Recommended Texts:
If The World Were 100 People by Jaqueline Mccann
Surviving Middle School: Navigating the Halls, Riding the Social Rollercoaster, and Unmasking the Real You by Luke Reynolds
Cyberbullying by Nick Hunter
The FBI and Cyber Crimes By Robert Greyson
Cyber Crimes By Gina Deangelis
Recommended Book List by Concept Area
Topics that could be addressed include, but are not limited to, free speech, communication, and automation.
Ideas:
Compare and contrast Alexa and Siri and how it has impacted society in regards to communication and information
Explore Google Trends
Have students research history of computers. What factors made computer more commonplace, what effects did that have on society/jobs?
Have students use Newsela: An Online Education Platform for Content to find information on how technologies affect people in today’s society.
7-8.IC.2 Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
The focus is on the potential consequences of laws related to computing technologies.
Ideas:
Students could research how laws protect intellectual property rights of digital materials and how those laws changed the music industry.
At this level, students may require teacher support to discuss the possible ethical implications of computing technologies.
Ideas:
NewsELA articles regarding various current events.
Lab-Grown Wooly Mammoths Students can create a slideshow, doc, speech, etc. taking on side of this topic.
Explore how technology has impacted our world with this infographic activity.
The focus is on exploring the impacts of data collection, including biases in data collection, and its use by different stakeholders for a range of purposes.
Ideas:
Students can create their own Fakebook page, making sure that the only include appropriate information that should be shared publicly
Students could describe how facial recognition surveillance video is used in a store to track customers for security or information about purchase habits. Students might discuss who owns that data and what it is acceptable to do with the data.
The focus is on understanding different factors that introduce bias into an AI system and how those biases affect people.
Ideas:
Watch AI, Ain't I A Woman? to learn about bias
The focus is on testing and discussing the usability and accessibility of various technology tools (e.g., apps, games, and devices) with teacher guidance.
Ideas:
Epic Books - Is it easier to read a physical book or an ebook? What are some features that might make an ebook easier to read for certain people?
At this level, the focus is on building awareness of the many different computer science-related careers.
Ideas:
Compare and Contrast careers and use of technology within them.
Students could login and use Xello: College & Career Readiness Software that Inspires Students to investigate different technology careers and the important requirements and characteristics of each.
The focus is on understanding that models or simulations are limited by the data that they use, rather than understanding specifically how they use that data.
Ideas:
Use robotics kits in class, in small groups. Students can use simple coding that can help them quickly see their input produce an output.
The emphasis is on designing and following collection protocols. Data sources include, but are not limited to sensors, surveys, and polls.
Ideas:
Students could develop their own Google Forms to survey their classmates about their interests, hobbies, etc. Students could survey students to develop a data table and graph of favorite meals to help develop a menu and then send these suggestions to the school cafeteria staff.
Refining includes, but is not limited to, identifying relevant subsets of a data set, deleting unneeded data, and sorting and organizing data to highlight trends.
Ideas:
Students could access government data sets for science (tide, hurricane data, sunrise/sunset) and sort and analyze the data to get specific information to support a claim.
Iditarod Unit- students could analyze temperature and weather charts for different regions of Alaska and create a persuasive letter to write to race organizers, suggesting an alternate location for the starting and/or ending point of the race.
The focus is on identifying where there is potential to use a function or procedure to create a reusable computation.
Ideas:
Brainpop Jr. Computational Thinking video
Code.org abstraction with Mad Glibs
Little Bits in the library
robotic kids in the library
Scratch - Imagine, Program, Share (if Edlaw2D approved)
The focus is on identifying similar expressions or sequences in code and abstracting them into functions that generalize over the similarities.
Ideas:
Students can generalize many similar functions to one function such as generalizing individual functions that draw a square, draw a triangle, and draw an octagon to a single function that draws a polygon based on an input for the number of sides.
Algorithms can be represented in a range of formats, including flowcharts, pseudocode, or written steps. Planning the output of a program, such as with a storyboard or wireframe, is not sufficient on its own.
Ideas:
Creating multiple outputs based on input variables
The focus is on understanding that variables can be used to track the value of a concept in a program as it changes over time.
Ideas:
Students could program a game that uses a score variable to store the users points while playing the game.
The focus is on having students combine control structures, such as conditionals and loops, in such a way that they work together to achieve an outcome that could not be achieved using only one of them.
Ideas:
Students could use Boolean expressions and conditionals to search the library catalog, identifying how their results change accordingly.
Khan Academy intro to Javascript (requires student data unless aliases are created by teacher/librarian beforehand)
Programs can be debugged in numerous ways, including tracing and trying varying inputs. Perseverance is important in finding errors.
Ideas:
Kodable Bug World (free)
Work together as a class to try to solve the Bridge Riddle
Khan Academy intro to Javascript (requires student data unless aliases are created by teacher/librarian beforehand)
At this level, the emphasis is on using the iterative design process to create a solution or prototype with the end user in mind and to document the steps taken by the student to gather and incorporate information about the user into the computational artifact.
Ideas:
Students could develop a story map or storyboard to illustrate the steps their class takes to walk from their classroom to the cafeteria.
Students could view the fire evacuation map and procedure for the library, and make suggestions based upon the speed, accessibility and distance of alternate routes.
The emphasis is on designing (but not necessarily creating) a user interface. Designs could include things like written descriptions, drawings, and/or 3D prototypes.
Ideas:
Makey-Makey kits
Robotics Kits
Algodoo (free, must be downloaded)
The focus is on identifying the source of a problem by using a structured process such as a checklist or flowchart to systematically try solutions that may fix the problem.
