Standards - Digital Literacy & Computer Science

DLCS18.K.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • to contact an adult when a computing issue arises.

Skills

Students are able to:
  • alert an adult when a computing issue arises.

Understanding

Students understand that:
  • it is best to alert an adult when a computing issue arises.

DLCS18.K.12

Use a variety of digital devices, in both independent and collaborative settings.

COS Examples

Examples: Interactive boards, tablets, laptops, other handheld devices.

Unpacked Content

Knowledge

Students know:
  • basic features of various digital devices.

Skills

Students are able to:
  • use basic features of handheld/mobile devices collaboratively.
  • use basic features of handheld/mobile devices independently.
  • use basic features of desktops and laptops collaboratively.
  • use basic features of desktops and laptops independently.

Understanding

Students understand that:
  • they can interact with apps on handheld devices via touch.
  • they can access programs and software on computing devices.
  • they can enter information in various ways.

DLCS18.1.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • how to restart a computer or device.

Skills

Students are able to:
  • restart a computer or device when a computing issue arises.

Understanding

Students understand that:
  • often, restarting a device can resolve simple computing or device issues.

Vocabulary

  • device
  • restart

DLCS18.1.17

Use digital devices with a variety of operating systems.

COS Examples

Examples: Interactive boards, tablets, laptops, other handheld devices

Unpacked Content

Knowledge

Students know:
  • different devices have different capabilities and functions.
  • basic features and how to use them on tablet/touchscreen devices.
  • basic features and how to use them on desktop and laptops.

Skills

Students are able to:
  • determine basic reasons to select which device is best to use based on what they want to do.
  • use the basic features of touchscreen devices to access and interact with programs.
  • use the basic features of desktop and laptops to interact with programs.

Understanding

Students understand that:
  • different digital devices have different capabilities.
  • devices must be selected for use based on what they want to do.
  • tablets, laptops, and desktops have various features and are useful in a variety of ways.

Vocabulary

  • devices
  • tablets
  • desktop
  • laptop

DLCS18.1.18

Label visible components of digital devices.

COS Examples

Examples: Visible input and output components such as USB, touch screen, keyboard, audio and video connectors, speakers.

Unpacked Content

Knowledge

Students know:
  • various observable parts of digital devices by name.

Skills

Students are able to:
  • identify observable parts of digtial devices orally or by labeling.

Understanding

Students understand that:
  • various parts of digital devices have a specific name.

Vocabulary

  • screen
  • keyboard
  • mouse
  • port
  • speakers

DLCS18.2.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know that:
  • software errors can cause computing issues.
  • force-quitting or restarting software can often correct computing issues.

Skills

Students are able to:
  • force quit an application using "ctrl, alt, delete" or "command, option, esc".

Understanding

Students understand that:
  • they can force an application to close if they suspect a software issue is causing computing issues.

Vocabulary

  • device
  • application
  • force-quit
  • restart

DLCS18.2.16

Compare the different operating systems used on digital devices.

Unpacked Content

Knowledge

Students know:
  • different types of devices have different operating systems.
  • features of different operating systems may vary.
  • some features of operating systems may or may not be compatible with another operating system.

Skills

Students are able to:
  • identify the operating system of the device they are using.
  • compare various operating systems.

Understanding

Students understand that:
  • they may need to choose the device they use for a project based on the operating system and device features.
  • different devices function with different operating system.

Vocabulary

  • operating system

DLCS18.2.17

Explain the purposes of visible input and output components of digital device.

COS Examples

Examples: Purpose of keyboard, mouse, ports, printers, etc.

Unpacked Content

Knowledge

Students know:
  • different computing devices have additional pieces that serve different functions.
  • functions of various input and output components.

Skills

Students are able to:
  • identify the input or output component needed for a job they are doing.

Understanding

Students understand that:
  • there are additional components that may or may not be needed to perform a specific tasks such as printer to print paper or a keyboard for entering data.

Vocabulary

  • input
  • output

DLCS18.3.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • how to identify when a problem exists.
  • strategies to resolve connectivity or computing issues.

Skills

Students are able to:
  • assess a computing issue using look and listen to locate the issue.
  • refresh the website.
  • restart the resource or device.
  • identify if the device is connected via wire or wirelessly.

Understanding

Students understand that:
  • every issue can be solved once the cause is identified.

Vocabulary

  • troubleshooting
  • connection
  • wired
  • wireless
  • restart

DLCS18.3.18

Identify a broad range of digital devices, the services they provide, and appropriate uses for them.

COS Examples

Examples: Computers, smartphones, tablets, robots, e-textiles, driving directions apps that access remote map services, digital personal assistants that access remote information services.

Unpacked Content

Knowledge

Students know:
  • that a digital device is physical equipment with a computing component.
  • there are many different digital devices and each has its own use.
  • there are appropriate and inappropriate ways to use these digital devices.
  • new types of digital devices are being developed everyday.

Skills

Students are able to:
  • identify a broad range of digital devices.
  • identify the services that digital devices provide.
  • identify the appropriate uses for the digital devices.

Understanding

Students understand that:
  • there are many types of digital devices.
  • there are digital devices that serve a variety of purposes.
  • all digital devies have an appropriate way to be used.

