyboarding techniques. |
Lessons
|
18 |
Define censorship. |
Lessons
|
19 |
Track data change from a variety of sources.
Example: Use editing or versioning tools to track changes to data. |
Lessons
|
20 |
Identify data transferring protocols, visualization, and the purpose of data and methods of storage.
Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database. |
Lessons
|
21 |
Identify varying data structures/systems and methods of classification, including decimal and binary.
Examples: Difference between a bit and a byte, bit representation, pixels. |
Lessons
|
22 |
Summarize the purpose of the American Standard Code for Information Interchange (ASCII). |
Lessons
|
23 |
Discuss how digital devices may be used to collect, analyze, and present information. |
Lessons
|
24 |
Compare and contrast types of networks.
Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet. |
Lessons
|
25 |
Differentiate between secure and non-secure systems. |
Lessons
|
26 |
Explain why professionals may use models as logical representations of physical, mathematical, or logical systems or processes.
Example: Students will discuss why an engineer may build a model of a building before actually constructing the building. |
Lessons
|
27 |
Explain how simulations serve to implement models. |
Lessons
|
28 |
Define assistive technologies and state reasons they may be needed. |
Lessons
|
29 |
Define artificial intelligence and identify examples of artificial intelligence in the community.
Examples: Image recognition, voice assistants. |
Lessons
|
30 |
Discuss and apply the components of the problem-solving process.
Example: Students will devise a plan to alleviate traffic congestion around the school during drop-off and pick-up. |
Lessons
|