Standards - Digital Literacy & Computer Science

DLCS18.K.3

Distinguish between private and public information.

COS Examples

Example: Your birth date is private; your shirt color is public.

Unpacked Content

Knowledge

Students know:
  • passwords protect private information.
  • birth date, phone number, address are private information you should not share with strangers.

Skills

Students are able to:
  • identify information that should remain private.
  • identify information that can be made public.

Understanding

Students understand that:
  • keeping certain information private keeps them safe.

Vocabulary

  • password
  • private
  • public

DLCS18.K.4

Identify age-appropriate methods for keeping personal information private.

COS Examples

Example: Keeping passwords, name, address, and phone number confidential.

Unpacked Content

Knowledge

Students know:
  • how to keep their passwords private.
  • how to keep their personal information private.

Skills

Students are able to:
  • not tell others their private information such as passwords, address, and phone number.

Understanding

Students understand that:
  • keeping certain information private keeps them safe.
  • some information about them help people find them.

Vocabulary

  • password
  • private
  • public

DLCS18.K.5

Demonstrate appropriate behaviors for working with others responsibly and kindly.

COS Examples

Examples: Face-to-face collaborative groups or interactions, online interactions, role play.

Unpacked Content

Knowledge

Students know:
  • taking turns is important to getting a task done on or off a computing device.
  • speaking/typing and behaving in a respectful way is important to getting a task done.

Skills

Students are able to:
  • take turns on and off a computing device.
  • speak/type and behave in a respectful way on and off a device.

Understanding

Students understand that:
  • taking turns is necessary for positive and productive communication on and/or off a computing device.
  • being respectful on and/or off a computing device looks the same.

Vocabulary

  • respect
  • task
  • communicate

DLCS18.K.6

Recognize ways in which computing devices make certain tasks easier.

COS Examples

Examples: Communication, doctor’s visits/medical records, maps and directions.

Unpacked Content

Knowledge

Students know:
  • computing devices can be used to simplify many tasks in life.

Skills

Students are able to:
  • identify how computing devices can make tasks such as communicating, directions, and research easier.

Understanding

Students understand that:
  • computing devices can make tasks easier.

Vocabulary

  • communicate
  • map
  • directions
  • research

DLCS18.1.4

Demonstrate age-appropriate methods for keeping personal information private.

COS Examples

Example: Keep passwords confidential, use anonymous profile picture or avatar, develop user names that are non-identifying or do not include actual name.

Unpacked Content

Knowledge

Students know:
  • that passwords protect their private information.
  • passwords should be kept private.
  • photographs and usernames can be used as identifying information.
  • photogrpahs and usernames shared online should not identify them.

Skills

Students are able to:
  • keep their passwords private.
  • choose icons and avatars instead of a photograph of them.
  • create usernames that don't identify them to the public.

Understanding

Students understand that:
  • they have personal information that identifies them and it should not be shared.
  • safety rules are important to follow when using a computer.

Vocabulary

  • password
  • public
  • private
  • username
  • icon
  • avatar

DLCS18.1.5

Differentiate between prior knowledge and ideas or thoughts gained from others.

Unpacked Content

Knowledge

Students know:
  • ideas and information that I read about or gain from others are not mine.
  • ideas and information that I gain from someone or somewhere else must be cited or given credit.

Skills

Students are able to:
  • tell and/or cite where they got an idea or information from.

Understanding

Students understand that:
  • saying other people's ideas or information is mine is stealing.
  • it is important to give credit if you use other people's ideas or information.

Vocabulary

  • cite
  • credit

DLCS18.1.6

Identify appropriate and inappropriate behaviors for communicating in a digital environment.

COS Examples

Examples: Cyberbullying, online etiquette.

Unpacked Content

Knowledge

Students know:
  • that speaking, writing, or behaving unkindly in a digital environment is bullying.
  • taking turns is polite.

Skills

Students are able to:
  • take turns.
  • speak, write, and behave respectfully toward others and their work in a digital environment.

Understanding

Students understand that:
  • kind and respectful behavior in a digital environment is very much like that out of the digital environment.

