DLCS18.7.CD.C
Digital Identity
Digital Identity
Digital Identity
Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.
Impact of Computing
Compare and contrast information available locally and globally.
Example: Review an article published in the United States and compare to an article on the same subject published in China.
Discuss current events related to emerging technologies in computing and the effects such events have on individuals and the global society.
Discuss unique perspectives and needs of a global culture when developing computational artifacts, including options for accessibility for all users.
Example: Would students create a webpage aimed at reaching a village of users that have no way access to the Internet?
Global Collaborator
Creative Communications
Construct content designed for specific audiences through an appropriate medium.
Examples: Design a multi-media children’s e-book with an appropriate readability level.
Publish content to be available for external feedback.
Digital Tools
Type 35 words per minute with 95% accuracy using appropriate keyboarding techniques.
Social Interactions
Discuss the benefits and limitations of censorship.
Evaluate the validity and accuracy of a data set.
Computing Analyst
Data
Compare common transfer protocols.
Examples: FTP, HTTP
Compare data storage structures.
Examples: Stack, array, queue, table, database.
Systems
Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.
Diagram a network given a specific setup or need.
Examples: Home network, public network, business network.
List common methods of system cybersecurity.
Examples: Various password requirements, two-factor authentication, biometric, geolocation.
Modeling and Simulation
Categorize models based on the most appropriate representation of various systems.
Identify data needed to create a model or simulation of a given event.
Examples: When creating a random name generator, the program needs access to a list of possible names.
Innovative Designer
Human/Computer Partnerships
Classify types of assistive technologies.
Examples: Hardware, software, stylus, sticky keys.
Compare and contrast human intelligence and artificial intelligence.
Design Thinking
Apply the problem-solving process to solve real-world problems.
Grade 8
Recurring Standards
Safety, Privacy, and Security