Please enable JavaScript to use CodeHS

UT Digital Literacy Framework

Standards

Standard Description
1.1.1 Sit up straight Lessons
1.1.2 Feet flat on the floor Lessons
1.1.3 Body centered with the “G” and “H” keys Lessons
1.1.4 Fingers curved on home row (A, S, D, F, J, K, L, ;) Lessons
1.1.5 Wrists straight and elbows naturally at sides Lessons
1.1.6 Correct fingers used for keystrokes Lessons
1.1.7 Key by touch (eyes on copy or screen, not on keys) Lessons
1.1.8 Key with smooth rhythm Lessons
2.1.1 Define hardware as the physical components that make up a computing system, computer, or computing device. Lessons
2.1.2.A Identify primary hardware components of a computer: Monitor Lessons
2.1.2.B Identify primary hardware components of a computer: Keyboard Lessons
2.1.2.C Identify primary hardware components of a computer: System unit Lessons
2.1.2.D Identify primary hardware components of a computer: Motherboard Lessons
2.1.2.E Identify primary hardware components of a computer: Power supply Lessons
2.1.2.F Identify primary hardware components of a computer: Hard Drive/Solid State Drive (SDD) Lessons
2.1.2.G Identify primary hardware components of a computer: Central Processing Unit (CPU) Lessons
2.1.2.H Identify primary hardware components of a computer: Mouse/Touchpad/Touchscreen Lessons
2.1.3 Define peripheral devices as an internal or external device that connects directly to a computer but does not contribute to the primary function of a computer. Lessons
2.1.4.A Identify primary peripheral devices: Printer Lessons
2.1.4.B Identify primary peripheral devices: Camera Lessons
2.1.4.C Identify primary peripheral devices: Projector Lessons
2.1.4.D Identify primary peripheral devices: Speakers Lessons
2.1.4.E Identify primary peripheral devices: Headphones Lessons
2.1.4.F Identify primary peripheral devices: Microphone Lessons
2.1.4.G Identify primary peripheral devices: Game controller Lessons
2.1.4.H Identify primary peripheral devices: Virtual Reality (VR) headsets Lessons
2.2.1 Define software as a set of instruction that runs a computing system, computer, or other computing device. Lessons
2.2.2.A Define the two types of software for a computing system: Operating system is software that controls the communication between the hardware and application software of a computer. Lessons
2.2.2.B Define the two types of software for a computing system: Application software is developed to help the user perform specific tasks. Lessons
2.2.3.A Identify the primary operating system of a computing device: Windows Lessons
2.2.3.B Identify the primary operating system of a computing device: Mac OS Lessons
2.2.3.C Identify the primary operating system of a computing device: Android Lessons
2.2.3.D Identify the primary operating system of a computing device: iOS Lessons
2.2.3.E Identify the primary operating system of a computing device: Linux Lessons
2.2.4.A Identify the common application software for a computing device: Business software (i.e. word processing, spreadsheets, databases, presentation, email, calendaring) Lessons
2.2.4.B Identify the common application software for a computing device: Communication software (i.e. social media, email, video conference, instant messaging) Lessons
2.2.4.C Identify the common application software for a computing device: Entertainment software (i.e. virtual reality, streaming, gaming) Lessons
2.2.4.D Identify the common application software for a computing device: Multimedia software (i.e. photo, image, video, audio, speech to text, artificial intelligence (AI ) speech technology) Lessons
2.2.4.E Identify the common application software for a computing device: Education software (i.e. learning management system (LMS), gradebook, e-books) Lessons
2.3.1 Define input device as hardware equipment used to transfer data to a computing system for processing. Lessons
2.3.2.A Explain the function of primary input devices: Keyboard Lessons
2.3.2.B Explain the function of primary input devices: Mouse/Touchpad Lessons
2.3.2.C Explain the function of primary input devices: Touchscreen Lessons
2.3.2.D Explain the function of primary input devices: Microphone Lessons
2.3.2.E Explain the function of primary input devices: Camera Lessons
2.3.2.F Explain the function of primary input devices: Game controller Lessons
2.4.1 Define processing as interpreting input and producing output. Lessons
2.4.2 Define and explain the main processing device in a computer system: Central Processing Unit (CPU) is the master chip that controls all other aspects of the computer. Lessons
2.4.3.A Define the relationship of an algorithm, loop, and conditional in computer processing: Algorithm is a set of instructions to complete a task Lessons