Vocabulary

  • digital device
  • services
  • appropriate

DLCS18.4.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • how to identify issues.
  • strategies to resolve issues.

Skills

Students are able to:
  • assess a resource using look and listen to locate the issue.
  • check for power to the device.
  • refresh the website.
  • restart the resource or device.
  • identify if the device is connected to wired or wireless connection.
  • retype username and password to confirm correct entry.

Understanding

Students understand that:
  • most issues can be solve once the problem is identified.

Vocabulary

  • troubleshooting
  • connection
  • wired
  • wireless
  • refresh
  • restart/reboot
  • username
  • password

DLCS18.4.17

Demonstrate an appropriate level of proficiency in performing tasks using a range of digital devices.

COS Examples

Examples: Collect and record data, print, use send command, connect to Internet, or search; use probes, sensors, printers, robots, or computers.

Unpacked Content

Knowledge

Students know:
  • strategies for performing tasks using a range of digital devices proficiently.

Skills

Students are able to:
  • demonstrate an appropriate level of proficiency in performing tasks using a range of digital devices.

Understanding

Students understand that:
  • there are similarities and differences in the strategies that can be used in performing tasks using a range of digital devices.

Vocabulary

  • tasks
  • digital devices

DLCS18.5.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • how to identify computing or connectivity issues.
  • strategies to resolve computing or connectivity issues.

Skills

Students are able to:
  • assess a resource using look and listen to locate the issue.
  • check for and install needed updates.
  • refresh the website.
  • restart the resource or device.
  • verify and refresh wired or wireless connection.
  • retype username and password to confirm correct entry.

Understanding

Students understand that:
  • every issue can be solve once the cause is identified.

Vocabulary

  • troubleshooting
  • connection
  • wired
  • wireless
  • refresh
  • restart/reboot
  • username
  • password

DLCS18.5.22

Identify computing services that may be initially turned on by default.

COS Examples

Examples: Geolocations, geotagging.

Unpacked Content

Knowledge

Students know:
  • computing services may be initially turned on by default.
  • how to check device settings for services that may be turned on by default.

Skills

Students are able to:
  • identify computing services that may be initially turned on by default.

Understanding

Students understand that:
  • certain computing services may be initially turned on by default.
  • to fully protect one's self, users must be aware of services used by devices.

Vocabulary

  • computing services
  • default

DLCS18.5.23

Identify the key components of a network.

COS Examples

Examples: Links, nodes, networking devices.

Unpacked Content

Knowledge

Students know:
  • key components of a network.
  • how a basic network operates.

Skills

Students are able to:
  • identify key components of a network.

Understanding

Students understand that:
  • certain components are required for a network to function.

Vocabulary

  • network
  • links
  • nodes
  • networking devices

DLCS18.5.24

Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

COS Examples

Examples: Logging in at school, logging personal devices to public networks.

Unpacked Content

Knowledge

Students know:
  • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.

Skills

Students are able to:
  • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.

Understanding

Students understand that:
  • authentication of users and devices is essential to protect permissions, privacy, and security.

Vocabulary

  • authentication
  • users
  • devices
  • access
  • permission
  • privacy
  • security

DLCS18.6.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include restarting the device, checking cords and cables, or forcing an application to close when it is not working as desired.

Understanding

Students understand that:
  • computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.6.24

Compare and contrast types of networks.

COS Examples

Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet.

Unpacked Content

Knowledge

Students know:
  • networks are used to join computing devices for different needs.

Skills

Students are able to:
  • identify the needs satisfied by different networks.

Understanding

Students understand that:
  • networks are designed to meet specific needs.

DLCS18.7.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include checking for operating system or other software updates, disable apps or extensions, or perform a virus/malware scan.

Understanding

Students understand that:
    computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.7.23

Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.

Unpacked Content

Knowledge

Students know:
  • that often there exists a devices that will be better for a task than another device.

Skills

Students are able to:
  • use multiple devices to research and collect data to compile a presentation.

Understanding

Students understand that:
  • in research, the tool used is less important than the information gathered.

DLCS18.7.24

Diagram a network given a specific setup or need.

COS Examples

Examples: Home network, public network, business network.

Unpacked Content

Knowledge

Students know:
  • that several components are needed to create a network.
  • how those components are linked affects the success of the network.

Skills

Students are able to:
  • identify the components needed to create a network and in what manner those items should be joined.
  • recognize that networks are simply modern
  • day circuits.

Understanding

Students understand that:
  • simple networks will require components to join devices to one another.
  • simple networks can include wiring, routers, switches, external internet source, printers, computers, gaming devices, televisions, personal AI assistants, etc.

DLCS18.7.25

List common methods of system cybersecurity.

COS Examples

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content

Knowledge

Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

Skills

Students are able to:
  • list common methods of protecting digital data online.

Understanding

Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.

Vocabulary

  • cybersecurity

DLCS18.8.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include clear any cache or internet history, complete disk checks or disk defrag, complete a system restore or reset the device.

Understanding

Students understand that:
  • computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.8.23

Design a digital artifact to propose a solution for a content-related problem.

