Standards - Digital Literacy & Computer Science

DLCS18.6.13

Define personal privacy, digital footprint, and open communication.

Unpacked Content

Knowledge

Students know:
  • that personal information can be divided into the three categories of personal privacy, digital footprint, open communication.

Skills

Students are able to:
  • define personal privacy.
  • define digital footprint.
  • define open communication.

Understanding

Students understand that:
  • information is either, personal, part of your digital footprint, or available as open communication.

Vocabulary

  • personal privacy
  • digital footprint
  • open communication

DLCS18.6.14

Discuss digital globalization and Internet censorship.

COS Examples

Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content.

Unpacked Content

Knowledge

Students know:
  • most information posted on the internet can be viewed by most of the world.
  • some countries and companies limit access to information.

Skills

Students are able to:
  • identify positives and negatives of digital globalization.
  • identify positives and negatives of internet censorship.

Understanding

Students understand that:
  • most information posted on the internet can be viewed by most of the world.
  • some countries and companies limit access to information.

Vocabulary

  • digital globalization
  • internet censorship

DLCS18.6.15

Identify emerging technologies in computing.

DLCS18.6.16

Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems.

Unpacked Content

Knowledge

Students know:
  • how to use a platform to share and inform others of a variety of backgrounds about issues or problems important to them.

Skills

Students are able to:
  • publish and communicate as creators of content and information, instead of only consumers of the same.

Understanding

Students understand that:
  • being able to communicate effectively and disseminate that information to reach a broader audience is an important part of being a global collaborator.

DLCS18.6.19

Track data change from a variety of sources.

COS Examples

Example: Use editing or versioning tools to track changes to data.

Unpacked Content

Knowledge

Students know:
  • how to use time and date stamps to track changes in data gathered over a period of time.

Skills

Students are able to:
  • assess how data can change over time.
  • identify how data may look different when gathered from various sources.

Understanding

Students understand that:
  • the source of data and time when data is gather has an effect on results.

DLCS18.6.20

Identify data transferring protocols, visualization, and the purpose of data and methods of storage.

COS Examples

Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database.

Unpacked Content

Knowledge

Students know:
  • different transferring protocols are used for specific purposes depending on the data and storage methods.

Skills

Students are able to:
  • differentiate basic data transferring protocols from another and various methods of storing data.

Understanding

Students understand that:
  • data is compressed and stored in various transferring protocols depending on the purpose.

Vocabulary

  • transfer protocols
  • visualization

DLCS18.6.21

Identify varying data structures/systems and methods of classification, including decimal and binary.

COS Examples

Examples: Difference between a bit and a byte, bit representation, pixels.

Unpacked Content

Knowledge

Students know:
  • how to recognize a binary number system including bits and bytes.

Skills

Students are able to:
  • identify how binary can be used for bit representation in pixels.

Understanding

Students understand that:
  • there are several data structures and methods for classification.

Vocabulary

  • data structures
  • decimal
  • binary

DLCS18.6.22

Summarize the purpose of the American Standard Code for Information Interchange (ASCII).

Unpacked Content

Knowledge

Students know:
  • that the American Standard Code for Information Interchange (ASCII) was created to use one harmonious languages for computers and programs to communicate.

Skills

Students are able to:
  • summarize the purpose of the American Standard Code for Information Interchange (ASCII).

Understanding

Students understand that:
  • without ASCII, there may be no way for programs or computers to communicate.

Vocabulary

  • American Standard Code for Information Interchange

DLCS18.6.24

Compare and contrast types of networks.

COS Examples

Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet.

Unpacked Content

Knowledge

Students know:
  • networks are used to join computing devices for different needs.

Skills

Students are able to:
  • identify the needs satisfied by different networks.

Understanding

Students understand that:
  • networks are designed to meet specific needs.

DLCS18.6.26

Explain why professionals may use models as logical representations of physical, mathematical, or logical systems or processes.

COS Examples

Example: Students will discuss why an engineer may build a model of a building before actually constructing the building.

Unpacked Content

Knowledge

Students know:
  • it can difficult, expensive, or impossible to create a system or process true
  • to
  • scale, therefore professionals often use models or simulations to test theories, plans, or designs.

Skills

Students are able to:
  • identify reasons a system or process cannot be easily replicated.
  • identify situations in which it is best to use a model or simulation.

Understanding

Students understand that:
  • models and/or simulations are used to save time and money during testing phases of projects.

DLCS18.6.27

Explain how simulations serve to implement models.

Unpacked Content

Knowledge

Students know:
  • that simulations and models are both representations of a system or process.
  • simulations are often digital representations whereas models are often physical representations.

Skills

Students are able to:
  • explain that simulations may be used to save time and/or money in representing a process or system.

Understanding

Students understand that:
  • typically, simulations are digital representations of a process, while models are physical representations of a process.

DLCS18.6.28

Define assistive technologies and state reasons they may be needed.

Unpacked Content

Knowledge

Students know:
  • that people have differing abilities and that technologies exists to aid users in overcoming challenges.

Skills

Students are able to:
  • define 'assistive technology'.
  • explain reasons one may use an assistive technology.

Understanding

Students understand that:
  • being different doesn't have to be a difficulty.

DLCS18.6.29

Define artificial intelligence and identify examples of artificial intelligence in the community.

COS Examples

Examples: Image recognition, voice assistants.

Unpacked Content

Knowledge

Students know:
  • that artificial intelligence is the use of computer systems to perform tasks normally requiring human intelligence and include services such as visual perception, speech recognition, decision
  • making, and translation between languages.

