Standards - Digital Literacy & Computer Science

DLCS18.K.R1

Identify, demonstrate, and apply personal safe use of digital devices.

Unpacked Content

Knowledge

Students know:
  • how to identify responsible uses of devices.
  • how to identify responsible uses of software.
  • how to remember internet safety rules.

Skills

Students are able to:
  • identify responsible uses of devices: keeping them clean, correct methods for use.
  • identify responsible uses of software.
  • remember internet safety rules.

Understanding

Students understand that:
  • they are responsible for using devices carefully to ensure they work and do not get broken.
  • there are correct ways to use software.
  • it is important to follow all rules when working on a computer.
  • they should only work on a computer when an adult is helping them.

Vocabulary

  • information
  • devices
  • software

DLCS18.K.3

Distinguish between private and public information.

COS Examples

Example: Your birth date is private; your shirt color is public.

Unpacked Content

Knowledge

Students know:
  • passwords protect private information.
  • birth date, phone number, address are private information you should not share with strangers.

Skills

Students are able to:
  • identify information that should remain private.
  • identify information that can be made public.

Understanding

Students understand that:
  • keeping certain information private keeps them safe.

Vocabulary

  • password
  • private
  • public

DLCS18.K.4

Identify age-appropriate methods for keeping personal information private.

COS Examples

Example: Keeping passwords, name, address, and phone number confidential.

Unpacked Content

Knowledge

Students know:
  • how to keep their passwords private.
  • how to keep their personal information private.

Skills

Students are able to:
  • not tell others their private information such as passwords, address, and phone number.

Understanding

Students understand that:
  • keeping certain information private keeps them safe.
  • some information about them help people find them.

Vocabulary

  • password
  • private
  • public

DLCS18.1.R1

Identify, demonstrate, and apply personal safe use of digital devices.

Unpacked Content

Knowledge

Students know:
  • how to use devices responsibly.
  • how to use software responsibly.
  • how to explain internet safety rules.

Skills

Students are able to:
  • demonstrate responsible uses of devices such as keeping them clean, correct methods for use guided by an adult.
  • demonstrate responsible uses of software guided by an adult.
  • explain why safety is important when using computing devices and the internet.

Understanding

Students understand that:
  • they must use and care for equipment carefully.
  • they should use software that an adult has approved.
  • rules are important to follow when using a computer for their safety.
  • Vocabulary

    • personal information

    DLCS18.1.4

    Demonstrate age-appropriate methods for keeping personal information private.

    COS Examples

    Example: Keep passwords confidential, use anonymous profile picture or avatar, develop user names that are non-identifying or do not include actual name.

    Unpacked Content

    Knowledge

    Students know:
    • that passwords protect their private information.
    • passwords should be kept private.
    • photographs and usernames can be used as identifying information.
    • photogrpahs and usernames shared online should not identify them.

    Skills

    Students are able to:
    • keep their passwords private.
    • choose icons and avatars instead of a photograph of them.
    • create usernames that don't identify them to the public.

    Understanding

    Students understand that:
    • they have personal information that identifies them and it should not be shared.
    • safety rules are important to follow when using a computer.

    Vocabulary

    • password
    • public
    • private
    • username
    • icon
    • avatar

    DLCS18.2.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • use devices responsibly.
    • use software responsibly.
    • explain internet safety rules.

    Skills

    Students are able to:
    • demonstrate responsible uses of devices, on their own such as keeping them clean, correct methods for use.
    • demonstrate responsible uses of software on their own.
    • explain why safety is important when using computing devices and the internet.

    Understanding

    Students understand that:
    • they have a responsibity to use devices correctly and care for them.
    • they should only use software that an adult has approved.
    • computing devices can be very helpful but it is important to follow safety rules.

    DLCS18.3.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • strategies to be safe while using digital devices which include protecting passwords, using usernames and avatars that do not identify the student, and telling an adult if they encounter unsafe or inappropriate content.

    Skills

    Students are able to:
    • create and use passwords which are only shared with their parents.
    • log off of digital device when no longer using it.
    • explain why you should not share personal information with others online.

    Understanding

    Students understand that:
    • passwords are important to have and not share.
    • logging out of resources and devices protect your accounts and information.
    • you should never share personal information with others online.

