Standards - Digital Literacy & Computer Science

DLCS18.HS.R1

Identify, demonstrate, and apply personal safe use of digital devices.

Unpacked Content

Knowledge

Students know:
  • how to safely use digital devices.
  • that failure to use digital devices safely can have an impact on access at school as well as the protection of personal data.

Skills

Students are able to:
  • identify personal safe use of digital devices.
  • demonstrate personal safe use of digital devices.
  • apply personal safe use of digital devices.

Understanding

Students understand that:
  • it is important to protect personal data when sharing information on the internet.

DLCS18.HS.R2

Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Unpacked Content

Knowledge

Students know:
  • that schools/districts have rules in place to protect students.
  • that laws exist requiring schools to put measures in place to protect students.

Skills

Students are able to:
  • identify appropriate responsible use of digital devices found in the school/district rules.
  • demonstrate appropriate responsible use of digital devices.
  • communicate reasons for appropriate responsible use of digital devices found in the school/district rules.

Understanding

Students understand that:
  • there are appropriate and inappropriate ways to use digital devices.
  • inappropriate use of devices has consequences in school and in the real world.
  • laws exist that require schools to monitor and/or censor internet access.

DLCS18.HS.R3

Assess the validity and identify the purpose of digital content.

Unpacked Content

Knowledge

Students know:
  • not all information found online is valid.
  • some information is shared online to promote an agenda.
  • all information has a purpose.

Skills

Students are able to:
  • assess the validity of digital content.
  • identify the purpose of digital content.

Understanding

Students understand that:
  • not all information available digitally is accurate, valid, and/or unbiased.
  • some users/groups misrepresent information in an effort to skew perceptions.

DLCS18.HS.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include clear any cache or internet history, complete disk checks or disk defrag, complete a system restore or reset the device.

Understanding

Students understand that:
  • computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.HS.R5

Locate and curate information from digital sources to answer research questions.

Unpacked Content

Knowledge

Students know:
  • how to find valid sources to answer a given research topic.
  • how to cite sources.

Skills

Students are able to:
  • locate valid digital resources to answer given research questions.

Understanding

Students understand that:
  • a great deal of information is available.
  • it is important to validate information and to cite the source of information.

Vocabulary

  • curate

DLCS18.HS.R6

Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

Unpacked Content

Knowledge

Students know:
  • feedback is important in a design process.

Skills

Students are able to:
  • create a multimedia artifact.
  • critique the work of others.
  • revise their work based on feedback received.

Understanding

Students understand that:
  • much like the writing process, design of a multimedia artifact nets the best results when creators have the opportunity to be given feedback and revise as needed.

DLCS18.HS.1

Decompose problems into component parts, extract key information, and develop descriptive models to understand the levels of abstractions in complex systems.

Unpacked Content

Knowledge

Students know:
  • complex problems may be more easily processed when broken into simpler problems.
  • that it is important to highlight key details of a problem.
  • descriptive models can help outline the procedures to solve more complex problems.

Skills

Students are able to:
  • solve a complex problem by decomposing the problem into smaller, simpler problems.
  • extract key details needed in the problem
  • solving process.
  • develop descriptive models to convey the levels of abstraction in complex systems.

Understanding

Students understand that:
  • complex problems may be easier to solve if they are broken into smaller problems first.
  • it is important to identify key details in the problem.

Vocabulary

  • decompose

DLCS18.HS.2

Explain how computing systems are often integrated with other systems and embedded in ways that may not be apparent to the user.

COS Examples

Examples: Millions of lines of code control the subsystems within an automobile (e.g., antilock braking systems, lane detection, and self-parking).

Unpacked Content

Knowledge

Students know:
  • that many electronic devices we encounter are comprised of multiple complex systems.

Skills

Students are able to:
  • identify examples of complex computing systems in everyday life.
  • explain how computing systems are often integrated with other systems and embedded in ways that may not be apparent to most users.

Understanding

Students understand that:
  • complex computing systems exist that integrate computing systems with one another in ways that may not be apparent to the user.

DLCS18.HS.3

Differentiate between a generalized expression of an algorithm in pseudocode and its concrete implementation in a programming language.

