The focus should be on how computing technologies both influence and are influenced by society and culture.
Ideas:
Research projects about world-altering computing technology and create a presentation about it
Play Would You Rather to discuss these topics
4-6.IC.2 Explain how laws impact the use of computing technologies and digital information.
The focus is on how laws regulate the use of computing technologies and what might happen if those laws did not exist.
Ideas:
Explanations should be grade level appropriate to ensure understanding of current events and the related computing technologies.
Ideas:
Explore current events articles and see how they are influenced by computing technologies
The focus is on identifying different groups who might have access to data stored or posted in different places, including companies.
Ideas:
Connect with students in another country and explore how you can communicate with the world using global tools and translation tools.
The focus is on identifying the needs and wants of diverse end users and purposefully considering potential perspectives of users with different backgrounds, ability levels, points of view, and abilities.
Ideas:
Read any of these books:
Margaret and the Moon
Women Who Launched the Computer Age
Hidden Figures
Ada Lovelace, Poet of Science
The emphasis of this standard is the opportunity to personally identify with a range of diverse people in the field of computer science.
Ideas:
The emphasis is on understanding, at a conceptual level, that models or simulations can be created to respond to deliberate changes in inputs.
Ideas:
The emphasis is on using digital tools to collect and organize multiple data points.
Ideas:
The emphasis is on identifying and organizing relevant data to emphasize particular parts of the data in support of a claim.
Ideas:
Discuss how pictures can tell a story or persuade people. Introduce the concept of data visualization as a way to turn numbers into pictures (graphs, charts) that can help tell a story more effectively.
The focus is on identifying smaller steps that solve a larger problem, recognizing that some of those steps must be broken down further until each step is manageable.
Ideas:
The focus is on recognizing that the same general steps are often repeated while solving a problem, even though some of the details may differ.
Ideas:
Tasks can be unplugged or related to a computer program and reflect a task with a specific result that can be checked.
Ideas:
The focus is on identifying information that needs to be updated as a computation progresses.
Ideas:
Use real-life examples to illustrate the concept of variables, such as a scoreboard in a game where the score changes based on player actions.
Allow students to run the program and then experiment with changing the variables' values to see how it affects the program's behavior and output.
Create stoires based on challenge cards or random wheels
The focus is on having students work with each of conditionals and repetition (loops or iteration), but without having to use them in conjunction with one another.
Ideas:
Debugging frequently involves stepping or tracing through a program as if you were the computer to reveal errors.
Ideas:
Use a choose your own adventure template to create a story
An iterative design process involves defining the problem or goal, developing a solution or prototype, testing the solution or prototype, and repeating the process until the problem is solved or desired result is achieved. Describing can include speaking or writing.
Ideas:
The emphasis is on thinking about how the user interface could be optimized for the purpose of the computing technology and user interactions.
Ideas:
Brainstorm and propose improvements to the technology's design that could make it more user-friendly and effective
A model should only include the basic elements of a computer system, including input, output, processor, and storage.
Ideas:
Use a story generator to explore input and output
Explore the articles on Wonderopolis that help students learn about computers.
The focus is on trying multiple strategies to troubleshoot problems, including rebooting the device, checking for power, checking network availability, closing and reopening an application, try using a different browser, and checking settings within an application.
Ideas:
Set up stations with different technology setups (or use hypothetical scenarios if limited by resources). Include a variety of issues that students might encounter, such as disconnected cables, incorrect settings, or simulated software errors. Have students discuss and troubleshoot.
The focus is on understanding that data is broken down into smaller pieces and labeled to travel through a network and reassembled.
Ideas:
Use analogies to create real-world scenarios(e.g., a network is like a system of roads connecting different cities, and data packets are like cars traveling on these roads).
Simulate the journey of "data packets" (envelopes with messages) passed as senders, routers, and receivers, illustrating how data is structured and navigated through a network
The focus is on describing that data must be stored on a physical device. Access to remotely stored data is restricted by the networks, and to access non-local data a connection to the network is required.
Ideas:
The emphasis is on discussing different reasons that adversaries may want to obtain, compromise, or leverage different types of information. At this stage, students should be focused on general concepts.
Ideas:
Explore ways to protect your data both on and offline
The emphasis is on describing common safeguards such as protecting devices and accounts with strong passwords, keeping software updated, and not sending sensitive information over SMS.
Ideas:
Print out these fun worksheets from UTSA CIAS to explore Cybersecurity
The focus is on considering the trade-offs of data sharing in different contexts.
Ideas:
Play these cybersecurity games from Infosys
Explore AI Chatbots after reading The Vanquishers
The focus is on using ciphers to encrypt and decrypt messages as a means of safeguarding data.
Ideas:
Students can write their own code with a parnter and then swap to try to decode
The emphasis is on describing simple forms of suspicious behavior in common applications and devices, including suspicious data/links, viruses and malware.
Ideas:
Students can research how to recognize 'spam' and create a warning guide
Students can discuss the impact of accidental voice ordering or calling
Discuss clicking on pop ups and evaluating emails for suspicious behaviors
The focus is on direct instruction in keyboarding. Instruction should focus on form over speed and accuracy.
Ideas:
Students progress from understanding that people use digital tools to communicate and collaborate to how they use the tools. Communication and collaboration should be purposeful and, when possible and appropriate, with an authentic audience.
Ideas:
Overcoming Social Obstacles-Thinking Through Digital Challenges
Focus should be on the quality of results a search generates, and how to improve search results based on the task or purpose by defining multiple search criteria and using filters.
Ideas:
The focus is on understanding the editing process when creating digital artifacts on multiple platforms.
Ideas:
Create an online newspaper that students have to use a variety of tools to complete
Create Book Bentos Lesson
Use Lego and your favorite digital tool to create story settings
Many digital technologies have similar features and functionalities. The focus is on identifying the similarities between different programs or applications, such as word processing tools on different platforms.
Ideas:
In order for students to be able to effectively manage their digital identities, it should be understood that online information doesn’t “go away,” and that information posted online can affect their real lives, even years in the future.
Ideas:
Watch a Tik Tok together and then see how many people have viewed the video. Discuss the implications
Online Actions Lesson
Nerdy Bird Tweets Lesson
Learning for Justice Lessons
The focus is on identifying and describing potentially unsafe behaviors, and actions to take if they are witnessed or experienced, including cyberbullying.
Ideas4:
Create morning announcement videos about internet safety
Read articles about your social media behavior like these: Social Media, Be Smart, Websites
Join the Global Write to write about the world with the world.
Share your Hero Stories
Complete lessons on Copyright