Vocabulary

  • cyberbullying

DLCS18.1.7

Recognize that a person has a digital identity.

Unpacked Content

Knowledge

Students know:
  • what they say and do on the internet or a collaborative digital environment is permanent.
  • what they say and do on the internet or a collaborative digital environment is part of their identity.

Skills

Students are able to:
  • tell that the way in which they behave, work, and play in a collaborative environment such as an online game and/or learning environment is a part of their identity.

Understanding

Students understand that:
  • their behavior, words, and actions in an online collaborative environment is a part of their identity.

Vocabulary

  • identity
  • digital
  • permanent

DLCS18.1.8

Identify ways in which computing devices have impacted people’s lives.

COS Examples

Example: Location services, instantaneous access to information.

Unpacked Content

Knowledge

Students know:
  • ways in which computing devices have made many tasks easier.

Skills

Students are able to:
  • discuss ways in which computing devices have made many tasks easier.

Understanding

Students understand that:
  • Computing devices have made many tasks easier.

Vocabulary

  • devices
  • tasks

DLCS18.2.5

Cite media and/or owners of digital content at an age-appropriate level.

COS Examples

Example: Basic website citation.

Unpacked Content

Knowledge

Students know:
  • how to copy and paste a url and/or owner of digital content.
  • that it is plagairism to use someone else's idea without giving them credit.
  • credit for using some or all of someone else's work or idea.
  • must be displayed in the same artifact in which you used it.

Skills

Students are able to:
  • display the source of gathered information within an artifact.

Understanding

Students understand that:
  • using someone else's information without giving them credit is stealing or plagiarism.

Vocabulary

  • artifact
  • plagiarism
  • credit
  • cite
  • url

DLCS18.2.6

Demonstrate appropriate behaviors for communicating in a digital environment.

COS Examples

Example: netiquette.

Unpacked Content

Knowledge

Students know:
  • how to take turns in a digital environment.
  • that respectful behavior in a digital environment means acting kindly and respectfully and respecting other's work.

Skills

Students are able to:
  • transfer their knowledge of polite behavior to the digital environment.
  • take turns, speak/type respectfully, respect others work.

Understanding

Students understand that:
  • being kind and respectful online is just as important as it is offline.
  • their online behavior is recorded.

Vocabulary

  • netiquette
  • respect

DLCS18.2.7

List positive and negative impacts of digital communication.

COS Examples

Example: Anything posted or communicated electronically may be easily reproduced and could remain a positive or negative part of your digital identity/footprint.

Unpacked Content

Knowledge

Students know:
  • everything they put in a digital environment may always accessible, even if they delete it.
  • behavior and artifacts created in a digital environment can reflect positively or negatively on the student.
  • digital communication helps you communicate and collaborate with people furthur away, faster, and easier.

Skills

Students are able to:
  • list positive impacts of digital communication.
  • list negative impacts of digital communication.

Understanding

Students understand that:
  • all things that I do in a digital environment, whether positive and/or negative, can be recorded, reproduced, and may become part of my digital identity forever.

Vocabulary

  • identity
  • positive
  • negative
  • artifact

DLCS18.2.8

Interpret ways in which computing devices have influenced people’s lives.

COS Examples

Example: Discuss tasks completed daily in which some type of device is used to make the tasks easier (calculator, microwave to quickly heat food, mobile phone for instant communication).

Unpacked Content

Knowledge

Students know:
  • digital devices have changed they way we live.

Skills

Students are able to:
  • explain how computing devices have changed the way we live.

Understanding

Students understand that:
  • computing devices have changed the way we live.

DLCS18.3.8

Describe how to use proper ergonomics when using devices.

COS Examples

Examples: Body position, lighting, positioning of equipment, taking breaks.

Unpacked Content

Knowledge

Students know:
  • the proper way to sit and use digital devices for short and long time frames.

Skills

Students are able to:
  • sit back in their chair with feet flat on the floor.
  • have the keyboard positioned directly in front of the body.
  • take short 1
  • 2 minute stretch breaks every 20
  • 30 minutes.
  • look away from the monitor and focus on something in the distance every 20
  • 30 minutes to reduce eye strain.