2.4.3.AA The CPU uses the algorithm as an input to produce output: The CPU uses the algorithm as an input to produce output Lessons
2.4.3.B Loop is a programming structure that repeats a set of instructions as long as a specific condition is true Lessons
2.4.3.BB Loop is a programming structure that repeats a set of instructions as long as a specific condition is true: The CPU uses the loop as an input to repeat the task to output data until the specific condition is true Lessons
2.4.3.C Conditional is a feature of a programming language that performs different computations or actions depending on whether a programmer-specified Boolean condition evaluate to true or false Lessons
2.4.3.C.i Conditional is a feature of a programming language that performs different computations or actions depending on whether a programmer-specified Boolean condition evaluate to true or false: The CPU uses the conditional as an input to continue to evaluate whether or not to send output data Lessons
2.4.4 Explain the role of the CPU, memory, and storage when purchasing a computing device based on the individual user’s needs Lessons
2.5.1 Define memory as temporarily stored data for immediate use in a computer system. Lessons
2.5.2.A Define the two types of memory for a computer system: Random Access Memory (RAM) is used by the operating system and application software while the computer is running Lessons
2.5.2.B Define the two types of memory for a computer system: Read Only Memory (ROM) is preloaded instructions for booting up the computer Lessons
2.5.3 Define storage as a place where data can be held and retrieved at a later time. Lessons
2.5.4.A Identify the benefits of using different types of primary storage: Define hard drive as an internal storage device that stores data Lessons
2.5.4.B Identify the benefits of using different types of primary storage: Define external hard drive as a portable storage device that stores data Lessons
2.5.4.C Identify the benefits of using different types of primary storage: Define flash drive as a small, portable storage device that uses electrical rewritable storage (flash) to store or transfer data (i.e. USB, thumb drive, memory stick, jump drive) Lessons
2.5.4.D Identify the benefits of using different types of primary storage: Define Solid-state drive (SSD) as a storage device that uses an electrical rewritable storage (flash) and performs tasks faster than a hard drive Lessons
2.5.4.E Identify the benefits of using different types of primary storage: Define memory card as a small, flat flash drive used in mobile devices and digital cameras (i.e. SD card, micro SD card). Lessons
2.5.4.F Identify the benefits of using different types of primary storage: Define cloud storage as storage where data is transmitted and stored on remote storage systems where it is maintained, managed, and backed up and made available to users over a network (i.e. Google Drive, iCloud, Dropbox, OneDrive) Lessons
2.5.5 Explain the role of memory and storage when purchasing a computing device based on the individual user’s needs. Lessons
2.6.1 Define output as information processed from a computing system and received by the user. Lessons
2.6.2 Define output device as hardware equipment used to transfer data out from a computer system. Lessons
2.6.3.A Explain the function of primary output devices: Monitor/Screen Lessons
2.6.3.B Explain the function of primary output devices: Printer Lessons
2.6.3.C Explain the function of primary output devices: Projector Lessons
2.6.3.D Explain the function of primary output devices: Speakers Lessons
2.6.3.E Explain the function of primary output devices: Headphones Lessons
3.1.1 Define network as a group of two or more digital devices connected to share information. Lessons
3.1.2 Define Internet as a global network. Lessons
3.1.3 Define bandwidth as the amount of information that can travel on an Internet connection in a certain timeframe. Lessons
3.1.4 Define uniform resource locator (URL) as an address for a worldwide webpage Lessons
3.1.5 Define Internet protocol (IP) address as a unique set of numbers separated by periods that identifies each digital device using the Internet to communicate. Lessons
3.1.6 Define Internet browser as an application used to access and view websites. Lessons
3.1.7 Define search engine as a program that searches for and identifies items in a database using keywords to find websites for information on the Internet. Lessons
3.1.8 Define server as a computer or computer program which manages access to databases of information in a network. Lessons
3.2.1 Identify the different components required for an Internet connection Lessons
3.2.1.A Define Internet service provider (ISP) as a company that provides subscribers with access to the Internet Lessons