    Vocabulary

    • personal safety
    • digital device
    • digital citizenship
    • personal information

    DLCS18.3.8

    Describe how to use proper ergonomics when using devices.

    COS Examples

    Examples: Body position, lighting, positioning of equipment, taking breaks.

    Unpacked Content

    Knowledge

    Students know:
    • the proper way to sit and use digital devices for short and long time frames.

    Skills

    Students are able to:
    • sit back in their chair with feet flat on the floor.
    • have the keyboard positioned directly in front of the body.
    • take short 1
    • 2 minute stretch breaks every 20
    • 30 minutes.
    • look away from the monitor and focus on something in the distance every 20
    • 30 minutes to reduce eye strain.

    Understanding

    Students understand that:
    • proper ergonomics is important to prevent body strain when using digital devices.

    Vocabulary

    • ergonomics
    • keyboard
    • monitor
    • eye strain

    DLCS18.3.9

    Identify the proper use and operation of security technologies.

    COS Examples

    Examples: Passwords, virus protection software, spam filters, pop-up blockers.

    Unpacked Content

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • login to resources using passwords.
    • understand importance of not sharing login information.
    • identify examples of SPAM, pop up blocks, and virus protection software.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    DLCS18.3.10

    Describe ways web advertising collects personal information.

    COS Examples

    Examples: Search ads, banner ads, in-game ads, email ads.

    Unpacked Content

    Knowledge

    Students know:
    • companies use browsing habits of users to personalize advertisements.

    Skills

    Students are able to:
    • describe cookies which a site sends to the computer to track movement among webpages.
    • explain that items you search in a search engine may be used to personalize ads.
    • identify ads on websites.

    Understanding

    Students understand that:
    • companies can track browsing history, purchases, etc.
    • to create personalized ads for each user.

    Vocabulary

    • web adversting
    • personal information
    • ads
    • personalized ads
    • cookies
    • browsing history

    DLCS18.4.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • strategies to be safe while using digital devices.

    Skills

    Students are able to:
    • create and use passwords which are only shared with their parents or teacher.
    • log off of digital device when no longer using it.
    • explain why you should not share personal information with others online.

    Understanding

    Students understand that:
    • passwords are important to have and not share
    • logging out of resources and devices protect your accounts and information.
    • you should never share personal information with others online.

    Vocabulary

    • personal safety
    • digital device
    • digital citizenship
    • personal information

    DLCS18.4.8

    Demonstrate the proper use and operation of security technologies.

    COS Examples

    Examples: Passwords, virus protection software, spam filters, pop-up blockers.

    Unpacked Content

    Knowledge

    Students know:
    • software and other features such as pop-up blockers are installed to protect against malicious items.
    • unwanted emails or spam can contain links with viruses.
    • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.

    Skills

    Students are able to:
    • login to resources using private passwords.
    • understand importance of not sharing login information.
    • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
    • if an email or pop-up seems too good to be true, it probably is not true.

    Vocabulary

    • security technologies
    • privacy
    • password
    • login information
    • virus protection
    • malicious
    • spam
    • spam filters
    • pop-up blocker
    • online identity theft

    DLCS18.5.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • strategies to be safe while using digital devices.

    Skills

    Students are able to:
    • create and use passwords which are only shared with their parents or teacher.
    • log off of digital device when no longer using it.
    • explain why you should not share personal information with others online.

    Understanding

    Students understand that:
    • passwords are important to have and not share.
    • logging out of resources and devices protect your accounts and information.
    • you should never share personal information with others online.

    Vocabulary

    • personal safety
    • digital device
    • digital citizenship
    • personal information

    DLCS18.5.9

    Explain the proper use and operation of security technologies.

    COS Examples

    Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

    Unpacked Content

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • explain to others how and why you should use strong passwords.
    • explain the causes and effects of someone having and using your password.
    • explain what SPAM, pop up blockers, and virus protection software can do.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    DLCS18.5.10

    Identify appropriate and inappropriate uses of communication technology and discuss the permanence of actions in the digital world.

