Standards - Digital Literacy & Computer Science

DLCS18.HS.31

Create interactive data visualizations using software tools to help others understand real-world phenomena.

Unpacked Content

Knowledge

Students know:
  • data can be communicated with visual representations.
  • tools exists to share data via interactive visualizations.
  • how to create interactive visualizations to represent real-world phenomena.

Skills

Students are able to:
  • gather data.
  • share data using an interactive visualization tool.

Understanding

Students understand that:
  • visualizations of data can be much more powerful than a database full of numbers.

DLCS18.HS.32

Use data analysis tools and techniques to identify patterns in data representing complex systems.

Unpacked Content

Knowledge

Students know:
  • how to identify patterns in data.
  • how to select and apply data analysis tools and techniques.
  • use data analysis tools and techniques to identify patterns in data representing complex systems.

Skills

Students are able to:
  • evaluate data sets.
  • select and apply data analysis tools and techniques.
  • use technology to mine data.

Understanding

Students understand that:
  • data can be important in a problem
  • solving process.
  • tools exists to aid in the processing of complex data sets.
  • it can be more efficient to allow a program to identify patterns in a complex data set.

Vocabulary

  • datamining

DLCS18.HS.33

Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, packets, or addressing, as well as the issues that impact network functionality.

COS Examples

Examples: Bandwidth, load, delay.

Unpacked Content

Knowledge

Students know:
  • how routers, switches, servers, network topology, packets, and IP addressing affect scalability and reliability of networks.
  • how to describe the issues that impact network functionality.
a.
  • that the DNS server function is to turn a user
  • friendly domain name into an IP address that machines use to identify each other on a network.
  • that the DNS server manages a database that maps domain names to IP addresses.
  • the typical format of an IP address.
  • computers communicate the IP address in binary form.
b.
  • that networking protocols are formal standards and policies that include procedures, formats and rules the define how two or more devices will communicate over a network.
  • there are several broad types of networking protocols including network communication protocols such as TCP/IP and HTTP, networking security protocols such as HTTPS and SSL, and network management protocols such as SNMP and ICMP.

Skills

Students are able to:
  • describe the relationships of routers, switches, servers, network topology, packets, and IP addressing.
  • describe scalability and reliability of networks.
  • describe issues that impact network functionality.
a.
  • explain the purpose of IP addresses.
  • identify what a typical IP address look like.
  • explain the difference between IP addresses expressed in decimal format and binary format.
  • explain how domain names are resolved to IP addresses through a DNS server.
b.
  • explain the significance of networking protocols.
  • provide examples of common networking protocols.
  • explain the uses of different networking protocols.

Understanding

Students understand that:
  • scalability and reliability of networks are dependent on relationships between routers, switches, servers, network topology, packets, and IP addressing, etc.
  • network functionality is impacted by bandwidth, load, delay, latency, firewalls, server capacity, etc.
a.
  • an Internet Protocol address is a unique identifying number for every machine on the internet.
  • the DNS server manages a massive database that maps user
  • friendly domain names to an IP address.
b.
  • networking protocols are needed to define rules for communication between network devices.
  • networking protocols include Internet protocols (IP, TCP, HTTP, FTP, SMTP, etc.), wireless network protocols (Wi-Fi, Bluetooth, LTE), and network routing protocols (OSPF, BGP, etc.).
  • networking security protocols, such as HTTPS and SSL, provide security over network communications.
  • network management protocols, such as SNMP and ICMP, provide network governance and maintenance.

Vocabulary

  • scalability
  • reliability
  • bandwidth
  • load
  • delay
  • fault tolerance
  • redundancy
  • latency
a.
  • domain name
  • Domain Name System (DNS) server
  • IP address
  • DNS name resolution
b.
  • networking protocols
  • layers
  • packets

DLCS18.HS.34

Categorize the roles of operating system software.

Unpacked Content

Knowledge

Students know:
  • the responsibilities of operating system software.
  • that operating system software provides an interface between the user and applications and I/O devices.
  • that operating system software is specific to the purpose of the software.

Skills

Students are able to:
  • explain the purpose of operating system software.
  • list the responsibilities of operating system software.
  • identify types of operating system software.

Understanding

Students understand that:
  • operating system software provides an interface between the user and hardware and programs/applications.
  • operating system software is the most fundamental of all system software programs.

Vocabulary

  • operating system software
  • interface
  • I/O (input/output)
  • memory
  • data storage

DLCS18.HS.35

Appraise the role of artificial intelligence in guiding software and physical systems.

COS Examples

Examples: predictive modeling, self-driving cars.

Unpacked Content

Knowledge

Students know:
  • artificial intelligence plays a role in all industries from healthcare to automotive and finance to military.
  • there are philosophical and ethical questions related to artificial intelligence.