3.2.1.B Define modem as a hardware component that converts packets into a usable signal to allow another device, such as a router, to connect to the Internet Lessons
3.2.1.BB Define packet as small bits of data sent over a network Lessons
3.2.1.C Define router as a device that transports the packets of information between the digital device and modem Lessons
3.2.1.D Define digital device as a device that utilizes hardware and software during the information processing cycle Lessons
3.2.2.A Identify types of Internet connections: Cellular Lessons
3.2.2.B Identify types of Internet connections: Digital Subscriber Line (DSL) Lessons
3.2.2.C Identify types of Internet connections: Fiber optic Lessons
3.2.2.D Identify types of Internet connections: Satellite Lessons
3.2.2.E Identify types of Internet connections: Wireless (WiFi) Lessons
3.2.3 Explain how Internet connection and bandwidth impact speed and accessibility. Lessons
3.2.4 Define uniform resource locator (URL) as an address of a World Wide webpage on the Intenet. Lessons
3.2.5.A Explain the component of a URL: Scheme (i.e. http://, https://) Lessons
3.2.5.B Explain the component of a URL: Sub-domain (WWW) Lessons
3.2.5.C Explain the component of a URL: Domain name (name of the website) Lessons
3.2.5.D Explain the component of a URL: Top Level Domain (i.e. .org, .com, .net., .edu., .gov) Lessons
3.2.5.E Explain the component of a URL: File path (description of the exact webpage location) Lessons
3.2.6.A Search Internet content efficiently and effectively: Search engine (i.e. Google, Bing) Lessons
3.2.6.B Search Internet content efficiently and effectively: Don’t use common words and punctuation Lessons
3.2.6.C Search Internet content efficiently and effectively: Specific keywords Lessons
3.2.6.D Search Internet content efficiently and effectively: Use quotation marks Lessons
3.2.7.A Demonstrate the use of common website navigation components: Menu - Chrome app launcher (waffle) Lessons
3.2.7.AA Demonstrate the use of common website navigation components: Menu - Three dots (kabob) Lessons
3.2.7.AB Demonstrate the use of common website navigation components: Menu - Three lines (hamburger) Lessons
3.2.7.B Demonstrate the use of common website navigation components: Home page Lessons
3.2.7.C Demonstrate the use of common website navigation components: Search bar Lessons
3.2.7.D Demonstrate the use of common website navigation components: Graphics Lessons
3.2.7.E Demonstrate the use of common website navigation components: Hyperlinks Lessons
3.2.8.A Identify components of credible online content: Author Lessons
3.2.8.B Identify components of credible online content: Date Lessons
3.2.8.C Identify components of credible online content: Verified sources Lessons
3.2.8.D Identify components of credible online content: Domain Lessons
3.2.8.E Identify components of credible online content: Design Lessons
3.2.8.F Identify components of credible online content: Writing style Lessons
3.3.1.A Identify different types of communication programs: Define email as messages distributed by email application software from one digital device to another using a network (i.e. Gmail, Outlook, Yahoo) Lessons
3.3.1.B Identify different types of communication programs: Define instant messaging as online chat that offers real-time text communication over the Internet (i.e. Google Chat, Instagram DM (Direct Message), Facebook Messenger) Lessons
3.3.1.C Identify different types of communication programs: Define video conference as a conference where participants, in different locations, are able to communicate with each other in sound and vision (i.e. Skype, Google Meet, Microsoft Teams, FaceTime, Zoom) Lessons
3.3.1.D Identify different types of communication programs: Define web authoring as a category of software that allows the user to develop a website using visual tools based on code (i.e. Weebly, Google Sites, Wix, Adobe Spark, WordPress). Lessons
3.3.1.E Identify different types of communication programs: Define social networking as the use of internet based social media sites to stay connected with others Lessons
3.3.2.A Identify the primary feature of an email: Define subject as an informative, catchy, and brief line of text seen when the email reaches the recipient’s inbox Lessons
3.3.2.B Identify the primary feature of an email: Define CC as a courtesy copy (previously known as carbon copy) including one or more recipients when a message is intended for one person but is relevant to other people as well Lessons
3.3.2.C Identify the primary feature of an email: Define BCC as a blind courtesy copy (previously known as blind carbon copy) to let others see an email without the main recipient knowing Lessons