    Unpacked Content

    Knowledge

    Students know:
    • the difference between appropriate and inappropriate uses of communication technology.
    • everthing shared in a digital world may be permanently stored whether in data on a website, downloaded, screen shot, etc.
    • causes and effects of inappropriate uses of communication.

    Skills

    Students are able to:
    • identify examples of appropriate and inappropriate uses of communciation technology.
    • discuss the permanence of actions in the digital word which may be referred to as a digital footprint.

    Understanding

    Students understand that:
    • there are appropriate and inappropriate uses of communication online just as there are when communicating face
    • to
    • face.
    • they should assume that nothing is private when communicated in a digital world.

    Vocabulary

    • digital footprint
    • permanence
    • digital world

    DLCS18.6.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • that some data is considered personal and should be protected.

    Skills

    Students are able to:
    • classify data as private or public.
    • operate technology devices without sharing personal data.

    Understanding

    Students understand that:
    • sharing personal data in public forums, even with share settings turned off, can result in dangerous real
    • life consequences.

    DLCS18.6.9

    Differentiate between a secure and a non-secure website including how they affect personal data.

    COS Examples

    Example: HTTP vs. HTTPS.

    Unpacked Content

    Knowledge

    Students know:
    • how to identify a website as secure or unsecure.
    • that sharing personal data can be dangerous.

    Skills

    Students are able to:
    • recognize that secure web address begins with "https" and that a security symbol is displayed in the address bar such as a lock, etc.

    Understanding

    Students understand that:
    • any information provided while navigating an unsecure website can negatively affect users.

    DLCS18.7.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • that some data is considered personal and should be protected.

    Skills

    Students are able to:
    • classify data as private or public.
    • operate technology devices without sharing personal data.

    Understanding

    Students understand that:
    • sharing personal data in public forums, even with share settings turned off, can result in dangerous real
    • life consequences.

    DLCS18.7.9

    Identify common methods of securing data.

    COS Examples

    Examples: Permissions, encryption, vault, locked closet.

    Unpacked Content

    Knowledge

    Students know:
    • data needs to be shared but not altered.

    Skills

    Students are able to:
    • identify measures to secure data.

    Understanding

    Students understand that:
    • data may need to be protected either physically or digitally.

    DLCS18.8.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • that some data is considered personal and should be protected.

    Skills

    Students are able to:
    • classify data as private or public.
    • operate technology devices without sharing personal data.

    Understanding

    Students understand that:
    • sharing personal data in public forums, even with share settings turned off, can result in dangerous real
    • life consequences.

    DLCS18.8.8

    Compare and contrast common methods of securing data.

    Unpacked Content

    Knowledge

    Students know:
    • that it is important to protect personal data and that it is also important to protect the data you may have access to when working.

    Skills

    Students are able to:
    • identify multiple methods for securing data and select the best method(s) for various situations.

    Understanding

    Students understand that:
    • data entrusted to a person needs to be protected as if it were one's personal data.

    DLCS18.HS.R1

    Identify, demonstrate, and apply personal safe use of digital devices.

    Unpacked Content

    Knowledge

    Students know:
    • how to safely use digital devices.
    • that failure to use digital devices safely can have an impact on access at school as well as the protection of personal data.

    Skills

    Students are able to:
    • identify personal safe use of digital devices.
    • demonstrate personal safe use of digital devices.
    • apply personal safe use of digital devices.

    Understanding

    Students understand that:
    • it is important to protect personal data when sharing information on the internet.

    DLCS18.HS.11

    Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

    Unpacked Content

    Knowledge

    Students know:
    • safe, legal, and ethical behaviors for online behavior.
    a.
    • tracking methods are often used to improve digital tools and advertising.
    • hazards exist when unknown entities have access to a user's digital habits.
    b.
    • methods to counteract the use of tracking.
    c.
    • that often, end-user licensing agreements (EULA) are often written to protect the entity that created the digital tool, rather than the user of the digital tool.
    • that EULAs and terms of service agreements can grant access to the user's personal data.
    • that personal data can include images, posts, personal information (phone number, address, birth date, access to friends), and browsing data.
    d.
    • often there exists an inverse relationship between online privacy/personal security and convenience.
    e.
    • that inappropriate digital behavior can have physical, legal, and ethical consequences.
    f.
    • that negative digital behaviors can have lasting consequences.
    • that some behaviors are illegal.
    • strategies to lessen the impact of negative digital behaviors and assess when to apply them.