Skills

Students are able to:
  • research the roles that artificial intelligence have in guiding software and physical systems.
  • describe ethical and philosophical issues of artificial intelligence roles in society.

Understanding

Students understand that:
  • there are positive and negative aspects to the science of artificial intelligence and how it is applied in industries, science, and society.
  • ethical, moral, and philosophical issues must continually be evaluated as artificial intelligence grows in application.

Vocabulary

  • artificial intelligence
  • machine learning
  • physical systems
  • guiding software

DLCS18.HS.36

Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

COS Examples

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content

Knowledge

Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.

Skills

Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.

Understanding

Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.

Vocabulary

  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography

DLCS18.HS.37

Evaluate the ability of models and simulations to test and support the refinement of hypotheses.

Unpacked Content

Knowledge

Students know:
  • how to explain the use of models and simulations to generate new knowledge and understanding related to the phenomena or target system that is being studied.
  • how to explain the ability of models and simulations to test and support the refinement of hypotheses related to phenomena under consideration.
a.
  • that modeling and simulations are way to extrapolate and interpolate unrest situation and scenarios to help formulate, test and refine hypotheses.
b.
  • how to form a hypothesis.
  • how to test a hypothesis.
  • how to create a model or simulation.
c.
  • that simulations or models can be created to test a hypothesis but not provide the information expected or intended.
  • that it is vital to verify the data being generated by a model or simulation.

Skills

Students are able to:
  • use a diagram or program to represent a model to express key properties of a phenomena or target system.
  • research existing models and simulations and how they are used to test and refine hypotheses.
  • explain how existing models and simulations are used to test and support the refinement of hypotheses.
a.
  • create a model or simulation to formulate, test, and refine a hypothesis.
  • utilize a model or simulation to formulate, test, and refine a hypothesis.
b.
  • form a model of a hypothesis.
  • test the hypothesis by collecting and analyzing data from a simulation.
c.
  • examine a model or simulation to determine the correctness of the generated data.
  • examine a flawed model or simulation and identify areas in which it is providing incorrect data.

Understanding

Students understand that:
  • a simulation is based on a model and enables observation of the system as key properties change.
  • the accuracy of models and simulations are limited by the level of detail and quality of information used and the software and hardware used.
  • models and simulations are an effective and cost efficient way to understand phenomena and test and refine hypotheses.
a.
  • models and simulations are way to extrapolate and interpolate unrest situation and scenarios to help formulate, test and refine hypotheses.
  • models and simulations can be the only cost- ot time-effective way to test a hypothesis.
b.
  • Models and simulations can save money, are safer, usually requires less time, and do not have the environmental impact that a full experiment or operational test may induce.
c.
  • while a process may operate without errors, that does not guarantee that the process is providing accurate data to meet your needs.

Vocabulary

  • model
  • simulations
  • hypotheses
  • phenomena
  • target system

DLCS18.HS.38

Systematically design and develop programs for broad audiences by incorporating feedback from users.

COS Examples

Examples: Games, utilities, mobile applications.

Unpacked Content

Knowledge

Students know:
  • it is vital to seek feedback from others on programs and products.
  • feedback can help make a program or product better.

Skills

Students are able to:
  • design and develop a program.
  • publish a program, seeking feedback.
  • make edits to a program based upon user feedback.

Understanding

Students understand that:
  • when designing a program, it is important to receive input from your target audience to ensure your product meets their expectations or need.

DLCS18.HS.39

Identify a problem that cannot be solved by either humans or machines alone and discuss a solution for it by decomposing the task into sub-problems suited for a human or machine to accomplish.

COS Examples

Examples: Forecasting weather, piloting airplanes.

Unpacked Content

Knowledge

Students know:
  • how to identify a problem.
  • how to decompose a problem.
  • how to identify possible solutions to a problem.

Skills

Students are able to:
  • identify a problem that cannot be solved by humans or machines alone.
  • discuss possible solutions using decomposition.
  • identify subproblems for either a human or machine to solve.

Understanding

Students understand that:
  • problems exist that cannot be solved by a human or machine alone.
  • identifying subproblems can make a complex problem easier to solve.
  • humans and machines can work together to solve complex problems.

DLCS18.HS.40

Use an iterative design process, including learning from mistakes, to gain a better understanding of a problem domain.

Unpacked Content

Knowledge

Students know:
  • that creating an artifact is an iterative process.
  • that feedback serves to make products better.
  • that mistakes are teaching tools that help determine how not to solve a problem.

Skills

Students are able to:
  • create and publish.
  • process constructive feedback.
  • persevere through mistakes.

Understanding

Students understand that:
  • creating an artifact is an iterative process.
  • feedback serves to make products better.
  • mistakes are teaching tools that help determine how not to solve a problem.
ALSDE LOGO