Standards - Digital Literacy & Computer Science

DLCS18.7.R1

Identify, demonstrate, and apply personal safe use of digital devices.

Unpacked Content

Knowledge

Students know:
  • that some data is considered personal and should be protected.

Skills

Students are able to:
  • classify data as private or public.
  • operate technology devices without sharing personal data.

Understanding

Students understand that:
  • sharing personal data in public forums, even with share settings turned off, can result in dangerous real
  • life consequences.

DLCS18.7.R2

Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Unpacked Content

Knowledge

Students know:
  • school/district rules for technology use.

Skills

Students are able to:
  • operate within the safety guidelines provided by the student's school and/or district.

Understanding

Students understand that:
  • guidelines are in place to ensure safe use of school equipment.

DLCS18.7.R3

Assess the validity and identify the purpose of digital content.

Unpacked Content

Knowledge

Students know:
  • not all information shared is valid; some information is skewed to sway readers' opinions.

Skills

Students are able to:
  • research information to confirm whether the given information is true and unbiased.

Understanding

Students understand that:
  • individuals and/or groups can manipulate information to meet an agenda.
  • it is important to verify information.

Vocabulary

  • validity

DLCS18.7.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include checking for operating system or other software updates, disable apps or extensions, or perform a virus/malware scan.

Understanding

Students understand that:
    computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.7.R5

Locate and curate information from digital sources to answer research questions.

Unpacked Content

Knowledge

Students know:
  • how to find valid sources and cite those sources to answer a given research topic.

Skills

Students are able to:
  • locate valid digital resources to answer given research questions.

Understanding

Students understand that:
  • a great deal of information is available.
  • it is important to validate the information and to cite the source of the information.

Vocabulary

  • curate

DLCS18.7.1

Create a function to simplify a task.

COS Examples

Example: Get a writing utensil, get paper, jot notes can collectively be named note taking.““

Unpacked Content

Knowledge

Students know:
  • an algorithm is the set of commands to complete a task.

Skills

Students are able to:
  • combine several algorithms or tasks as a named function.

Understanding

Students understand that:
  • it is more efficient to label an activity or program as a function than to list all of the individual steps or algorithms that make up the function or activity.

DLCS18.7.2

Create complex pseudocode using conditionals and Boolean statements.

COS Examples

Example: Automated vacuum pseudocode - drive forward until the unit encounters an obstacle; reverse 2 in.; rotate 30 degrees to the left, repeat.

DLCS18.7.3

Create algorithms that demonstrate sequencing, selection or iteration.

COS Examples

Examples: Debit card transactions are approved until the account balance is insufficient to fund the transaction = iteration, do until.

DLCS18.7.4

Design a complex algorithm that contains sequencing, selection or iteration.

COS Examples

Examples: Lunch line algorithm that contains parameters for bringing your lunch and multiple options available in the lunch line.

DLCS18.7.5

Solve a complex problem using computational thinking.

Unpacked Content

Knowledge

Students know:
  • smaller tasks are easier to solve than complex problems.
  • that trends in data can also speed up the problem-solving process.

Skills

Students are able to:
  • abstract portions of the problem and focus on smaller tasks to aid in solving a complex problem.

Understanding

Students understand that:
  • complex problems can be overwhelming.
  • by decomposing the complex problem into simpler problems, a solution is easier to reach.

Vocabulary

  • computational thinking

Aligned Learning Resources

DLCS18.7.6

Create and organize algorithms in order to automate a process efficiently.

COS Examples

Example: Set of recipes (algorithms) for preparing a complete meal.

DLCS18.7.7

Create a program that updates the value of a variable in the program.

COS Examples

Examples: Update the value of score when a coin is collected (in a flowchart, pseudocode or program).

DLCS18.7.9

Identify common methods of securing data.

COS Examples

Examples: Permissions, encryption, vault, locked closet.

Unpacked Content

Knowledge

Students know:
  • data needs to be shared but not altered.

Skills

Students are able to:
  • identify measures to secure data.

Understanding

Students understand that:
  • data may need to be protected either physically or digitally.

DLCS18.7.10

Explain social engineering, including countermeasures, and its impact on a digital society.

COS Examples

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Unpacked Content

Knowledge

Students know:
  • the importance of protecting personal data.

Skills

Students are able to:
  • identify instances of social engineering and ways to avoid becoming a victim.

Understanding

Students understand that:
  • personal data should be protected so that the information is not accessible by someone looking to exploit your information for personal gain.

Vocabulary

  • social engineering

DLCS18.7.11

Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

Unpacked Content

Knowledge

Students know:
  • safe, legal, and ethical habits to use when creating and sharing digital content and that failing to do so can have negative consequences.

Skills

Students are able to:
  • use safe, legal, and ethical habits when creating and sharing digital content.
  • identify consequences of failing to use safe, legal, and ethical habits when creating and sharing digital content.

Understanding

Students understand that:
  • consequences exist for failing to use positive, safe, legal, and ethical habits when creating and sharing digital content.

DLCS18.7.12

Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

Unpacked Content

Knowledge

Students know:
  • that data posted to the internet can be difficult to remove and can impact how others view you.

Skills

Students are able to:
  • identify ways to protect their personal digital footprint.

Understanding

Students understand that:
  • data posted online can be difficult to remove and can impact a personal digital footprint.

Vocabulary

  • data permanence
  • digital footprint

DLCS18.7.13

Compare and contrast information available locally and globally.

COS Examples

Example: Review an article published in the United States and compare to an article on the same subject published in China.

Unpacked Content

Knowledge

Students know:
  • culture, government, and media can affect how data is shared and presented.

