Topics that could be addressed include, but are not limited to, free speech, communication, and automation.
Ideas:
7-8.IC.2 Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
The focus is on the potential consequences of laws related to computing technologies.
Ideas for Grade 8:
Be Aware of What You Share - Common Sense Education Lesson
Digital Media and the Brain - Common Sense Education Lesson
At this level, students may require teacher support to discuss the possible ethical implications of computing technologies.
Ideas:
Explore how technology has impacted our world with this infographic activity.
The focus is on exploring the impacts of data collection, including biases in data collection, and its use by different stakeholders for a range of purposes.
The focus is on understanding different factors that introduce bias into an AI system and how those biases affect people.
The focus is on testing and discussing the usability and accessibility of various technology tools (e.g., apps, games, and devices) with teacher guidance.
Ideas for Grade 8:
Play the AI Telephone game
At this level, the focus is on building awareness of the many different computer science-related careers.
Ideas:
Learn about different experts who are in or promote computer science careers like Chris Bosh
The focus is on understanding that models or simulations are limited by the data that they use, rather than understanding specifically how they use that data.
Ideas:
TThe emphasis is on designing and following collection protocols. Data sources include, but are not limited to sensors, surveys, and polls.
Refining includes, but is not limited to, identifying relevant subsets of a data set, deleting unneeded data, and sorting and organizing data to highlight trends.
The focus is on identifying where there is potential to use a function or procedure to create a reusable computation.
The focus is on identifying similar expressions or sequences in code and abstracting them into functions that generalize over the similarities.
Algorithms can be represented in a range of formats, including flowcharts, pseudocode, or written steps. Planning the output of a program, such as with a storyboard or wireframe, is not sufficient on its own.
Ideas:
The focus is on understanding that variables can be used to track the value of a concept in a program as it changes over time.
Ideas:
Watch these videos to help students understand algorithms.
The focus is on having students combine control structures, such as conditionals and loops, in such a way that they work together to achieve an outcome that could not be achieved using only one of them.
Programs can be debugged in numerous ways, including tracing and trying varying inputs. Perseverance is important in finding errors.
At this level, the emphasis is on using the iterative design process to create a solution or prototype with the end user in mind and to document the steps taken by the student to gather and incorporate information about the user into the computational artifact.
Ideas:
The emphasis is on designing (but not necessarily creating) a user interface. Designs could include things like written descriptions, drawings, and/or 3D prototypes.
The focus is on identifying the source of a problem by using a structured process such as a checklist or flowchart to systematically try solutions that may fix the problem.
Ideas for Grade 7:
Explore navigation and troubleshoot technology as they use different programs
The focus is on describing that data must be stored on a physical device. Access to remotely stored data is restricted by the networks, and to access non-local data a connection to the network is required.
The focus is on understanding how protocols enable communication and what additional data is necessary for transmission. Knowledge of the details of how specific protocols work is not expected.
The focus is on explaining where the data associated with different apps, devices, and embedded systems is stored, how the data is synchronized, and how to connect to it.
The emphasis is on identifying personal information and devices that an individual may have access to and that adversaries may want to obtain or compromise. At this stage, students should focus on specific data and devices that they have access to.
Ideas:
The emphasis is on recommending different types of security measures including physical, digital, and behavioral, for a given situation.
The focus is on thinking about how a specific safeguard impacts the confidentiality, integrity, and access of information. Additionally, there should be a focus on discussing whether strengthening one specific safeguard adversely affects another.
The focus is on using ciphers to encrypt and decrypt messages as a means of safeguarding data.
The emphasis is on describing simple forms of suspicious behavior in common applications and devices, including suspicious data/links, viruses and malware.
The emphasis is on continuing to improve keyboarding skills, with a focus on increasing speed as well as accuracy
Students connect with others (students, teachers, families, the community, and/or experts) to further their learning for a specific purpose, give and receive feedback, and created a shared product.
Mastery of this standard implies an understanding of how different search tools work, why different search tools provide different results, and how and why some websites rise to the top of a search.
The focus is on using ciphers to encrypt and decrypt messages as a means of safeguarding data.
Ideas:
New technologies could include different tools for collaboration, creation, etc. that the student has not used before.
In order for students to be able to effectively manage their digital identities, it should be understood that online information doesn’t “go away,” and that information posted online can affect their real lives, even years in the future.
Ideas:
Students are able to strategize ways to keep online spaces safe. Identify types of negative online behaviors including cyberbullying, harassment, trolling/flaming, excluding, outing, dissing, masquerading, and impersonation.