    Skills

    Students are able to:
    • interact digitally while exercising safe, legal, and ethical behaviors.
    a.
    • identify tracking methods used to gather data.
    • identify hazards that exist when tracking methods are used.
    b.
    • list techniques to avoid tracking.
    • apply techniques to avoid tracking.
    c.
    • interpret the terms of EULAs and terms of service agreements.
    • make an educated decision to agree to EULAs and terms of service agreements.
    d.
    • weigh the risks of using a digital tool to one's personal security.
    • identify potential risks to using various digital tools.
    • evaluate a digital tool's security.
    e.
    • identify inappropriate digital behaviors.
    • identify consequences of inappropriate digital behaviors.
    f.
    • identify negative digital behaviors.
    • share strategies to to lessen the impact of negative digital behaviors.

    Understanding

    Students understand that:
    • because the Internet can be such a persisting environment, it is vital to interact with safe, legal, and ethical behaviors.
    a.
    • entities use tracking methods to make products more appealing to their users.
    • hazards exists when tracking data can be tied to individual users.
    b.
    • privacy can be violated when tracking is used.
    • techniques exist to mitigate the effects of tracking methods.
    c.
    • nothing is free—you often give up data to use digital resources for no charge.
    • it is important to educate yourself on EULAs and terms of service agreements.
    d.
    • free digital tools can compromise one's privacy and security.
    • it is important to be aware of what one is trading for use of a service.
    e.
    • inappropriate digital behavior can have physical, legal, and ethical consequences.
    • consequences of inappropriate digital behaviors can have life-altering consequences.
    f.
    • digital identity is tied to online digital behavior.
    • negative digital behaviors can have lasting consequences.
    • some digital activity is illegal.

    Vocabulary

    • ethics
    • digital world
    a.
      cookies
    • virus
    • malware
    • packet sniffing
    • spyware
    • phishing
    b.
    • browser history
    c.
    • personal data
    d.
      data mining
    • digital marketing
    • online wallets
    • personal information
    • data accessibility
    • passwords.
    e.
    • cyberbullying
    • harassment
    • sexual communication
    f.
    • online safety

    Aligned Learning Resources

    DLCS18.HS.12

    Describe how sensitive data can be affected by malware and other attacks.

    Unpacked Content

    Knowledge

    Students know:
    • how malware works.
    • how sensitive data can be affected by malware and other attacks.

    Skills

    Students are able to:
    • identify when a computer issue is potentially caused by malware.
    • remove malware from a computing device.
    • explain ways to protect computing devices from malware.

    Understanding

    Students understand that:
    • malware is harmful to computing devices and personal data.
    • software exists to remove malware from computing devices.
    • software exists to protect computing devices from a malware attack.

    Vocabulary

    personal data, malware, cyber attacks

    DLCS18.HS.13

    Compare various security measures of a computer system.

    COS Examples

    Examples: Usability, security, portability, and scalability.

    Unpacked Content

    Knowledge

    Students know:
    • how to identify security measures of a computing system.
    • how to evaluate usability, security, portability, or scalability of the security measures of a computing system.

    Skills

    Students are able to:
    • identify security measures of a computing system.
    • evaluate usability, security, portability, or scalability of the security measures of a computing system.

    Understanding

    Students understand that:
    • Usability, security, portability, or scalability are important features of computer security measures.

    Vocabulary

    Cyber security, computer systems

    DLCS18.HS.14

    Compare ways to protect devices, software, and data.

    Unpacked Content

    Knowledge

    Students know:
    • that it is important to protect data, software, and devices.
    • why it is important to protect data, software, and devices.

    Skills

    Students are able to:
    • compare ways to protect devices.
    • compare ways to protect software.
    • compare ways to protect data.

    Understanding

    Students understand that:
    • multiple methods exist to protect data, software, and devices.
    • some methods are more effective than others at meeting specific criteria.
    • it is important to evaluate option for protection of data, software, and devices.

    Vocabulary

    computing devices, software, and data
    ALSDE LOGO