Standards - Digital Literacy & Computer Science

DLCS18.7.11

Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

Unpacked Content

Knowledge

Students know:
  • safe, legal, and ethical habits to use when creating and sharing digital content and that failing to do so can have negative consequences.

Skills

Students are able to:
  • use safe, legal, and ethical habits when creating and sharing digital content.
  • identify consequences of failing to use safe, legal, and ethical habits when creating and sharing digital content.

Understanding

Students understand that:
  • consequences exist for failing to use positive, safe, legal, and ethical habits when creating and sharing digital content.

DLCS18.7.12

Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

Unpacked Content

Knowledge

Students know:
  • that data posted to the internet can be difficult to remove and can impact how others view you.

Skills

Students are able to:
  • identify ways to protect their personal digital footprint.

Understanding

Students understand that:
  • data posted online can be difficult to remove and can impact a personal digital footprint.

Vocabulary

  • data permanence
  • digital footprint

DLCS18.7.13

Compare and contrast information available locally and globally.

COS Examples

Example: Review an article published in the United States and compare to an article on the same subject published in China.

Unpacked Content

Knowledge

Students know:
  • culture, government, and media can affect how data is shared and presented.

Skills

Students are able to:
  • research a topic, finding web resources authentic to a geographic location for the purposes of comparing that data to information available locally: within our country, state, county.

Understanding

Students understand that:
  • many factors drive what information is shared by media.
  • data shared may not be unbiased, accurate, or truthful.

DLCS18.7.14

Discuss current events related to emerging technologies in computing and the effects such events have on individuals and the global society.

DLCS18.7.15

Discuss unique perspectives and needs of a global culture when developing computational artifacts, including options for accessibility for all users.

COS Examples

Example: Would students create a webpage aimed at reaching a village of users that have no way access to the Internet?

DLCS18.7.16

Construct content designed for specific audiences through an appropriate medium.

COS Examples

Examples: Design a multi-media children’s e-book with an appropriate readability level.

DLCS18.7.19

Discuss the benefits and limitations of censorship.

Unpacked Content

Knowledge

Students know:
  • institutions and businesses sometimes choose to limit data available to users.

Skills

Students are able to:
  • share benefits and limitations caused by censorship of information.

Understanding

Students understand that:
  • information is altered when data is censored.

Vocabulary

  • censorship

DLCS18.7.20

Evaluate the validity and accuracy of a data set.

Unpacked Content

Knowledge

Students know:
  • that some will use misleading data to persuade others.

Skills

Students are able to:
  • evaluate a data set to determine if information being presented is appropriate.

Understanding

Students understand that:
  • it is important to be capable of researching a claim for validity and accuracy.

Vocabulary

  • validity

DLCS18.7.21

Compare common transfer protocols.

COS Examples

Examples: FTP, HTTP

Unpacked Content

Knowledge

Students know:
  • the difference between FTP as a client
  • server model and HTTP as a transfer and exchange hypertext.

Skills

Students are able to:
  • identify the difference between various transfer protocols as well as secured and unsecured.

Understanding

Students understand that:
  • some transfer protocols are more secure than others and serve different purposes.

Vocabulary

  • transfer protocol

DLCS18.7.22

Compare data storage structures.

COS Examples

Examples: Stack, array, queue, table, database.

Unpacked Content

Knowledge

Students know:
  • different data structures store information in different ways based on the purpose for storage and recall.

Skills

Students are able to:
  • compare the best storage structure for storing and recalling data for various purposes.

Understanding

Students understand that:
  • each storage structure serves a different purpose depending on what kind of data and the intended use of the data.

Vocabulary

  • stack
  • array
  • queue
  • table
  • database

DLCS18.7.23

Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.

Unpacked Content

Knowledge

Students know:
  • that often there exists a devices that will be better for a task than another device.

Skills

Students are able to:
  • use multiple devices to research and collect data to compile a presentation.

Understanding

Students understand that:
  • in research, the tool used is less important than the information gathered.

DLCS18.7.24

Diagram a network given a specific setup or need.

COS Examples

Examples: Home network, public network, business network.

Unpacked Content

Knowledge

Students know:
  • that several components are needed to create a network.
  • how those components are linked affects the success of the network.

Skills

Students are able to:
  • identify the components needed to create a network and in what manner those items should be joined.
  • recognize that networks are simply modern
  • day circuits.

