Standards - Digital Literacy & Computer Science

DLCS18.HS.5

Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using current events.

Unpacked Content

Knowledge

Students know:
  • how to design and develop computational artifacts for practical intent.
  • how to design and develop computational artifacts for personal expression.
  • how to design and develop computational artifacts to address a societal issue by using current events.

Skills

Students are able to:
  • design and develop computational artifacts using an iterative design process.
  • use current events to bring merit to computational artifacts.

Understanding

Students understand that:
  • design should be an iterative process whereby the designer seeks feedback to improve upon his/her creation.

DLCS18.HS.6

Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects, with parameters, and which return a result.

Unpacked Content

Knowledge

Students know:
  • removing unessential details can make a process simpler.
  • control structures can assist in programming decisions.
  • how to create a program that returns a result.

Skills

Students are able to:
  • decompose a problem.
  • create a program that returns a result.
  • implement control structures.

Understanding

Students understand that:
  • removing unessential details can make a process simpler.
  • control structures can assist in programming decisions.

Vocabulary

  • parameters
  • procedures
  • modules
  • objects
  • control structures

DLCS18.HS.7

Compare and contrast fundamental data structures and their uses.

COS Examples

Examples: Strings, lists, arrays, stacks, queues.

Unpacked Content

Knowledge

Students know:
  • when to include varying types of data structures into a program to achieve a desired result.

Skills

Students are able to:
  • compare and contrast fundamental data structures and their uses.
  • properly use varying types of data structures in a program to achieve a desired result.

Understanding

Students understand that:
  • data structures organize data for ease of recall.
  • data structures differ by organization structure and purpose.

Vocabulary

  • data structures
  • arrays
  • stacks
  • queues
  • list
  • strings

DLCS18.HS.8

Demonstrate code reuse by creating programming solutions using libraries and Application Programming Interfaces.

DLCS18.HS.9

Demonstrate the ability to verify the correctness of a program.

Unpacked Content

Knowledge

Students know:
  • proper syntax and formatting for a coding language.
  • how to identify coding errors in a programming language.
a.
  • programs must be tested to verify that the desired task is executed properly.
  • testing a program requires a scenario where you can easily verify that the result of the program is correct/accurate.
b.
  • a program can contain one of the following properties, but not be an appropriate program: correctness, efficiency, scalability and readability
  • it is important to have others review your code.
  • that to be a quality program, code must be correct, efficient, scalable and readable.

Skills

Students are able to:
  • analyze code for proper syntax and formatting.
a.
  • create a test case with verifiable results.
  • execute a program with the created test case to verify program performance.
  • locate errors in programming by executing test cases.
b.
  • work with others to review their code for correctness, efficiency, scalability and readability.

Understanding

Students understand that:
  • programming languages each have their own required formatting which must be adhered to for a program to run correctly.
  • errors in programming languages prevent the program from executing its task.
  • each language has its own syntax and method for identifying potential errors.
a.
  • code can be formatted correctly and a program can still produce unintended results.
  • a test case is vital to verifying that a program is executing a task as intended.
b.
  • to be a quality program, code must be correct, efficient, scalable and readable.
  • it is important to have others proofread your code.

Vocabulary

  • compile
  • program
  • syntax

DLCS18.HS.10

Resolve or debug errors encountered during testing using iterative design process.

COS Examples

Examples: Test for infinite loops, check for bad input, check edge-cases.

DLCS18.HS.11

Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

Unpacked Content

Knowledge

Students know:
  • safe, legal, and ethical behaviors for online behavior.
a.
  • tracking methods are often used to improve digital tools and advertising.
  • hazards exist when unknown entities have access to a user's digital habits.
b.
  • methods to counteract the use of tracking.
c.
  • that often, end-user licensing agreements (EULA) are often written to protect the entity that created the digital tool, rather than the user of the digital tool.
  • that EULAs and terms of service agreements can grant access to the user's personal data.
  • that personal data can include images, posts, personal information (phone number, address, birth date, access to friends), and browsing data.
d.
  • often there exists an inverse relationship between online privacy/personal security and convenience.
e.
  • that inappropriate digital behavior can have physical, legal, and ethical consequences.
f.
  • that negative digital behaviors can have lasting consequences.
  • that some behaviors are illegal.
  • strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Skills