Understanding

Students understand that:
  • proper ergonomics is important to prevent body strain when using digital devices.

Vocabulary

  • ergonomics
  • keyboard
  • monitor
  • eye strain

DLCS18.3.9

Identify the proper use and operation of security technologies.

COS Examples

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content

Knowledge

Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.

Skills

Students are able to:
  • login to resources using passwords.
  • understand importance of not sharing login information.
  • identify examples of SPAM, pop up blocks, and virus protection software.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.

Vocabulary

  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker

DLCS18.3.10

Describe ways web advertising collects personal information.

COS Examples

Examples: Search ads, banner ads, in-game ads, email ads.

Unpacked Content

Knowledge

Students know:
  • companies use browsing habits of users to personalize advertisements.

Skills

Students are able to:
  • describe cookies which a site sends to the computer to track movement among webpages.
  • explain that items you search in a search engine may be used to personalize ads.
  • identify ads on websites.

Understanding

Students understand that:
  • companies can track browsing history, purchases, etc.
  • to create personalized ads for each user.

Vocabulary

  • web adversting
  • personal information
  • ads
  • personalized ads
  • cookies
  • browsing history

DLCS18.3.11

Identify resources in the community that offer technology access.

COS Examples

Examples: Libraries, community centers, restaurants, education programs, schools, or hardware/software donation programs.

Unpacked Content

Knowledge

Students know:
  • resources and locations are available in the community that offer free wifi connectivity and/or shared technology devices.

Skills

Students are able to:
  • idenfity resources or locations in the community that offer technology access and what type of access and resources they offer.

Understanding

Students understand that:
  • resources are available within the community to access wifi and/or use shared technology devices.

Vocabulary

  • wifi
  • shared technology

DLCS18.3.12

Identify and discuss ways that access to technology helps empower individuals and groups.

COS Examples

Examples: Gives access to information; provides the ability to communicate with others around the world; enables people to buy and sell things.

Unpacked Content

Knowledge

Students know:
  • access to technology connects individuals and groups to communicate with others with similar interest, share knowledge and resources, and connect with others to meet needs.

Skills

Students are able to:
  • explain ways having access to technology empowers individuals and groups locally and/or globally.

Understanding

Students understand that:
  • technology access enables you to connect with others you would not be able to connect without technology, work together to meet needs of individuals and/or groups, and obtain information easily or share resources.

Vocabulary

  • empower

DLCS18.4.8

Demonstrate the proper use and operation of security technologies.

COS Examples

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content

Knowledge

Students know:
  • software and other features such as pop-up blockers are installed to protect against malicious items.
  • unwanted emails or spam can contain links with viruses.
  • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.

Skills

Students are able to:
  • login to resources using private passwords.
  • understand importance of not sharing login information.
  • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
  • if an email or pop-up seems too good to be true, it probably is not true.

Vocabulary

  • security technologies
  • privacy
  • password
  • login information
  • virus protection
  • malicious
  • spam
  • spam filters
  • pop-up blocker
  • online identity theft

DLCS18.4.9

Identify laws and tools which help ensure that users of varying abilities can access electronic and information technology.

COS Examples

Examples: ADA Laws

Unpacked Content

Knowledge

Students know:
  • laws are in place to ensure access to electronic and information technology.
  • that tools are created to enable users of varying abilities to access electronic and information.

Skills

Students are able to:
  • state that laws are in place to ensure users of varying abilitiies can access electronic and information technology.
  • identify tools that assist users in accessing information and using technology.

Understanding

Students understand that:
  • everyone should have access to electronic and information technology regardless of their abilities.
  • tools are available for all users to access information and use technology.

Vocabulary

  • assistive technology
  • dictation
  • text to speech
  • speech to text
  • pen with recording feature
  • braille

DLCS18.4.10

Identify the different forms of web advertising and why websites, digital resources, and artifacts may include advertisements and collect personal information.

COS Examples

Examples: Search ads, pay-per-click ads, banner ads, targeted ads, in-game ads, email ads.