Ideas:
Students could design an app for finding free filtered water stations in the area that would use GPS, magnetometer, and touch screen sensors as well as the phone’s WIFI and a map API.
The focus is on describing that data must be stored on a physical device. Access to remotely stored data is restricted by the networks, and to access non-local data a connection to the network is required.
Ideas:
Student Helpdesk to troubleshoot Chromebook issues
Students could follow a troubleshooting flowchart that guides them through a process of checking connections and settings, changing software to see if hardware will work, and swapping in working components.
Students could create a troubleshooting flowchart for anyone using a school device.
The focus is on understanding how protocols enable communication and what additional data is necessary for transmission. Knowledge of the details of how specific protocols work is not expected.
Ideas:
Students can simulate how information is sent in packets by doing a relay race. Each student will have a different part of the message and compete to see who can race to get the whole message to the other side the fastest.
Have students take on the roles of newscasters and demonstrate how they would transmit their news items as a unicast, multicast, or a broadcast
The focus is on explaining where the data associated with different apps, devices, and embedded systems is stored, how the data is synchronized, and how to connect to it.
Ideas:
Students could create a diagram that illustrates the use of remote storage in cloud computing, a school's data server, or distributed media. Students could discuss how local copies of data are synced with data from the remote server.
Assign students random roles (schools, businesses, etc) and varying amounts of “data” and have them estimate what storage size they would need in order to accommodate the storage that they have been allocated.
The emphasis is on identifying personal information and devices that an individual may have access to and that adversaries may want to obtain or compromise. At this stage, students should focus on specific data and devices that they have access to.
Ideas:
The emphasis is on recommending different types of security measures including physical, digital, and behavioral, for a given situation.
Ideas:
Students can identify situations where common safeguards would not work. For example, 2-step authentication will not work if someone is using their mobile phone as the authentication device and they are in an area without cell phone coverage.
The focus is on thinking about how a specific safeguard impacts the confidentiality, integrity, and access of information. Additionally, there should be a focus on discussing whether strengthening one specific safeguard adversely affects another.
Ideas:
Students could examine the pros and cons of using different methods of authentication, for example passwords, biometrics, or key-fobs and the trade-offs of using single-factor vs multi-factor authentication.
The focus is on recognizing that cryptography provides a level of security for data, and some types of encryption are weaker than others.
Ideas:
Students could use a cipher or Vigenere Square to encrypt a message for a classmate. the classmate can use the same cipher to decrypt the message.
Pigpen Cipher- Students can take turns creating and cracking messages created using the PigPen cipher
https://www.brainpop.com/science/famousscientists/alanturing/ Brainpop video about Alan Turing who cracked the ENIGMA code
The emphasis is on explaining appropriate actions to prevent and address common security issues for common situations.
Ideas:
Students could recommend changing passwords immediately after an account is compromised and create sample secure passwords and passphrases.
The emphasis is on continuing to improve keyboarding skills, with a focus on increasing speed as well as accuracy.
Use typing.com, a 3-minute typing tests, keep track of weekly scores and use online graphing software to create a digital representation of their progress in the areas of both speed and accuracy.
Students connect with others (students, teachers, families, the community, and/or experts) to further their learning for a specific purpose, give and receive feedback, and created a shared product.
Ideas:
When using a shared online document, students know how to share a document with other students so that they can work on the document collaboratively.
Mastery of this standard implies an understanding of how different search tools work, why different search tools provide different results, and how and why some websites rise to the top of a search.
Ideas:
Use these resources to teach visual literacy
Teachers should designate a school-approved location for students to publish artifacts for an audience to view. Advanced digital tools may refer to the tool itself (i.e. the tool is more advanced) or to utilization of more advanced features on a tool.
Ideas:
Students can conduct a search of the library catalog and/or databases in order to find information relevant to a class topic.
New technologies could include different tools for collaboration, creation, etc. that the student has not used before.
Ideas:
Students can research the way Siri and Alexa have changed the way we interact
Students familiar with spreadsheets can start to explore database software. (i.e. Google Sheets vs. Excel)
Students can create Google Slideshows and then use online software such as Prezi: Presentations and videos with engaging visuals for hybrid teams and evaluate the effectiveness of each tool.
A focus should be on learning about privacy settings on social media accounts, exploring the concept of a positive online presence/identity, and identifying behaviors and information that could potentially affect them now and in the future.
Ideas:
Students use a tool that displays archived versions of websites (such as “Wayback Machine”) to research how information is available even if it seems to be deleted.
Have students review the “terms and conditions” of a commonly used site/app. Have them note anything surprising or confusing.
Students can research how someone’s digital footprint negatively impacted their life.
Students are able to strategize ways to keep online spaces safe. Identify types of negative online behaviors including cyberbullying, harassment, trolling/flaming, excluding, outing, dissing, masquerading, and impersonation.
Ideas:
Complete lessons on Copyright
Interland Kind Kingdom
NetSmartz Kids Be Safer Online
Review class rules regarding interactions within Google Classroom
Have students create digital escape rooms (centered around the theme of online safety and digital citizenship) using Google slides. Then challenge their classmates to escape from their creations!
Students could identify why they should find and use truthful information online.
Students can investigate sites such as those listed below, and evaluate each one according to our class criteria. They can then decide in the end which of the websites they deem to be legitimate and trustworthy, and those that they believe are a hoax.
Dihydrogen Monoxide Research Division - dihydrogen monoxide info