Students are able to:
  • interact digitally while exercising safe, legal, and ethical behaviors.
a.
  • identify tracking methods used to gather data.
  • identify hazards that exist when tracking methods are used.
b.
  • list techniques to avoid tracking.
  • apply techniques to avoid tracking.
c.
  • interpret the terms of EULAs and terms of service agreements.
  • make an educated decision to agree to EULAs and terms of service agreements.
d.
  • weigh the risks of using a digital tool to one's personal security.
  • identify potential risks to using various digital tools.
  • evaluate a digital tool's security.
e.
  • identify inappropriate digital behaviors.
  • identify consequences of inappropriate digital behaviors.
f.
  • identify negative digital behaviors.
  • share strategies to to lessen the impact of negative digital behaviors.

Understanding

Students understand that:
  • because the Internet can be such a persisting environment, it is vital to interact with safe, legal, and ethical behaviors.
a.
  • entities use tracking methods to make products more appealing to their users.
  • hazards exists when tracking data can be tied to individual users.
b.
  • privacy can be violated when tracking is used.
  • techniques exist to mitigate the effects of tracking methods.
c.
  • nothing is free—you often give up data to use digital resources for no charge.
  • it is important to educate yourself on EULAs and terms of service agreements.
d.
  • free digital tools can compromise one's privacy and security.
  • it is important to be aware of what one is trading for use of a service.
e.
  • inappropriate digital behavior can have physical, legal, and ethical consequences.
  • consequences of inappropriate digital behaviors can have life-altering consequences.
f.
  • digital identity is tied to online digital behavior.
  • negative digital behaviors can have lasting consequences.
  • some digital activity is illegal.

Vocabulary

  • ethics
  • digital world
a.
    cookies
  • virus
  • malware
  • packet sniffing
  • spyware
  • phishing
b.
  • browser history
c.
  • personal data
d.
    data mining
  • digital marketing
  • online wallets
  • personal information
  • data accessibility
  • passwords.
e.
  • cyberbullying
  • harassment
  • sexual communication
f.
  • online safety

Aligned Learning Resources

DLCS18.HS.12

Describe how sensitive data can be affected by malware and other attacks.

Unpacked Content

Knowledge

Students know:
  • how malware works.
  • how sensitive data can be affected by malware and other attacks.

Skills

Students are able to:
  • identify when a computer issue is potentially caused by malware.
  • remove malware from a computing device.
  • explain ways to protect computing devices from malware.

Understanding

Students understand that:
  • malware is harmful to computing devices and personal data.
  • software exists to remove malware from computing devices.
  • software exists to protect computing devices from a malware attack.

Vocabulary

personal data, malware, cyber attacks

DLCS18.HS.13

Compare various security measures of a computer system.

COS Examples

Examples: Usability, security, portability, and scalability.

Unpacked Content

Knowledge

Students know:
  • how to identify security measures of a computing system.
  • how to evaluate usability, security, portability, or scalability of the security measures of a computing system.

Skills

Students are able to:
  • identify security measures of a computing system.
  • evaluate usability, security, portability, or scalability of the security measures of a computing system.

Understanding

Students understand that:
  • Usability, security, portability, or scalability are important features of computer security measures.

Vocabulary

Cyber security, computer systems

DLCS18.HS.14

Compare ways to protect devices, software, and data.

Unpacked Content

Knowledge

Students know:
  • that it is important to protect data, software, and devices.
  • why it is important to protect data, software, and devices.

Skills

Students are able to:
  • compare ways to protect devices.
  • compare ways to protect software.
  • compare ways to protect data.

Understanding

Students understand that:
  • multiple methods exist to protect data, software, and devices.
  • some methods are more effective than others at meeting specific criteria.
  • it is important to evaluate option for protection of data, software, and devices.