Unpacked Content

Knowledge

Students know:
  • that differences exist in pseudocode and a programming language.
  • that programming languages have certain requirements for language and syntax.
a.
  • that some programs cannot return a result in a reasonable time frame, therefore approximations must be allowed in those cases.
b.
  • how to identify sequential statements, conditional statements, and/or iterations in code.
  • the differences between sequential statements, conditional statements, and/or iterations.
  • trade-offs exist with using one control structure over another.
c.
  • some decisions in a program will require the use of iterative loops, selection constructs, or recursion.
d.
  • programs can be written to satisfy a number of needs such as performance, reusability, and ease of implementation.
  • that most times, algorithms will differ based on the need of the program; performance, reusability, or ease of implementation.
e.
  • that programs can be written with specific priorities in mind.
  • that there are multiple correct ways to write a program.
  • that solutions are often chosen to meet the priority need of the program.

Skills

Students are able to:
  • distinguish between a generalized expression of an algorithm in pseudocode and its concrete implementation in a programming language.
  • point out similarities in vocabulary and syntax between pseudocode and an algorithm.
  • point out differences in vocabulary and syntax between pseudocode and an algorithm.
a.
  • explain that some algorithms do not lead to exact solutions in a reasonable amount of time and thus approximations are acceptable.
b.
  • identify sequential statements, conditional statements, and/or iterations in code.
  • identify tradeoffs associated with using one control structure over another.
c.
  • distinguish when a problem solution requires decisions to be made among alternatives or when a solution needs to be iteratively processed to arrive at a result.
d.
  • evaluate and select algorithms based on performance, reusability, and ease of implementation.
e.
  • explain how more than one algorithm may solve the same problem and yet be characterized with different priorities.

Understanding

Students understand that:
  • similarities and differences exist in pseudocode and programming code.
  • some programming languages more closely resemble pseudocode than do other programming languages.
a.
  • due to time or financial constraints, some programs may return an approximation of a solution.
b.
  • both benefits and drawbacks exist when selecting one control structure over another in a code.
c.
  • programs can use multiple methods to arrive at a solution.
d.
  • there are times when a program needs to be selected for a specific purpose, such as performance, reusability, and/or ease of implementation.
e.
  • multiple algorithms can solve the same problem.
  • algorithms can operate with a specific priority in mind, such as speed, simplicity, and/or safety.

Vocabulary

  • pseudocode
  • programming language
a.
  • approximated
b.
  • iteration
  • conditional statements
  • control structures
c.
  • iterative loop
  • selection constructs
  • recursion

Aligned Learning Resources

DLCS18.HS.3b

Compare and contrast the difference between specific control structures such as sequential statements, conditional, iteration, and explain the benefits and drawbacks of choices made.

COS Examples

Examples: Tradeoffs involving implementation, readability, and program performance.

DLCS18.HS.3c

Distinguish when a problem solution requires decisions to be made among alternatives, such as selection constructs, or when a solution needs to be iteratively processed to arrive at a result, such as iterative ‘loop’ constructs or recursion.

DLCS18.HS.3e

Explain how more than one algorithm may solve the same problem and yet be characterized with different priorities.

COS Examples

Examples: All self-driving cars have a common goal of taking a passenger to a designation but may have different priorities such as safety, speed, or conservation; web search engines have their own algorithms for search with their own priorities.

DLCS18.HS.4

Use and adapt classic algorithms to solve computational problems.

COS Examples

Examples: Sorting, searching, shortest path, and data compression.

DLCS18.HS.5

Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using current events.

Unpacked Content

Knowledge

Students know:
  • how to design and develop computational artifacts for practical intent.
  • how to design and develop computational artifacts for personal expression.
  • how to design and develop computational artifacts to address a societal issue by using current events.

Skills

Students are able to:
  • design and develop computational artifacts using an iterative design process.
  • use current events to bring merit to computational artifacts.

Understanding

Students understand that:
  • design should be an iterative process whereby the designer seeks feedback to improve upon his/her creation.

DLCS18.HS.6

Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects, with parameters, and which return a result.

Unpacked Content

Knowledge

Students know:
  • removing unessential details can make a process simpler.
  • control structures can assist in programming decisions.
  • how to create a program that returns a result.

Skills

Students are able to:
  • decompose a problem.
  • create a program that returns a result.
  • implement control structures.