Unpacked Content

Knowledge

Students know:
  • advertisements appear on most websites and other digital resources such as email, text, etc.
  • information is collected by companies, search habits, cookies, etc.

Skills

Students are able to:
  • identify ads on a website, within a sample email, in games, and email.
  • identify ways a company or website collects personal information.

Understanding

Students understand that:
  • ads are on most websites, digital resources, and artifacts.
  • websites or companies collect information by tracking browsing history, collecting user
  • shared data, or by using cookies.

Vocabulary

  • web advertising
  • advertisements/ads
  • personal information
  • user
  • cookies

DLCS18.4.11

Discuss the digital divide as unequal access to technology based on differences such as income, education, age, or geographic location and locate resources in the community that can give people access to technology.

Unpacked Content

Knowledge

Students know:
  • everyone does not have the same level of access to technology due to a variety of possible reasons.
  • communities have free access to technology at various locations such as public libraries, schools, and businesses.

Skills

Students are able to:
  • discuss why people do not always have access to technology based on income, education, age, or geographic location.
  • discuss locations within the community that can give people access to technology.

Understanding

Students understand that:
  • everyone does not have the same level of access.
  • resources are available within the community to give people access they might not have otherwise.

Vocabulary

  • digital divide
  • unequal access
  • income
  • geographic location
  • access

DLCS18.5.9

Explain the proper use and operation of security technologies.

COS Examples

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Unpacked Content

Knowledge

Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.

Skills

Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.

Vocabulary

  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker

DLCS18.5.10

Identify appropriate and inappropriate uses of communication technology and discuss the permanence of actions in the digital world.

Unpacked Content

Knowledge

Students know:
  • the difference between appropriate and inappropriate uses of communication technology.
  • everthing shared in a digital world may be permanently stored whether in data on a website, downloaded, screen shot, etc.
  • causes and effects of inappropriate uses of communication.

Skills

Students are able to:
  • identify examples of appropriate and inappropriate uses of communciation technology.
  • discuss the permanence of actions in the digital word which may be referred to as a digital footprint.

Understanding

Students understand that:
  • there are appropriate and inappropriate uses of communication online just as there are when communicating face
  • to
  • face.
  • they should assume that nothing is private when communicated in a digital world.

Vocabulary

  • digital footprint
  • permanence
  • digital world

DLCS18.5.11

Explain that laws and tools exist to help ensure that people of varying abilities can access electronic and information technology.

COS Examples

Examples: Section 508, Telecommunication Act of 1996, Braille, closed captioning, text to speech.

Unpacked Content

Knowledge

Students know:
  • laws are in place to ensure that people of varying abilities can access electronic and information technology.
  • tools are available or are being designed to meet the needs of all users.

Skills

Students are able to:
  • explain that laws exist to ensure people of varying abilities can access electronic and information technology.
  • explain various tools such as text to speech, closed captioning, braille, apps, etc.
  • enable people of varying abilities to access electronic and information technology.

Understanding

Students understand that:
  • laws are in place to ensure electronic information access to people of varying abilities.
  • tools are available to meet the needs of people of varying abilities.

Vocabulary

  • varying abilities
  • electronic and information technology
  • text to speech
  • closed caption
  • braille

DLCS18.5.12

Explain the different forms of web advertising and why websites, digital resources, and artifacts may include advertisements that may collect personal information.

COS Examples

Examples: personalized web experiences based on tailored web searches, maintaining search history, quicker access to relevant information.

Unpacked Content

Knowledge

Students know:
  • how to spot different forms of web advertising.
  • why websites, digital resources, and artifacts may include advertisements that may collect personal information.

Skills

Students are able to:
  • identify different forms of web advertisings using samples or live examples.
  • explain how a company or website collects personal information and using the information.

Understanding

Students understand that:
  • advertisements are on most websites, digital resources, and artifacts.
  • websites or companies customize web experiences by collecting users' information or by tracking browsing history using cookies.

Vocabulary

  • web advertising
  • advertisements/ads
  • personal information
  • user
  • cookies
  • browsing history

DLCS18.5.13

Share knowledge of resources in the community that can give people access to technology.