3.3.2.CA Define BCC as a blind courtesy copy (previously known as blind carbon copy) to let others see an email without the main recipient knowing: Explain a variety of scenarios where CC and BCC would be used in an email. Lessons
3.3.2.D Define attachment as a file sent with an email message (i.e. image, video, text document). Often represented by a paperclip icon Lessons
3.3.2.E Define inline image as an image that is placed inside the body of the email. This allows the recipient to view the image without having to open the attachment Lessons
3.3.2.EA Explain a variety of scenarios where attachment and incline image would be used in an email Lessons
3.3.2.F Define signature block as a personalized block of text automatically included at the bottom of an email. A signature can include name, address, phone number, website, and other business information Lessons
3.3.2.G Define reply as the response to an email that goes to a single person (the person who sent the original email or the person who sent the last message in the email thread) Lessons
3.3.2.H Define reply all as the response to an email that goes to everyone who was included in the email, including CC Lessons
3.3.2.HA Explain a variety of scenarios where reply and reply all would be used in an email Lessons
3.3.2.I Define forward as the operation of re-sending an email message delivered to one email address to one or more different email addresses Lessons
3.3.3.A Identify the primary email folders: Inbox Lessons
3.3.3.B Identify the primary email folders: Deleted/Trash Lessons
3.3.3.C Identify the primary email folders: SPAM/Junk Mail Lessons
4.1.1 Define digital citizenship as continuously developing norms of appropriate, responsible, and empowered technology use. Lessons
4.1.2 Define digital footprint as the information about a particular person that exists on the Internet as a result of their online activity. Lessons
4.2.1 Define online safety as being aware of online risks and maximizing the user’s personal safety. Lessons
4.2.2.A Identify guidelines to protect users from various types of online predators: Avoid using suggestive screen names or photos Lessons
4.2.2.B Identify guidelines to protect users from various types of online predators: Avoid using suggestive screen names or photos Lessons
4.2.2.C Identify guidelines to protect users from various types of online predators: Be aware of excessive attention Lessons
4.2.2.D Identify guidelines to protect users from various types of online predators: Do not talk to anyone that wants to get too personal Lessons
4.2.2.E Identify guidelines to protect users from various types of online predators: Keep in mind that people are not always who they say they are Lessons
4.2.2.F Identify guidelines to protect users from various types of online predators: Never arrange to meet with someone you only know online in person Lessons
4.2.2.G Identify guidelines to protect users from various types of online predators: Tell a trusted adult if you encounter a problem Lessons
4.2.3 Define digital security as tools used to secure identify and data online. Lessons
4.2.4.A Identify threats in the digital world: Define adware as software that automatically displays unwanted advertising material when a user in online (i.e. pop-up advertisements) Lessons
4.2.4.B Identify threats in the digital world: Define computer worm virus as a malicious software that replicates itself to spread to other digital devices through a network Lessons
4.2.4.C Identify threats in the digital world: Define denial of service attacks as an attack to shut down a computer device or network by flooding it with traffic to make it inaccessible to the intended users Lessons
4.2.4.D Identify threats in the digital world: Define hackers as a person or program that uses computers to gain unauthorized access to data Lessons
4.2.4.E Identify threats in the digital world: Define malware as software that is specifically designed to disrupt, damage, or gain unauthorized access to a digital device Lessons
4.2.4.F Identify threats in the digital world: Define ransomware as a type of malicious software that is used to block access to a digital device until a sum of money is paid Lessons
4.2.4.G Identify threats in the digital world: Define spyware as software that enables a user to obtain private information about another’s computer activity by transmitting data secretly from their hard drive Lessons
4.2.4.H Identify threats in the digital world: Define Trojan Horse as a malicious code that looks legitimate and takes control of your computer to damage, disrupt, and destroy your data Lessons
4.2.5 Explain the importance of using anti-virus protection software on your digital device: Define anti-virus protection software as software designed to protect your computing device and destroy computer viruses. Lessons