Understanding

Students understand that:
  • simple networks will require components to join devices to one another.
  • simple networks can include wiring, routers, switches, external internet source, printers, computers, gaming devices, televisions, personal AI assistants, etc.

DLCS18.7.25

List common methods of system cybersecurity.

COS Examples

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content

Knowledge

Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

Skills

Students are able to:
  • list common methods of protecting digital data online.

Understanding

Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.

Vocabulary

  • cybersecurity

DLCS18.7.26

Categorize models based on the most appropriate representation of various systems.

Unpacked Content

Knowledge

Students know:
  • models can be identified based on the purpose of their function.
  • that predictive models will forecast a possible outcome based on historical data.
  • that cluster and classification models identify similar traits in data and groups like items.
  • that decision models simulate the outcomes of decisions so that the user is aware of possible risks associated with each option.

Skills

Students are able to:
  • identify models based on the purpose of their function.
  • use predictive models to forecast a possible outcome based on historical data.
  • use cluster and classification models to identify similar traits in data and groups like items.
  • use decision models to simulate the outcomes of decisions so that the user is aware of possible risks associated with each option.

Understanding

Students understand that:
  • models should be selected based on the purpose of their function.
  • predictive models forecast a possible outcome based on historical data.
  • cluster and classification models identify similar traits in data and groups like items.
  • decision models simulate the outcomes of decisions so that the user is aware of possible risks associated with each option.

DLCS18.7.27

Identify data needed to create a model or simulation of a given event.

COS Examples

Examples: When creating a random name generator, the program needs access to a list of possible names.

DLCS18.7.28

Classify types of assistive technologies.

COS Examples

Examples: Hardware, software, stylus, sticky keys.

Unpacked Content

Knowledge

Students know:
  • assistive technologies have been created to assist in many areas of need (auditory, visual, motor, etc.
  • ).

Skills

Students are able to:
  • distinguish the needs addressed by different assistive technologies.

Understanding

Students understand that:
  • assistive technologies have been created to assist in many areas of need (auditory, visual, motor, etc.
  • ).

Vocabulary

  • assistive technology

DLCS18.7.29

Compare and contrast human intelligence and artificial intelligence.

Unpacked Content

Knowledge

Students know:
  • benefits and risks exist when human or artificial intelligence is used to complete a task.

Skills

Students are able to:
  • identify situations in which human or artificial intelligence is better suited to a task.

Understanding

Students understand that:
  • benefits and risks exist when either human or artificial intelligence is used to complete a task.

DLCS18.7.30

Apply the problem-solving process to solve real-world problems.

Unpacked Content

Knowledge

Students know:
  • the steps to the problem-solving process.

Skills

Students are able to:
  • select and dissect a problem.
  • seek solutions.
  • select a best alternative.

Understanding

Students understand that:
  • often there are multiple solutions to real
  • world problems.

Vocabulary

  • problem-solving process

DLCS18.8.R1

Identify, demonstrate, and apply personal safe use of digital devices.

Unpacked Content

Knowledge

Students know:
  • that some data is considered personal and should be protected.

Skills

Students are able to:
  • classify data as private or public.
  • operate technology devices without sharing personal data.

Understanding

Students understand that:
  • sharing personal data in public forums, even with share settings turned off, can result in dangerous real
  • life consequences.

DLCS18.8.R2

Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.

Unpacked Content

Knowledge

Students know:
  • school/district rules for technology use.

Skills

Students are able to:
  • operate within the safety guidelines provided by the student's school and/or district.

Understanding

Students understand that:
  • guidelines are in place to ensure safe use of school equipment.

DLCS18.8.R3

Assess the validity and identify the purpose of digital content.

Unpacked Content

Knowledge

Students know:
  • not all information shared is valid; some information is skewed to sway readers' opinions.

Skills

Students are able to:
  • research information to confirm whether the given information is true and unbiased.

Understanding

Students understand that:
  • individuals and/or groups can manipulate information to meet an agenda.
  • it is important to verify information.

Vocabulary

  • validity

DLCS18.8.R4

Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.

Unpacked Content

Knowledge

Students know:
  • devices can present unintended behaviors, preventing normal operations.

Skills

Students are able to:
  • complete basic troubleshooting techniques that include clear any cache or internet history, complete disk checks or disk defrag, complete a system restore or reset the device.