COS Examples

Example: Create a presentation outlining how to create a cost-efficient method to melt snow on roads during the winter.

Unpacked Content

Knowledge

Students know:
  • that often there exists many solutions to a problem.

Skills

Students are able to:
  • design an artifact to propose a solution to a problem.

Understanding

Students understand that:
  • the presentation of an artifact can be as important as the solution.

DLCS18.8.24

Compare and contrast common methods of cybersecurity.

COS Examples

Example: Discuss how password protections and encryption are similar and different.

Unpacked Content

Knowledge

Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

Skills

Students are able to:
  • identify similarities and differences in types of cybersecurity.

Understanding

Students understand that:
  • many methods exist to protect data.

Vocabulary

  • cybersecurity

DLCS18.HS.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include clear any cache or internet history, complete disk checks or disk defrag, complete a system restore or reset the device.

Understanding

Students understand that:
  • computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.HS.33

Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, packets, or addressing, as well as the issues that impact network functionality.

COS Examples

Examples: Bandwidth, load, delay.

Unpacked Content

Knowledge

Students know:
  • how routers, switches, servers, network topology, packets, and IP addressing affect scalability and reliability of networks.
  • how to describe the issues that impact network functionality.
a.
  • that the DNS server function is to turn a user
  • friendly domain name into an IP address that machines use to identify each other on a network.
  • that the DNS server manages a database that maps domain names to IP addresses.
  • the typical format of an IP address.
  • computers communicate the IP address in binary form.
b.
  • that networking protocols are formal standards and policies that include procedures, formats and rules the define how two or more devices will communicate over a network.
  • there are several broad types of networking protocols including network communication protocols such as TCP/IP and HTTP, networking security protocols such as HTTPS and SSL, and network management protocols such as SNMP and ICMP.

Skills

Students are able to:
  • describe the relationships of routers, switches, servers, network topology, packets, and IP addressing.
  • describe scalability and reliability of networks.
  • describe issues that impact network functionality.
a.
  • explain the purpose of IP addresses.
  • identify what a typical IP address look like.
  • explain the difference between IP addresses expressed in decimal format and binary format.
  • explain how domain names are resolved to IP addresses through a DNS server.
b.
  • explain the significance of networking protocols.
  • provide examples of common networking protocols.
  • explain the uses of different networking protocols.

Understanding

Students understand that:
  • scalability and reliability of networks are dependent on relationships between routers, switches, servers, network topology, packets, and IP addressing, etc.
  • network functionality is impacted by bandwidth, load, delay, latency, firewalls, server capacity, etc.
a.
  • an Internet Protocol address is a unique identifying number for every machine on the internet.
  • the DNS server manages a massive database that maps user
  • friendly domain names to an IP address.
b.
  • networking protocols are needed to define rules for communication between network devices.
  • networking protocols include Internet protocols (IP, TCP, HTTP, FTP, SMTP, etc.), wireless network protocols (Wi-Fi, Bluetooth, LTE), and network routing protocols (OSPF, BGP, etc.).
  • networking security protocols, such as HTTPS and SSL, provide security over network communications.
  • network management protocols, such as SNMP and ICMP, provide network governance and maintenance.

Vocabulary

  • scalability
  • reliability
  • bandwidth
  • load
  • delay
  • fault tolerance
  • redundancy
  • latency
a.
  • domain name
  • Domain Name System (DNS) server
  • IP address
  • DNS name resolution
b.
  • networking protocols
  • layers
  • packets

DLCS18.HS.34

Categorize the roles of operating system software.

Unpacked Content

Knowledge

Students know:
  • the responsibilities of operating system software.
  • that operating system software provides an interface between the user and applications and I/O devices.
  • that operating system software is specific to the purpose of the software.

Skills

Students are able to:
  • explain the purpose of operating system software.
  • list the responsibilities of operating system software.
  • identify types of operating system software.

Understanding

Students understand that:
  • operating system software provides an interface between the user and hardware and programs/applications.
  • operating system software is the most fundamental of all system software programs.

Vocabulary

  • operating system software
  • interface
  • I/O (input/output)
  • memory
  • data storage

DLCS18.HS.35

Appraise the role of artificial intelligence in guiding software and physical systems.

COS Examples

Examples: predictive modeling, self-driving cars.

Unpacked Content

Knowledge

Students know:
  • artificial intelligence plays a role in all industries from healthcare to automotive and finance to military.
  • there are philosophical and ethical questions related to artificial intelligence.

Skills

Students are able to:
  • research the roles that artificial intelligence have in guiding software and physical systems.
  • describe ethical and philosophical issues of artificial intelligence roles in society.

Understanding

Students understand that:
  • there are positive and negative aspects to the science of artificial intelligence and how it is applied in industries, science, and society.
  • ethical, moral, and philosophical issues must continually be evaluated as artificial intelligence grows in application.

Vocabulary

  • artificial intelligence
  • machine learning
  • physical systems
  • guiding software

DLCS18.HS.36

Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

COS Examples

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content

Knowledge

Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.

Skills

Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.

Understanding

Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.

Vocabulary

  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography
ALSDE LOGO