Skills

Students are able to:
  • research a topic, finding web resources authentic to a geographic location for the purposes of comparing that data to information available locally: within our country, state, county.

Understanding

Students understand that:
  • many factors drive what information is shared by media.
  • data shared may not be unbiased, accurate, or truthful.

DLCS18.7.14

Discuss current events related to emerging technologies in computing and the effects such events have on individuals and the global society.

DLCS18.7.15

Discuss unique perspectives and needs of a global culture when developing computational artifacts, including options for accessibility for all users.

COS Examples

Example: Would students create a webpage aimed at reaching a village of users that have no way access to the Internet?

DLCS18.7.16

Construct content designed for specific audiences through an appropriate medium.

COS Examples

Examples: Design a multi-media children’s e-book with an appropriate readability level.

DLCS18.7.19

Discuss the benefits and limitations of censorship.

Unpacked Content

Knowledge

Students know:
  • institutions and businesses sometimes choose to limit data available to users.

Skills

Students are able to:
  • share benefits and limitations caused by censorship of information.

Understanding

Students understand that:
  • information is altered when data is censored.

Vocabulary

  • censorship

DLCS18.7.20

Evaluate the validity and accuracy of a data set.

Unpacked Content

Knowledge

Students know:
  • that some will use misleading data to persuade others.

Skills

Students are able to:
  • evaluate a data set to determine if information being presented is appropriate.

Understanding

Students understand that:
  • it is important to be capable of researching a claim for validity and accuracy.

Vocabulary

  • validity

DLCS18.7.21

Compare common transfer protocols.

COS Examples

Examples: FTP, HTTP

Unpacked Content

Knowledge

Students know:
  • the difference between FTP as a client
  • server model and HTTP as a transfer and exchange hypertext.

Skills

Students are able to:
  • identify the difference between various transfer protocols as well as secured and unsecured.

Understanding

Students understand that:
  • some transfer protocols are more secure than others and serve different purposes.

Vocabulary

  • transfer protocol

DLCS18.7.22

Compare data storage structures.

COS Examples

Examples: Stack, array, queue, table, database.

Unpacked Content

Knowledge

Students know:
  • different data structures store information in different ways based on the purpose for storage and recall.

Skills

Students are able to:
  • compare the best storage structure for storing and recalling data for various purposes.

Understanding

Students understand that:
  • each storage structure serves a different purpose depending on what kind of data and the intended use of the data.

Vocabulary

  • stack
  • array
  • queue
  • table
  • database

DLCS18.7.23

Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.

Unpacked Content

Knowledge

Students know:
  • that often there exists a devices that will be better for a task than another device.

Skills

Students are able to:
  • use multiple devices to research and collect data to compile a presentation.

Understanding

Students understand that:
  • in research, the tool used is less important than the information gathered.

DLCS18.7.24

Diagram a network given a specific setup or need.

COS Examples

Examples: Home network, public network, business network.

Unpacked Content

Knowledge

Students know:
  • that several components are needed to create a network.
  • how those components are linked affects the success of the network.

Skills

Students are able to:
  • identify the components needed to create a network and in what manner those items should be joined.
  • recognize that networks are simply modern
  • day circuits.

Understanding

Students understand that:
  • simple networks will require components to join devices to one another.
  • simple networks can include wiring, routers, switches, external internet source, printers, computers, gaming devices, televisions, personal AI assistants, etc.

DLCS18.7.25

List common methods of system cybersecurity.

COS Examples

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content

Knowledge

Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

Skills

Students are able to:
  • list common methods of protecting digital data online.

Understanding

Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.

Vocabulary

  • cybersecurity

DLCS18.7.26

Categorize models based on the most appropriate representation of various systems.

Unpacked Content

Knowledge

Students know:
  • models can be identified based on the purpose of their function.
  • that predictive models will forecast a possible outcome based on historical data.
  • that cluster and classification models identify similar traits in data and groups like items.
  • that decision models simulate the outcomes of decisions so that the user is aware of possible risks associated with each option.

Skills

Students are able to:
  • identify models based on the purpose of their function.
  • use predictive models to forecast a possible outcome based on historical data.
  • use cluster and classification models to identify similar traits in data and groups like items.
  • use decision models to simulate the outcomes of decisions so that the user is aware of possible risks associated with each option.

Understanding

Students understand that:
  • models should be selected based on the purpose of their function.
  • predictive models forecast a possible outcome based on historical data.
  • cluster and classification models identify similar traits in data and groups like items.
  • decision models simulate the outcomes of decisions so that the user is aware of possible risks associated with each option.

DLCS18.7.27

Identify data needed to create a model or simulation of a given event.

COS Examples

Examples: When creating a random name generator, the program needs access to a list of possible names.

DLCS18.7.28

Classify types of assistive technologies.

COS Examples

Examples: Hardware, software, stylus, sticky keys.

Unpacked Content

Knowledge

Students know:
  • assistive technologies have been created to assist in many areas of need (auditory, visual, motor, etc.
  • ).

Skills

Students are able to:
  • distinguish the needs addressed by different assistive technologies.

Understanding

Students understand that:
  • assistive technologies have been created to assist in many areas of need (auditory, visual, motor, etc.
  • ).

Vocabulary

  • assistive technology

DLCS18.7.29

Compare and contrast human intelligence and artificial intelligence.

Unpacked Content

Knowledge

Students know:
  • benefits and risks exist when human or artificial intelligence is used to complete a task.

Skills

Students are able to:
  • identify situations in which human or artificial intelligence is better suited to a task.

Understanding

Students understand that:
  • benefits and risks exist when either human or artificial intelligence is used to complete a task.
ALSDE LOGO