Vocabulary

computing devices, software, and data

DLCS18.HS.15

Explain the necessity for the school’s Acceptable Use Policy.

Unpacked Content

Knowledge

Students know:
  • that accesses to resources such as devices and Internet often require parameters of appropriate use.
  • an AUP identifies the boundaries within which technology is to be used.

Skills

Students are able to:
  • articulate the boundaries of the AUP.
  • explain the necessity of any entity to establish an AUP.

Understanding

Students understand that:
  • accesses to resources such as devices and Internet often require parameters of appropriate use.
  • an AUP identifies the boundaries within which technology is to be used.

Vocabulary

  • Acceptable Use Policy (AUP)

DLCS18.HS.16

Identify laws regarding the use of technology and their consequences and implications.

COS Examples

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

Unpacked Content

Knowledge

Students know:
  • technology changes at a rapid rate.
  • all things that are possible with technology may not be ethical.
  • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.

Skills

Students are able to:
  • identify laws relative to the use of technology.
  • identify consequences of violating laws relative to the use of technology.
  • identify implications of laws relative to the use of technology.

Understanding

Students understand that:
  • technology changes at a rapid rate.
  • all things that are possible with technology may not be ethical.
  • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.

Vocabulary

  • net neutrality
  • hacking
  • intellectual property
  • piracy plagiarism

DLCS18.HS.17

Discuss the ethical ramifications of malicious hacking and its impact on society.

COS Examples

Examples: Dissemination of privileged information, ransomware.

Unpacked Content

Knowledge

Students know:
  • that not all people use technology in a legal or ethical manner.
  • that software and processes are created to elicit personal data for negative purposes.
  • that the negative behaviors associated with technology have impacts on society.

Skills

Students are able to:
  • identify malicious hacking.
  • discuss ethical ramifications of malicious hacking.
  • discuss the impacts on society of malicious hacking.

Understanding

Students understand that:
  • that not all people use technology in a legal or ethical manner.
  • that software and processes are created to elicit personal data for negative purposes.
  • that the negative behaviors associated with technology have impacts on society.

Vocabulary

  • white hat hacking
  • black hat hacking
  • information
  • ransomware

DLCS18.HS.18

Explain the beneficial and harmful effects that intellectual property laws can have on innovation.

Unpacked Content

Knowledge

Students know:
  • that intellectual property laws are meant to protect the creator or artifacts.
  • that intellectual property laws allow for varying degrees of use of a work.
  • that stealing another person's intellectual property can rob that person of an opportunity to generate income from that artifact.

Skills

Students are able to:
  • identify intellectual property laws.
  • explain beneficial effects that intellectual property laws have on innovation.
  • explain harmful effects that intellectual property laws have on innovation.

Understanding

Students understand that:
  • intellectual property laws are meant to protect the creator or artifacts.
  • intellectual property laws allow for varying degrees of use of a work.
  • stealing another person's intellectual property can rob that person of an opportunity to generate income from that artifact.

Vocabulary

  • intellectual property

DLCS18.HS.19

Prove that digital identity is a reflection of persistent, publicly available artifacts.

Unpacked Content

Knowledge

Students know:
  • what data can be found about a person on the internet.
  • people can judge a person based on the Internet postings attached to his/her digital identity.
  • inappropriate postings can have lasting consequences.

Skills

Students are able to:
  • research implications of irresponsible digital postings.
  • correlate online postings to one's digital identity.
  • argue that digital identity is a reflection of online content that is tied to a person.

Understanding

Students understand that:
  • school personnel, people, and future employers may judge you based on online content before ever meeting you in person.
  • it is important to be proactive about what data is available online.

Vocabulary

  • digital identity

DLCS18.HS.20

Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Unpacked Content

Knowledge

Students know:
  • that often individuals are judged by their publicly visible online presence prior to meeting people in person.
  • that strategies exist to manage what is publicly posted online about you.