Understanding

Students understand that:
  • computing devices can and will fail at times.
  • it is important to save your work and know how to troubleshoot basic issues.

Vocabulary

  • troubleshooting

DLCS18.8.R5

Locate and curate information from digital sources to answer research questions.

Unpacked Content

Knowledge

Students know:
  • how to find valid sources to answer a given research topic.
  • cite sources.

Skills

Students are able to:
  • locate valid digital resources to answer given research questions.

Understanding

Students understand that:
  • a great deal of information is available.
  • it is important to validate information and to cite the source of information.

Vocabulary

  • curate

DLCS18.8.R6

Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

DLCS18.8.1

Design a function using a programming language that demonstrates abstraction.

COS Examples

Example: Create a program that utilizes functions in an effort remove repetitive sequences of steps.

Unpacked Content

Knowledge

Students know:
  • that a function can be called into a programming while abstracting out the details contained within the function.

Skills

Students are able to:
  • create a function that can be called into a programming while leaving out the details contained within the function.

Understanding

Students understand that:
  • abstraction is a way of hiding the details of a complex function and being able to quickly make use of the complexity that has been hidden abstraction by calling in the function.

Vocabulary

  • function
  • abstraction

DLCS18.8.2

Explain how abstraction is used in a given function.

COS Examples

Example: Examine a set of block-based code and explain how abstraction was used.

Unpacked Content

Knowledge

Students know:
  • abstraction is the process of removing unessential details (color, size, etc.
  • ).

Skills

Students are able to:
  • recognize when abstraction has been employed in a program or function.

Understanding

Students understand that:
  • because code can be so complex, it is often in a programmer's best interest to simplify tasks to include only essential elements.

Vocabulary

  • function
  • abstraction

DLCS18.8.3

Create an algorithm using a programming language that includes the use of sequencing, selections, or iterations.

COS Examples

Example: Use a block-based or script programming language

Step 1: Start

Step 2: Declare variables a, b and c.

Step 3: Read variables a, b and c.

Step 4: If a>b

        If a>c

            Display a is the largest number.

        Else

            Display c is the largest number.

  Else

        If b>c

            Display b is the largest number.

        Else

            Display c is the greatest number.

Step 5: Stop

DLCS18.8.4

Create a function to simplify a task.

COS Examples

Example: $3^8 = 3333333*3;$ =(Average) used in a spreadsheet to average a given list of grades.

Unpacked Content

Knowledge

Students know:
  • that a function can be used to simplify a task.

Skills

Students are able to:
  • create and use functions to simplify tasks.

Understanding

Students understand that:
  • functions are useful tools used abundantly in algorithms.

Vocabulary

  • function

DLCS18.8.5

Discuss the efficiency of an algorithm or technology used to solve complex problems.

DLCS18.8.6

Describe how algorithmic processes and automation increase efficiency.

Unpacked Content

Knowledge

Students know:
  • how algorithmic processes and automation have increased efficiency.

Skills

Students are able to:
  • explain how algorithmic processes and automation increase efficiency.

Understanding

Students understand that:
  • automation is a useful tool for increasing efficiency.
  • while many things can and have been automated, not everything can be automated using algorithmic processes.

Vocabulary

  • algorithmic process
  • automation

DLCS18.8.7

Create a program that includes selection, iteration, or abstraction, and initializes, and updates, at least two variables.

COS Examples

Examples: Make a game, interactive card, story, or adventure game.

Unpacked Content

Knowledge

Students know:
  • how to write a program that includes selection, iteration, abstraction, initialization, and updates variables.

Skills

Students are able to:
  • write a program that includes foundational programming concepts
  • selection, iteration, abstraction, initialization, and updating variables.

Understanding

Students understand that:
  • they have the ability to create and design programs they may have never considered themselves able to do so.

Vocabulary

  • selection
  • iteration
  • abstraction
  • initialize
  • variables

DLCS18.8.8

Compare and contrast common methods of securing data.

Unpacked Content

Knowledge

Students know:
  • that it is important to protect personal data and that it is also important to protect the data you may have access to when working.

Skills

Students are able to:
  • identify multiple methods for securing data and select the best method(s) for various situations.

Understanding

Students understand that:
  • data entrusted to a person needs to be protected as if it were one's personal data.
ALSDE LOGO