4.2.5.A Explain the importance of using anti-virus protection software on your digital device. Lessons
4.2.6 Define online privacy as the protection of private data and communication. Lessons
4.2.7.A Identify threats to online transactions: Browser extensions Lessons
4.2.7.B Identify threats to online transactions: Credit card fraud Lessons
4.2.7.C Identify threats to online transactions: Data misuse Lessons
4.2.7.D Identify threats to online transactions: Hacking Lessons
4.2.7.E Identify threats to online transactions: Money theft Lessons
4.2.7.F Identify threats to online transactions: Unprotective services Lessons
4.2.8.A Identify threats to email and online communication: Catfishing Lessons
4.2.8.B Identify threats to email and online communication: Email scams Lessons
4.2.8.C Identify threats to email and online communication: Hacking Lessons
4.2.8.D Identify threats to email and online communication: Phishing Lessons
4.2.8.E Identify threats to email and online communication: Spoofing Lessons
4.2.9.A Explain the importance of different security measures on your digital devices: Password/passphrase Lessons
4.2.9.B Explain the importance of different security measures on your digital devices: Two-factor authentication Lessons
4.2.9.C Explain the importance of different security measures on your digital devices: Firewalls Lessons
4.2.9.D Explain the importance of different security measures on your digital devices: Secure website (HTTPS) Lessons
4.2.9.E Explain the importance of different security measures on your digital devices: Updates Lessons
4.3.1 Define intellectual property as a creative work or idea for which an individual has ownership rights. Lessons
4.3.2.A Define copyrights as the exclusive legal right given to the creator of works printed, posted, published, filmed, or recorded. Lessons
4.3.2.B Define creative commons as licenses that allow for the distribution of copyrighted works when the creator wants to give other people the right to share, use, or build upon what they have created. Lessons
4.3.2.C Define patents as the legal right granted to an inventor. Lessons
4.3.2.D Define public domain as intellectual property that is available for public use. Lessons
4.3.2.E Define trade secrets as formulas, patterns, or methods used to produce a creative work that is generally not known outside a company. Lessons
4.3.2.F Define trademarks as a distinctive protected mark or feature that identifies a person or thing. Lessons
4.3.3 Identify intellectual property violations. Lessons
4.3.3.A Define plagiarism as the practice of taking someone else’s intellectual property and using it as your own (i.e. copy/paste, images). Lessons
4.3.3.B Define copyright infringement (piracy) as the unauthorized use of or reproduction of another’s work for financial gain (i.e. music, movies, images). Lessons
4.3.4 Define digital ethics as how to manage oneself ethically and professionally when using digital device. Lessons
4.3.5 Define netiquette as being courteous and respectful when communicating online. Lessons
4.3.6 Explain the personal responsibilities of being ethical in a digital world. Lessons
4.3.6.A Explain the personal responsibilities of being ethical in a digital world. Lessons
4.3.6.B Explore appropriate and safe sites. Lessons
4.3.6.C Follow copyright laws. Lessons
4.3.6.D Help prevent cyberbullying. Lessons
4.3.6.E Maintain a positive digital footprint. Lessons
4.3.6.F Always use netiquette. Lessons
4.4.1 Define digital wellness as the preventative measures aimed at regulating and improving the healthy use of technology. Lessons
4.4.2 Identify measures to achieve personal digital wellness. Lessons
4.4.2.A Understand device use (i.e. get a detailed understanding of technology use) Lessons
4.4.2.B Create boundaries (i.e. set limits for certain apps and sites, limit notifications) Understand device use (i.e. get a detailed understanding of technology use) Lessons
4.4.2.C Make adjustments to device screen (i.e. remove distracting apps on your screen, adjust light preferences) Lessons
4.4.2.D Try single-tasking (i.e. to improve focus, try reducing the number of screens around you) Lessons
4.4.3 Define cyberbullying as the use of electronic communication to bully a person, typically by sending messages of an intimidating, embarrassing, or threatening nature. Lessons
4.4.4 Identify strategies to deal with cyberbullying. Lessons
4.4.4.A Seek assistance from a trusted adult. Lessons
4.4.4.B Be assertive (not aggressive, fighting, or teasing back). Lessons
4.4.4.C Avoid unsafe websites. Lessons
4.4.4.D Use positive statements to maintain positive self-esteem. Lessons
4.4.4.E Avoid getting emotionally upset. Lessons
4.4.5 Identify the steps to report cyberbullying. Lessons