COS Examples

Example: student created print and/or digital resource to share WiFi or other connectivity opportunities within the community.

Unpacked Content

Knowledge

Students know:
  • resources and locations that are available in the community that offer free wifi connectivity and/or acess to shared technology devices.

Skills

Students are able to:
  • share locations in the community that offer technology access and what type of access and resources they offer in a variety of communication formats.

Understanding

Students understand that:
  • resources are available within the community to access wifi and/or use shared technology devices.

Vocabulary

  • wifi
  • shared technology

DLCS18.5.14

Analyze the impact of social media on individuals, families, and society.

Unpacked Content

Knowledge

Students know:
  • that social media can impact how individuals, families, and society interact.

Skills

Students are able to:
  • analyze the social media use of individuals, families, and society and discuss possible impacts.

Understanding

Students understand that:
    individuals, families, and society communicates with social media that can have a positive or negative impact.

Vocabulary

  • analyze
  • impact
  • social media
  • society

DLCS18.5.15

Explore and predict how advances in computing technologies affect job opportunities and/or processes now and in the future.

Unpacked Content

Knowledge

Students know:
  • advances in computing technologies can affect job opportunities positively and negatively.
  • advances in computing technology have affected current processes as well as those in the future.

Skills

Students are able to:
  • identify and discuss how advances in computing technologies affect job opportunities
  • identify and discuss how advances in computing technologies affect processes now and in the future

Understanding

Students understand that:
  • with new computing advances, job opportunities can change.
  • advances in computing technologies affect processes now and in the future.

Vocabulary

  • predict
  • advances
  • computing technologies
  • processes

DLCS18.6.9

Differentiate between a secure and a non-secure website including how they affect personal data.

COS Examples

Example: HTTP vs. HTTPS.

Unpacked Content

Knowledge

Students know:
  • how to identify a website as secure or unsecure.
  • that sharing personal data can be dangerous.

Skills

Students are able to:
  • recognize that secure web address begins with "https" and that a security symbol is displayed in the address bar such as a lock, etc.

Understanding

Students understand that:
  • any information provided while navigating an unsecure website can negatively affect users.

DLCS18.6.10

Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.

Unpacked Content

Knowledge

Students know:
    that intellectual property refers to creations such as inventions, literary and artistic works, designs, symbols, names, and images.
  • that illegal use of intellectual property can cause monetary damages to the property owner as well as fines and jail time for the property thief.

Skills

Students are able to:
  • use intellectual property in a manner allowed by copyright, fair use, licensing, sharing, and attribution.

Understanding

Students understand that:
  • misuse of intellectual property is illegal and will result in negative consequences.

Vocabulary

  • intellectual property
  • attribution

DLCS18.6.11

Differentiate between appropriate and inappropriate digital content and the use of that content.

Unpacked Content

Knowledge

Students know:
  • at times they may encounter appropriate and inappropriate content.
  • what actions to take should they encounter inappropriate content.

Skills

Students are able to:
  • distinguish between appropriate and inappropriate digital content.

Understanding

Students understand that:
  • not all digital content is appropriate to access and/or use.

DLCS18.6.13

Define personal privacy, digital footprint, and open communication.

Unpacked Content

Knowledge

Students know:
  • that personal information can be divided into the three categories of personal privacy, digital footprint, open communication.

Skills

Students are able to:
  • define personal privacy.
  • define digital footprint.
  • define open communication.

Understanding

Students understand that:
  • information is either, personal, part of your digital footprint, or available as open communication.

Vocabulary

  • personal privacy
  • digital footprint
  • open communication

DLCS18.6.14

Discuss digital globalization and Internet censorship.

COS Examples

Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content.

Unpacked Content

Knowledge

Students know:
  • most information posted on the internet can be viewed by most of the world.
  • some countries and companies limit access to information.

Skills

Students are able to:
  • identify positives and negatives of digital globalization.
  • identify positives and negatives of internet censorship.

Understanding

Students understand that:
  • most information posted on the internet can be viewed by most of the world.
  • some countries and companies limit access to information.

Vocabulary

  • digital globalization
  • internet censorship
ALSDE LOGO