Skills

Students are able to:
  • identify examples of artificial intelligence.

Understanding

Students understand that:
  • while artificial intelligence is designed to aide, it also has negative side effects.

Vocabulary

  • artificial intelligence

DLCS18.6.30

Discuss and apply the components of the problem-solving process.

COS Examples

Example: Students will devise a plan to alleviate traffic congestion around the school during drop-off and pick-up.

Unpacked Content

Knowledge

Students know:
  • when solving problems, one should identify the problem, identify possible solutions, evaluate to select a best solution, implement the solution, evaluate the solution and/or seek feedback.

Skills

Students are able to:
  • identify a problem.
  • identify possible solutions.
  • evaluate to select a best solution.
  • implement a solution.
  • evaluate a solution.
  • seek feedback.
  • revise an artifact based on feedback.

Understanding

Students understand that:
  • problem-solving is a process that can take multiple iterations.

Vocabulary

  • problem-solving process

DLCS18.7.R1

Identify, demonstrate, and apply personal safe use of digital devices.

Unpacked Content

Knowledge

Students know:
  • that some data is considered personal and should be protected.

Skills

Students are able to:
  • classify data as private or public.
  • operate technology devices without sharing personal data.

Understanding

Students understand that:
  • sharing personal data in public forums, even with share settings turned off, can result in dangerous real
  • life consequences.

DLCS18.7.R2

Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Unpacked Content

Knowledge

Students know:
  • school/district rules for technology use.

Skills

Students are able to:
  • operate within the safety guidelines provided by the student's school and/or district.

Understanding

Students understand that:
  • guidelines are in place to ensure safe use of school equipment.

DLCS18.7.R3

Assess the validity and identify the purpose of digital content.

Unpacked Content

Knowledge

Students know:
  • not all information shared is valid; some information is skewed to sway readers' opinions.

Skills

Students are able to:
  • research information to confirm whether the given information is true and unbiased.

Understanding

Students understand that:
  • individuals and/or groups can manipulate information to meet an agenda.
  • it is important to verify information.

Vocabulary

  • validity

DLCS18.7.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include checking for operating system or other software updates, disable apps or extensions, or perform a virus/malware scan.

Understanding

Students understand that:
    computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.7.R5

Locate and curate information from digital sources to answer research questions.

Unpacked Content

Knowledge

Students know:
  • how to find valid sources and cite those sources to answer a given research topic.

Skills

Students are able to:
  • locate valid digital resources to answer given research questions.

Understanding

Students understand that:
  • a great deal of information is available.
  • it is important to validate the information and to cite the source of the information.

Vocabulary

  • curate

DLCS18.7.1

Create a function to simplify a task.

COS Examples

Example: Get a writing utensil, get paper, jot notes can collectively be named note taking.““

Unpacked Content

Knowledge

Students know:
  • an algorithm is the set of commands to complete a task.

Skills

Students are able to:
  • combine several algorithms or tasks as a named function.

Understanding

Students understand that:
  • it is more efficient to label an activity or program as a function than to list all of the individual steps or algorithms that make up the function or activity.

DLCS18.7.2

Create complex pseudocode using conditionals and Boolean statements.

COS Examples

Example: Automated vacuum pseudocode - drive forward until the unit encounters an obstacle; reverse 2 in.; rotate 30 degrees to the left, repeat.

DLCS18.7.3

Create algorithms that demonstrate sequencing, selection or iteration.

COS Examples

Examples: Debit card transactions are approved until the account balance is insufficient to fund the transaction = iteration, do until.

DLCS18.7.4

Design a complex algorithm that contains sequencing, selection or iteration.

COS Examples

Examples: Lunch line algorithm that contains parameters for bringing your lunch and multiple options available in the lunch line.

DLCS18.7.5

Solve a complex problem using computational thinking.

Unpacked Content

Knowledge

Students know:
  • smaller tasks are easier to solve than complex problems.
  • that trends in data can also speed up the problem-solving process.

Skills

Students are able to:
  • abstract portions of the problem and focus on smaller tasks to aid in solving a complex problem.

Understanding

Students understand that:
  • complex problems can be overwhelming.
  • by decomposing the complex problem into simpler problems, a solution is easier to reach.

Vocabulary

  • computational thinking

Aligned Learning Resources

DLCS18.7.6

Create and organize algorithms in order to automate a process efficiently.

COS Examples

Example: Set of recipes (algorithms) for preparing a complete meal.

DLCS18.7.7

Create a program that updates the value of a variable in the program.

COS Examples

Examples: Update the value of score when a coin is collected (in a flowchart, pseudocode or program).

DLCS18.7.9

Identify common methods of securing data.

COS Examples

Examples: Permissions, encryption, vault, locked closet.

Unpacked Content

Knowledge

Students know:
  • data needs to be shared but not altered.

Skills

Students are able to:
  • identify measures to secure data.

Understanding

Students understand that:
  • data may need to be protected either physically or digitally.

DLCS18.7.10

Explain social engineering, including countermeasures, and its impact on a digital society.

COS Examples

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Unpacked Content

Knowledge

Students know:
  • the importance of protecting personal data.

Skills

Students are able to:
  • identify instances of social engineering and ways to avoid becoming a victim.

Understanding

Students understand that:
  • personal data should be protected so that the information is not accessible by someone looking to exploit your information for personal gain.

Vocabulary

  • social engineering
ALSDE LOGO