The focus should be on how computing technologies both influence and are influenced by society and culture.
Ideas:
Make a connection to the early childhood pathways conversation with elementary guidance counselors
Explore the activities around the Day of AI for all sorts of CS ideas
Counter Top Garden Unit
4-6.IC.2 Explain how laws impact the use of computing technologies and digital information.
The focus is on how laws regulate the use of computing technologies and what might happen if those laws did not exist.
Ideas:
Explanations should be grade level appropriate to ensure understanding of current events and the related computing technologies.
Ideas:
The focus is on identifying different groups who might have access to data stored or posted in different places, including companies.
Ideas:
The focus is on explaining a range of ways that humans interact with AI to make decisions.
Ideas:
The focus is on identifying the needs and wants of diverse end users and purposefully considering potential perspectives of users with different backgrounds, ability levels, points of view, and abilities.
Ideas:
Explore the resources and accessibility ideas at the Nora Project
The emphasis of this standard is the opportunity to personally identify with a range of diverse people in the field of computer science.
Ideas:
The emphasis is on understanding, at a conceptual level, that models or simulations can be created to respond to deliberate changes in inputs.
Ideas:
The emphasis is on using digital tools to collect and organize multiple data points.
Ideas:
The emphasis is on identifying and organizing relevant data to emphasize particular parts of the data in support of a claim.
The focus is on identifying smaller steps that solve a larger problem, recognizing that some of those steps must be broken down further until each step is manageable.
Ideas:
The focus is on recognizing that the same general steps are often repeated while solving a problem, even though some of the details may differ.
Tasks can be unplugged or related to a computer program and reflect a task with a specific result that can be checked.
Ideas:
The focus is on identifying information that needs to be updated as a computation progresses.
Ideas:
Watch these videos to help students understand algorithms.
The focus is on having students work with each of conditionals and repetition (loops or iteration), but without having to use them in conjunction with one another.
Ideas:
Create stories based on challenge cards or random wheels
Debugging frequently involves stepping or tracing through a program as if you were the computer to reveal errors.
An iterative design process involves defining the problem or goal, developing a solution or prototype, testing the solution or prototype, and repeating the process until the problem is solved or desired result is achieved. Describing can include speaking or writing
Ideas:
The emphasis is on thinking about how the user interface could be optimized for the purpose of the computing technology and user interactions.
Ideas:
A model should only include the basic elements of a computer system, including input, output, processor, and storage.
The focus is on trying multiple strategies to troubleshoot problems, including rebooting the device, checking for power, checking network availability, closing and reopening an application, try using a different browser, and checking settings within an application.
Ideas:
The focus is on understanding that data is broken down into smaller pieces and labeled to travel through a network and reassembled.
Ideas:
The focus is on describing that data must be stored on a physical device. Access to remotely stored data is restricted by the networks, and to access non-local data a connection to the network is required.
The emphasis is on discussing different reasons that adversaries may want to obtain, compromise, or leverage different types of information. At this stage, students should be focused on general concepts.
Ideas:
Explore Sphero BOLT Cybersecurity lessons to bring into your classroom
The emphasis is on describing common safeguards such as protecting devices and accounts with strong passwords, keeping software updated, and not sending sensitive information over SMS.
Ideas:
The focus is on considering the trade-offs of data sharing in different contexts.
Ideas:
The focus is on using ciphers to encrypt and decrypt messages as a means of safeguarding data.
Ideas:
Explore resources at cyber.org to talk about encryption and decryption
The emphasis is on describing simple forms of suspicious behavior in common applications and devices, including suspicious data/links, viruses and malware.
Ideas:
The focus is on direct instruction in keyboarding. Instruction should focus on form over speed and accuracy.
Students progress from understanding that people use digital tools to communicate and collaborate to how they use the tools. Communication and collaboration should be purposeful and, when possible and appropriate, with an authentic audience.
Ideas:
Focus should be on the quality of results a search generates, and how to improve search results based on the task or purpose by defining multiple search criteria and using filters.
Ideas:
The focus is on understanding the editing process when creating digital artifacts on multiple platforms.
Many digital technologies have similar features and functionalities. The focus is on identifying the similarities between different programs or applications, such as word processing tools on different platforms.
Ideas:
In order for students to be able to effectively manage their digital identities, it should be understood that online information doesn’t “go away,” and that information posted online can affect their real lives, even years in the future.
Ideas:
The focus is on identifying and describing potentially unsafe behaviors, and actions to take if they are witnessed or experienced, including cyberbullying.
Ideas:
Play Lego Gloombusters to explore how to protect yourself from cyberbullies