4.4.5.A Don’t respond to and don’t forward the cyberbullying messages. Lessons
4.4.5.B Keep evidence of cyberbullying. Lessons
4.4.5.BA Record dates, times and descriptions of instance when cyberbullying occurred. Lessons
4.4.5.BB Save and print screenshots, emails, and text messages. Lessons
4.4.5.C Block the person who is cyberbullying. Lessons
4.4.5.D Tell a trusted adult. Lessons
4.4.6 Identify consequences of cyberbullying for the perpetrator and victim. Lessons
4.4.6.A Perpetrator Lessons
4.4.6.AA Criminal record Lessons
4.4.6.AB Internet or app restrictions Lessons
4.4.6.AC Negative digital footprint Lessons
4.4.6.AD School discipline Lessons
4.4.6.B Victim Lessons
4.4.6.BA Anxious/Depression Lessons
4.4.6.BB Changes in appetite Lessons
4.4.6.BC Stress of being in a constant state of fear Lessons
5.1.1 Identify the primary structural elements of the user interface Lessons
5.1.1.A Define icons as an image that represents a capability of a computer and is usually selected Lessons
5.1.1.B Define menus as list of options or commands to help the user find information or complete a task Lessons
5.1.1.C Define tabs as part of a computer window that allows the user to go to different parts of the program or website Lessons
5.1.1.D Define toolbar as a set of icons used to perform certain functions. Lessons
5.1.1.E Define window as a viewing area on a computer. Lessons
5.1.2 Identify the primary interaction elements of the user interface. Lessons
5.1.2.A Define adjustment handle as a small box that appears on the corners and edges of an element allowing the user to adjust size and shape Lessons
5.1.2.B Define command button as an element the user interacts with to tell the digital device to complete a task Lessons
5.1.2.C Define cursor as a movable indicator on a computer screen, identifying the point that will be affected by input from the user Lessons
5.1.2.D Define insertion point as the blinking vertical line in your document where you can enter text on your page Lessons
5.1.3 Identify primary keyboard shortcuts Lessons
5.1.3.A Identify primary keyboard shortcuts: Cut Lessons
5.1.3.B Identify primary keyboard shortcuts: Copy Lessons
5.1.3.C Identify primary keyboard shortcuts: Paste Lessons
5.1.3.D Identify primary keyboard shortcuts: Undo Lessons
5.1.3.E Identify primary keyboard shortcuts: Redo Lessons
5.1.3.F Identify primary keyboard shortcuts: Save Lessons
5.1.3.G Identify primary keyboard shortcuts: Print Lessons
5.1.3.H Identify primary keyboard shortcuts: Find Lessons
5.1.4 Identify the difference between Save and Save As. Lessons
5.1.4.A Define Save as a command that creates an original file and location or updates changes made in a document while keeping the original file name and location Lessons
5.1.4.B Define Save As as a command that creates a copy of a current document and allows the user to rename and/or relocate the document Lessons
5.2.1 Perform basic file management system tasks Lessons
5.2.2 Define file management system as software that manages the storage of data files Lessons
5.2.2.A Create and delete files Lessons
5.2.2.AA Define file as storage of computer recorded data Lessons
5.2.2.B Create and delete folders Lessons
5.2.2.BA Define folders as an icon on a computer used to access a directory of file storage Lessons
5.2.2.C Create subfolders Lessons
5.2.2.CA Define subfolders as a folder contained within another folder Lessons
5.2.2.D Duplicate files Lessons
5.2.3 Identify where deleted content is contained (i.e. recycle bin, trash can, permanently deleted). Lessons
5.2.4 Demonstrate the ability to sort and locate files based on search terms and file type Lessons
5.2.5 Rename files and save in a new location Lessons
5.3.1 Perform basic tasks by using word processing software Lessons
5.3.1.A Open a new document Lessons
5.3.1.B Print a document Lessons
5.3.1.C Save a document Lessons
5.3.2 Perform primary page layout tasks Lessons
5.3.2.A Perform primary page layout tasks: Page orientation Lessons
5.3.2.B Perform primary page layout tasks: Page margins Lessons
5.3.3 Perform basic text formatting tasks Lessons
5.3.3.A Perform basic text formatting tasks: Alignment (Left, Right, Center, Justify) Lessons
5.3.3.B Perform basic text formatting tasks: Bold Lessons
5.3.3.C Perform basic text formatting tasks: Font Lessons
5.3.3.D Perform basic text formatting tasks: Font color Lessons
5.3.3.E Perform basic text formatting tasks: Font highlight Lessons
5.3.3.F Perform basic text formatting tasks: Font size Lessons
5.3.3.G Perform basic text formatting tasks: Italics Lessons
5.3.3.H Perform basic text formatting tasks: Underline Lessons
5.3.4.A Insert and format a table: Insert table Lessons
5.3.4.B Insert and format a table: Add/delete columns and rows Lessons