Skills

Students are able to:
  • identify both positive and negative posts online.
  • identify consequences associated with negative online posting.
  • manage their digital identity and minimize negative repercussions.

Understanding

Students understand that:
  • data posted online may not remain private.
  • all data shared online will have some impact on one's digital identity.
  • one must be mindful of the data attached to one's digital identity.

Vocabulary

  • digital identity

DLCS18.HS.21

Explain how technology facilitates the disruption of traditional institutions and services.

COS Examples

Examples: Digital currencies, ridesharing, autonomous vehicles, retail, Internet of Things.

Unpacked Content

Knowledge

Students know:
  • that is important to assess the economic impact of technology on tradition institutions and services.

Skills

Students are able to:
  • identify technology changes in everyday life that have changed how people interact with the world (example: music on CD and radio
  • > streaming music services like Spotify and XM satellite radio).

Understanding

Students understand that:
  • technology changes quickly in an attempt to improve the quality and efficiency of life but may cause some disruptions as transitions to new methods take place.

Vocabulary

  • uber
  • rideshare
  • digital currencies
  • retail
  • college
  • university

DLCS18.HS.22

Research the impact of computing technology on possible career pathways.

COS Examples

Examples: Government, business, medicine, entertainment, education, transportation.

Unpacked Content

Knowledge

Students know:
  • computing technology can impact careers both positively and negatively.

Skills

Students are able to:
  • recognize that changes in technology will affect future career opportunities (examples: taxi cabs vs. ride sharing; self-driving vehicles vs. over
  • the
  • road trucking; change in space needed at colleges as students transition to online courses).

Understanding

Students understand that:
  • being mindful of changes in technology can make one aware of potential changes in future industry.

Vocabulary

  • computing technology

DLCS18.HS.23

Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

COS Examples

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Unpacked Content

Knowledge

Students know:
  • how to discuss positive and negative effects of computing innovations in multiple contexts.
  • that changes in computing innovations can have a range of effects in many contexts.
  • how to communicate their beliefs about computing innovations and the effects caused by advances.

Skills

Students are able to:
  • recognize that innovations can have both positive and negative consequences.
  • identify positive and negative effects of innovation.
  • communicate support for or against innovation.

Understanding

Students understand that:
  • advancements can also have drawbacks.
  • we are in a state of change that will require adaptation and education to be a constant.

Vocabulary

  • innovation
  • ethics
  • social
  • economic

DLCS18.HS.24

Compare and contrast Internet publishing platforms, including suitability for media types, target audience, and feedback mechanism.

Unpacked Content

Knowledge

Students know:
  • how to evaluate Internet publishing platforms for computer, tablet, and mobile experiences.
  • how to determine suitability of Internet publishing platforms for different media types.
  • how to determine suitability of Internet publishing platforms for different target audiences.
  • how to determine suitability of Internet publishing platforms for different feedback mechanisms.
a.
  • tracking historical changes is essential for software development, particularly where a collaborative team is working with the same files.

Skills

Students are able to:
  • identify suitable Internet publishing platforms for different media types, target audiences, and feedback mechanisms.
  • explain the pros and cons of different Internet publishing platforms for various media types, target audiences, and feedback mechanisms.
a.
  • use version control capabilities within a digital tool.

Understanding

Students understand that:
  • for effective communications, different Internet publishing platforms are needed for different media types, target audience, and feedback mechanisms.
a.
  • version control capabilities allows for tracking changes in software and provides the ability to revert to a previous version.

Vocabulary

  • Internet publishing platform
  • digital publishing platform
  • e-publishing
  • media types
  • target audience
  • feedback mechanism
a.
  • version control system
  • revision control
  • source control
  • timestamp

DLCS18.HS.25

Utilize a variety of digital tools to create digital artifacts across content areas.

Unpacked Content

Knowledge

Students know:
  • how to use a variety of digital tools.
  • how to use a digital tool to create a digital artifact.
  • the appropriate use of digital tools and artifacts for specific content areas.

Skills

Students are able to:
  • use a variety of digital tools.
  • create digital artifacts using a variety of digital tools.
  • appropriately match digital artifacts and content areas for effective communication.