Understanding

Students understand that:
  • removing unessential details can make a process simpler.
  • control structures can assist in programming decisions.

Vocabulary

  • parameters
  • procedures
  • modules
  • objects
  • control structures

DLCS18.HS.7

Compare and contrast fundamental data structures and their uses.

COS Examples

Examples: Strings, lists, arrays, stacks, queues.

Unpacked Content

Knowledge

Students know:
  • when to include varying types of data structures into a program to achieve a desired result.

Skills

Students are able to:
  • compare and contrast fundamental data structures and their uses.
  • properly use varying types of data structures in a program to achieve a desired result.

Understanding

Students understand that:
  • data structures organize data for ease of recall.
  • data structures differ by organization structure and purpose.

Vocabulary

  • data structures
  • arrays
  • stacks
  • queues
  • list
  • strings

DLCS18.HS.8

Demonstrate code reuse by creating programming solutions using libraries and Application Programming Interfaces.

DLCS18.HS.9

Demonstrate the ability to verify the correctness of a program.

Unpacked Content

Knowledge

Students know:
  • proper syntax and formatting for a coding language.
  • how to identify coding errors in a programming language.
a.
  • programs must be tested to verify that the desired task is executed properly.
  • testing a program requires a scenario where you can easily verify that the result of the program is correct/accurate.
b.
  • a program can contain one of the following properties, but not be an appropriate program: correctness, efficiency, scalability and readability
  • it is important to have others review your code.
  • that to be a quality program, code must be correct, efficient, scalable and readable.

Skills

Students are able to:
  • analyze code for proper syntax and formatting.
a.
  • create a test case with verifiable results.
  • execute a program with the created test case to verify program performance.
  • locate errors in programming by executing test cases.
b.
  • work with others to review their code for correctness, efficiency, scalability and readability.

Understanding

Students understand that:
  • programming languages each have their own required formatting which must be adhered to for a program to run correctly.
  • errors in programming languages prevent the program from executing its task.
  • each language has its own syntax and method for identifying potential errors.
a.
  • code can be formatted correctly and a program can still produce unintended results.
  • a test case is vital to verifying that a program is executing a task as intended.
b.
  • to be a quality program, code must be correct, efficient, scalable and readable.
  • it is important to have others proofread your code.

Vocabulary

  • compile
  • program
  • syntax

DLCS18.HS.10

Resolve or debug errors encountered during testing using iterative design process.

COS Examples

Examples: Test for infinite loops, check for bad input, check edge-cases.

DLCS18.HS.11

Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

Unpacked Content

Knowledge

Students know:
  • safe, legal, and ethical behaviors for online behavior.
a.
  • tracking methods are often used to improve digital tools and advertising.
  • hazards exist when unknown entities have access to a user's digital habits.
b.
  • methods to counteract the use of tracking.
c.
  • that often, end-user licensing agreements (EULA) are often written to protect the entity that created the digital tool, rather than the user of the digital tool.
  • that EULAs and terms of service agreements can grant access to the user's personal data.
  • that personal data can include images, posts, personal information (phone number, address, birth date, access to friends), and browsing data.
d.
  • often there exists an inverse relationship between online privacy/personal security and convenience.
e.
  • that inappropriate digital behavior can have physical, legal, and ethical consequences.
f.
  • that negative digital behaviors can have lasting consequences.
  • that some behaviors are illegal.
  • strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Skills

Students are able to:
  • interact digitally while exercising safe, legal, and ethical behaviors.
a.
  • identify tracking methods used to gather data.
  • identify hazards that exist when tracking methods are used.
b.
  • list techniques to avoid tracking.
  • apply techniques to avoid tracking.
c.
  • interpret the terms of EULAs and terms of service agreements.
  • make an educated decision to agree to EULAs and terms of service agreements.
d.
  • weigh the risks of using a digital tool to one's personal security.
  • identify potential risks to using various digital tools.
  • evaluate a digital tool's security.
e.
  • identify inappropriate digital behaviors.
  • identify consequences of inappropriate digital behaviors.
f.
  • identify negative digital behaviors.
  • share strategies to to lessen the impact of negative digital behaviors.