5.3.4.C Insert and format a table: Merge cells Lessons
5.3.4.D Insert and format a table: Split cells Lessons
5.3.4.E Insert and format a table: Border/Shading Lessons
5.3.5.A Insert and format an image: Insert image Lessons
5.3.5.B Insert and format an image: Wrap text Lessons
5.3.5.C Insert and format an image: Adjust size Lessons
5.3.6 Perform a spelling and grammar check on a document Lessons
5.4.1 Identify the primary components of a spreadsheet Lessons
5.4.1.A Define active cell as the selected cell ready to input data Lessons
5.4.1.B Define cell as the intersection between a row and a column on a spreadsheet Lessons
5.4.1.C Define row as the horizontal cells identified by numbers Lessons
5.4.1.D Define column as the vertical cells identified by letters Lessons
5.4.1.E Define fill handle as a command that fills data in spreadsheet cells based on an existing pattern Lessons
5.4.2 Create basic mathematical formulas and functions in a spreadsheet Lessons
5.4.2.A Define cell range as a group of cells within a row and/or column Lessons
5.4.2.B Define formula as any calculation in a spreadsheet Lessons
5.4.2.C Define formula as any calculation in a spreadsheet Lessons
5.4.3 Perform the following formulas in a spreadsheet Lessons
5.4.3.A Perform the following formulas in a spreadsheet: Addition Lessons
5.4.3.B Perform the following formulas in a spreadsheet: Subtraction Lessons
5.4.3.C Perform the following formulas in a spreadsheet: Division Lessons
5.4.3.D Perform the following formulas in a spreadsheet: Multiplication Lessons
5.4.4 Perform the following functions in a spreadsheet Lessons
5.4.4.A Perform the following functions in a spreadsheet: SUM Lessons
5.4.4.B Perform the following functions in a spreadsheet: MIN Lessons
5.4.4.C Perform the following functions in a spreadsheet: MAX Lessons
5.4.4.D Perform the following functions in a spreadsheet: COUNT Lessons
5.4.4.E Perform the following functions in a spreadsheet: AVERAGE Lessons
5.4.5 Insert a column and pie chart using data from a cell range. Lessons
5.4.5.A Insert a column and pie chart using data from a cell range: Include a title Lessons
5.4.5.B Insert a column and pie chart using data from a cell range: Include a legend Lessons
5.4.5.BA Insert a column and pie chart using data from a cell range: Include a legend (Define legend as the box that contains small samples of each color on the chart as well as a short description of what each color means) Lessons
5.5.1 Apply different layouts to a slide Lessons
5.5.1.A Apply different layouts to a slide: Title Slide Lessons
5.5.1.B Apply different layouts to a slide: Title and Content Lessons
5.5.1.C Apply different layouts to a slide: Two Content Lessons
5.5.2 Perform basic functions in a presentation Lessons
5.5.2.A Perform basic functions in a presentation: Define animation as movement of an object or image within a slide Lessons
5.5.2.B Perform basic functions in a presentation: Define animation as movement of an object or image within a slide Lessons
5.5.3 Add images and/or media content to a presentation Lessons
5.6.1 Define field as a single piece of data Lessons
5.6.2 Define record as a group of fields and contains all the data about one person, company or item Lessons
5.6.3 Define query as a request for information from a database table Lessons
5.6.4 Define table as a database composed of records and fields that hold data Lessons
5.6.5 Identify different real-world uses for databases Lessons
5.7.1 Create events and/or appointments with the following features Lessons
5.7.1.A Create events and/or appointments with the following features: Individual Lessons
5.7.1.B Create events and/or appointments with the following features: Recurring Lessons
5.7.1.C Create events and/or appointments with the following features: Location Lessons
5.7.1.D Create events and/or appointments with the following features: Time Zone Lessons
5.7.1.E Create events and/or appointments with the following features: Notes Lessons
5.7.1.F Create events and/or appointments with the following features: Invitations Lessons
6.1.1 Understand platform compatibility Lessons
6.1.2 Define streaming as use of real-time audio and video over the Internet Lessons
6.1.3 Define downloading as saving a file from the Internet or other digital device to be used offline Lessons
6.2.4.A Audio: Record Lessons
6.2.4.B Audio: Trim Lessons
6.2.4.C Audio: Volume level Lessons
6.2.5.A Image: Crop Lessons
6.2.5.B Image: Brightness/Contrast Lessons
6.2.5.C Image: Export as a variety of file types (i.e. .jpeg, .png, .pdf, .gif) Lessons
6.2.6.A Video: Record Lessons
6.2.6.B Video: Trim Lessons
6.2.6.C Video: Volume level Lessons
6.2.6.D Video: Add audio track Lessons
6.2.7.A Voice: Record Lessons
6.2.7.B Voice: Trim Lessons
6.2.7.C Voice: Volume level Lessons