Understanding

Students understand that:
  • digital tools are used to create digital artifacts that can be used for effective communication of competency across content areas.

DLCS18.HS.26

Use collaborative technologies to work with others including peers, experts, or community members to examine local, national, and global issues and problems from multiple viewpoints.

Unpacked Content

Knowledge

Students know:
  • how to use collaborative technologies.
  • how to work effectively as a team member in a collaborative setting.

Skills

Students are able to:
  • use collaborative technologies.
  • work with peers, experts, or community members in a team setting using collaborative technologies.

Understanding

Students understand that:
  • collaborative technologies are helpful, and often necessary, to work effectively in teams of peers, experts, community members, etc.
  • , to examine local, national and global issues and problems from multiple viewpoints.

Vocabulary

  • collaborative technologies
  • collaboration software
  • collaboration apps

DLCS18.HS.27

Apply tools and methods for collaboration on a project to increase connectivity among people in different cultures and career fields.

COS Examples

Examples: Collaborative documents, webinars, teleconferencing, and virtual fieldtrips

Unpacked Content

Knowledge

Students know:
  • how to use collaborative tools and methods for appropriate and effective connectivity when completing a collaborative project.

Skills

Students are able to:
  • select, utilize and manage collaborative tools and methods on a project involving team members from a different culture and/or career fields.

Understanding

Students understand that:
  • collaborative tools and methods can be utilized on projects to increase connectivity among people from different cultures and career fields.
  • increasing connectivity provides for multiple viewpoints and thoroughness of the completed project.

Vocabulary

  • collaborative tools
  • collaborative methods
  • connectivity
  • asynchronous or synchronous conferencing

DLCS18.HS.28

Develop a model that reflects the methods, procedures and concepts used by computing devices in translating digital bits as real-world phenomena, such as print characters, sound, images, and video.

Unpacked Content

Knowledge

Students know:
  • computing devices use methods, procedures, and concepts to translate digital bits from an abstract form into real-world phenomena such as sound, images, etc.
  • each device has a process for translating from computational information to real-world phenomena.

Skills

Students are able to:
  • model the translation of digital information to real-world phenomena.
  • understand that this process is that way in which computing devices and humans interact.

Understanding

Students understand that:
  • for computing devices to communicate in a way in which humans understand, there is a process (methods, procedures, and concepts) used to translate computational information to real-world phenomena.

DLCS18.HS.29

Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.

Unpacked Content

Knowledge

Students know:
  • that when a file is altered in any way, changes may be seen in the file metadata.
  • compression and encryption are two methods used when sharing data.

Skills

Students are able to:
  • explain the roles of compression and encryption.
  • summarize the effects of compression and encryption on the metadata of a digital artifact.

Understanding

Students understand that:
  • any process applied to data has the potential to alter the structure of the data.
  • it is important to be aware of potential changes to data structure when electing to use a process.

Vocabulary

  • compression
  • encryption
  • metadata

DLCS18.HS.30

Evaluate the tradeoffs involved in choosing methods for the organization of data elements and the location of data storage, including the advantages and disadvantages of networked computing.

COS Examples

Examples: Client server, peer-to-peer, cloud computing.

Unpacked Content

Knowledge

Students know:
  • that many options exist for the storage and organization of data.
  • that selecting one storage option over another will have both advantages and disadvantages.
  • that it is important to understand the tradeoffs involved with selecting one method over another.

Skills

Students are able to:
  • research methods of data organization and storage.
  • examine advantages and disadvantages of networked computing.
  • evaluate the tradeoffs involved in choosing methods for the organization of data elements and the location of data storage, including the advantages and disadvantages of networked computing.

Understanding

Students understand that:
  • how and where data is stored can affect how the data is accessed and/or processed.
  • how and where data is stored can affect the safety of that data.
  • it is important to carefully weigh how and where data is stored.

Vocabulary

  • client server
  • peer-to-peer
  • cloud computing
ALSDE LOGO