Understanding

Students understand that:
  • because the Internet can be such a persisting environment, it is vital to interact with safe, legal, and ethical behaviors.
a.
  • entities use tracking methods to make products more appealing to their users.
  • hazards exists when tracking data can be tied to individual users.
b.
  • privacy can be violated when tracking is used.
  • techniques exist to mitigate the effects of tracking methods.
c.
  • nothing is free—you often give up data to use digital resources for no charge.
  • it is important to educate yourself on EULAs and terms of service agreements.
d.
  • free digital tools can compromise one's privacy and security.
  • it is important to be aware of what one is trading for use of a service.
e.
  • inappropriate digital behavior can have physical, legal, and ethical consequences.
  • consequences of inappropriate digital behaviors can have life-altering consequences.
f.
  • digital identity is tied to online digital behavior.
  • negative digital behaviors can have lasting consequences.
  • some digital activity is illegal.

Vocabulary

  • ethics
  • digital world
a.
    cookies
  • virus
  • malware
  • packet sniffing
  • spyware
  • phishing
b.
  • browser history
c.
  • personal data
d.
    data mining
  • digital marketing
  • online wallets
  • personal information
  • data accessibility
  • passwords.
e.
  • cyberbullying
  • harassment
  • sexual communication
f.
  • online safety

Aligned Learning Resources

DLCS18.HS.12

Describe how sensitive data can be affected by malware and other attacks.

Unpacked Content

Knowledge

Students know:
  • how malware works.
  • how sensitive data can be affected by malware and other attacks.

Skills

Students are able to:
  • identify when a computer issue is potentially caused by malware.
  • remove malware from a computing device.
  • explain ways to protect computing devices from malware.

Understanding

Students understand that:
  • malware is harmful to computing devices and personal data.
  • software exists to remove malware from computing devices.
  • software exists to protect computing devices from a malware attack.

Vocabulary

personal data, malware, cyber attacks

DLCS18.HS.13

Compare various security measures of a computer system.

COS Examples

Examples: Usability, security, portability, and scalability.

Unpacked Content

Knowledge

Students know:
  • how to identify security measures of a computing system.
  • how to evaluate usability, security, portability, or scalability of the security measures of a computing system.

Skills

Students are able to:
  • identify security measures of a computing system.
  • evaluate usability, security, portability, or scalability of the security measures of a computing system.

Understanding

Students understand that:
  • Usability, security, portability, or scalability are important features of computer security measures.

Vocabulary

Cyber security, computer systems

DLCS18.HS.14

Compare ways to protect devices, software, and data.

Unpacked Content

Knowledge

Students know:
  • that it is important to protect data, software, and devices.
  • why it is important to protect data, software, and devices.

Skills

Students are able to:
  • compare ways to protect devices.
  • compare ways to protect software.
  • compare ways to protect data.

Understanding

Students understand that:
  • multiple methods exist to protect data, software, and devices.
  • some methods are more effective than others at meeting specific criteria.
  • it is important to evaluate option for protection of data, software, and devices.

Vocabulary

computing devices, software, and data

DLCS18.HS.15

Explain the necessity for the school’s Acceptable Use Policy.

Unpacked Content

Knowledge

Students know:
  • that accesses to resources such as devices and Internet often require parameters of appropriate use.
  • an AUP identifies the boundaries within which technology is to be used.

Skills

Students are able to:
  • articulate the boundaries of the AUP.
  • explain the necessity of any entity to establish an AUP.

Understanding

Students understand that:
  • accesses to resources such as devices and Internet often require parameters of appropriate use.
  • an AUP identifies the boundaries within which technology is to be used.

Vocabulary

  • Acceptable Use Policy (AUP)

DLCS18.HS.16

Identify laws regarding the use of technology and their consequences and implications.

COS Examples

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

Unpacked Content

Knowledge

Students know:
  • technology changes at a rapid rate.
  • all things that are possible with technology may not be ethical.
  • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.

Skills

Students are able to:
  • identify laws relative to the use of technology.
  • identify consequences of violating laws relative to the use of technology.
  • identify implications of laws relative to the use of technology.

Understanding

Students understand that:
  • technology changes at a rapid rate.
  • all things that are possible with technology may not be ethical.
  • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.

Vocabulary

  • net neutrality
  • hacking
  • intellectual property
  • piracy plagiarism
ALSDE LOGO