Topics that could be addressed include, but are not limited to, free speech, communication, and automation.
Ideas:
Explore Google Trends
Play Would You Rather to discuss these topics.
7-8.IC.2 Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
The focus is on the potential consequences of laws related to computing technologies.
Ideas:
Discuss student's use of technology between personal vs school use and explore the privacy policies and laws around privacy
At this level, students may require teacher support to discuss the possible ethical implications of computing technologies.
Ideas:
Define ethics as a group and explore topics around cyberbullying.
Use resources from StopBullying.gov
Explore Sphero Cybersecurity Lessons
The focus is on exploring the impacts of data collection, including biases in data collection, and its use by different stakeholders for a range of purposes.
Ideas:
Define personal vs private data and explore what rights we have when we visit free and paid sites online
Explore how technology has impacted our world with this infographic activity.
The focus is on understanding different factors that introduce bias into an AI system and how those biases affect people.
Ideas:
Explore bias online in different technologies
Explore resources at: https://algorithmliteracy.org/
The focus is on testing and discussing the usability and accessibility of various technology tools (e.g., apps, games, and devices) with teacher guidance.
Ideas:
Play the AI Telephone game
At this level, the focus is on building awareness of the many different computer science-related careers.
Ideas:
The focus is on understanding that models or simulations are limited by the data that they use, rather than understanding specifically how they use that data.
Ideas:
Any data collection activities
The emphasis is on designing and following collection protocols. Data sources include, but are not limited to sensors, surveys, and polls.
Ideas:
Track data via a Google form and create a spreadsheet from the data
Use surveys to collect data and then graph that data
Refining includes, but is not limited to, identifying relevant subsets of a data set, deleting unneeded data, and sorting and organizing data to highlight trends.
Ideas:
Explore and analyze data to find patterns or trends
The focus is on identifying where there is potential to use a function or procedure to create a reusable computation.
Ideas:
The focus is on identifying similar expressions or sequences in code and abstracting them into functions that generalize over the similarities.
Ideas:
Use an online coding program to create their own calculator to solve computations
Algorithms can be represented in a range of formats, including flowcharts, pseudocode, or written steps. Planning the output of a program, such as with a storyboard or wireframe, is not sufficient on its own.
Ideas:
Try these different activities related to sports, dance, and computer science
The focus is on understanding that variables can be used to track the value of a concept in a program as it changes over time.
Ideas:
Play these simple sequencing games
Explore Pixar Shorts to learn algorithms, loops, and more
The focus is on having students combine control structures, such as conditionals and loops, in such a way that they work together to achieve an outcome that could not be achieved using only one of them.
Ideas:
Have students create their own math game
Programs can be debugged in numerous ways, including tracing and trying varying inputs. Perseverance is important in finding errors.
Ideas:
Explore patterns in math problems to find mistakes in calculations.
At this level, the emphasis is on using the iterative design process to create a solution or prototype with the end user in mind and to document the steps taken by the student to gather and incorporate information about the user into the computational artifact.
Ideas:
Create an app on a program like MAD-Learn that will solve math equations
The emphasis is on designing (but not necessarily creating) a user interface. Designs could include things like written descriptions, drawings, and/or 3D prototypes.
Ideas:
The focus is on identifying the source of a problem by using a structured process such as a checklist or flowchart to systematically try solutions that may fix the problem.
Ideas:
The focus is on understanding how protocols enable communication and what additional data is necessary for transmission. Knowledge of the details of how specific protocols work is not expected.
The focus is on explaining where the data associated with different apps, devices, and embedded systems is stored, how the data is synchronized, and how to connect to it.
The focus is on describing that data must be stored on a physical device. Access to remotely stored data is restricted by the networks, and to access non-local data a connection to the network is required.
The emphasis is on identifying personal information and devices that an individual may have access to and that adversaries may want to obtain or compromise. At this stage, students should focus on specific data and devices that they have access to.
The emphasis is on recommending different types of security measures including physical, digital, and behavioral, for a given situation.
The focus is on thinking about how a specific safeguard impacts the confidentiality, integrity, and access of information. Additionally, there should be a focus on discussing whether strengthening one specific safeguard adversely affects another.
Ideas:
The focus is on recognizing that cryptography provides a level of security for data, and some types of encryption are weaker than others.
The emphasis is on explaining appropriate actions to prevent and address common security issues for common situations.
Ideas:
The emphasis is on continuing to improve keyboarding skills, with a focus on increasing speed as well as accuracy
Students connect with others (students, teachers, families, the community, and/or experts) to further their learning for a specific purpose, give and receive feedback, and created a shared product.
Ideas:
Mastery of this standard implies an understanding of how different search tools work, why different search tools provide different results, and how and why some websites rise to the top of a search.
Teachers should designate a school-approved location for students to publish artifacts for an audience to view. Advanced digital tools may refer to the tool itself (i.e. the tool is more advanced) or to utilization of more advanced features on a tool.
New technologies could include different tools for collaboration, creation, etc. that the student has not used before.
A focus should be on learning about privacy settings on social media accounts, exploring the concept of a positive online presence/identity, and identifying behaviors and information that could potentially affect them now and in the future.
Ideas:
Students are able to strategize ways to keep online spaces safe. Identify types of negative online behaviors including cyberbullying, harassment, trolling/flaming, excluding, outing, dissing, masquerading, and impersonation.