Topics that could be addressed include, but are not limited to, free speech, communication, and automation.
Ideas:
7-8.IC.2 Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
The focus is on the potential consequences of laws related to computing technologies.
Ideas:
Explore AI in science research and ethics
Explore environmental sensors and regulations around them
Discuss health apps and how they relate to HIPAA regulations
At this level, students may require teacher support to discuss the possible ethical implications of computing technologies.
Ideas:
Explore the history of computers and how it has shaped our society
The focus is on exploring the impacts of data collection, including biases in data collection, and its use by different stakeholders for a range of purposes.
Ideas:
The focus is on understanding different factors that introduce bias into an AI system and how those biases affect people.
Ideas:
Explore the bias in medical diagnostic tools
Explore facial recognition and diversity
Explore environmental data and algorithmic decisions like pollution exposure, and explore how bias in the data source or model assumption might lead to unfair resource distribution or health risks for communities.
The focus is on testing and discussing the usability and accessibility of various technology tools (e.g., apps, games, and devices) with teacher guidance.
Ideas:
At this level, the focus is on building awareness of the many different computer science-related careers.
Ideas:
The focus is on understanding that models or simulations are limited by the data that they use, rather than understanding specifically how they use that data.
Ideas:
The emphasis is on designing and following collection protocols. Data sources include, but are not limited to sensors, surveys, and polls.
Ideas:
Use information from My NASA Data
Refining includes, but is not limited to, identifying relevant subsets of a data set, deleting unneeded data, and sorting and organizing data to highlight trends.
Ideas:
Use MapMaker to create maps of any kind to visualize data. Discuss the impact this program can have on learning
The focus is on identifying where there is potential to use a function or procedure to create a reusable computation.
Ideas:
Use for weather analysis to break down data to make it easier to understand
Create a simple program in Canva AI Coding to simulate factors affecting plant growth
Create a chemical reaction calculator in an AI platform to explore reaction outcomes
explore RXN for Chemistry
The focus is on identifying similar expressions or sequences in code and abstracting them into functions that generalize over the similarities.
Ideas:
Model Energy use in machines and functions
Use a nutrition calculator to explore different foods
Create a function with parameters for speed and time using robotics
Algorithms can be represented in a range of formats, including flowcharts, pseudocode, or written steps. Planning the output of a program, such as with a storyboard or wireframe, is not sufficient on its own.
Ideas:
The focus is on understanding that variables can be used to track the value of a concept in a program as it changes over time.
The focus is on having students combine control structures, such as conditionals and loops, in such a way that they work together to achieve an outcome that could not be achieved using only one of them.
Ideas:
Create an ecosystem simulation
Create a weather forecasting model
Use a simple chemical reaction game or create one on Canva AI Code: Example
Programs can be debugged in numerous ways, including tracing and trying varying inputs. Perseverance is important in finding errors.
At this level, the emphasis is on using the iterative design process to create a solution or prototype with the end user in mind and to document the steps taken by the student to gather and incorporate information about the user into the computational artifact.
The emphasis is on designing (but not necessarily creating) a user interface. Designs could include things like written descriptions, drawings, and/or 3D prototypes.
The focus is on identifying the source of a problem by using a structured process such as a checklist or flowchart to systematically try solutions that may fix the problem.
Ideas:
The focus is on understanding how protocols enable communication and what additional data is necessary for transmission. Knowledge of the details of how specific protocols work is not expected.
The focus is on explaining where the data associated with different apps, devices, and embedded systems is stored, how the data is synchronized, and how to connect to it.
The focus is on describing that data must be stored on a physical device. Access to remotely stored data is restricted by the networks, and to access non-local data a connection to the network is required.
The emphasis is on identifying personal information and devices that an individual may have access to and that adversaries may want to obtain or compromise. At this stage, students should focus on specific data and devices that they have access to.
The emphasis is on recommending different types of security measures including physical, digital, and behavioral, for a given situation.
The focus is on thinking about how a specific safeguard impacts the confidentiality, integrity, and access of information. Additionally, there should be a focus on discussing whether strengthening one specific safeguard adversely affects another.
Ideas:
Debate trade offs around our privacy policies
The focus is on recognizing that cryptography provides a level of security for data, and some types of encryption are weaker than others.
Ideas:
Explore cryptography that has been used through history including Caesar Shifts, Navajo Code Talkers, Nazi code etc.
Have students try their hand at Pigpen cyphers
Use Breakout EDU to explore these concepts
Play Cybersecurity Jenga
Play Fabricius to explore hieroglyphs with machine learning
Review this lesson about Cybersecurity and Cryptography
Students can do a report on cryptography used to secure Bitcoin
The emphasis is on explaining appropriate actions to prevent and address common security issues for common situations.
.
The emphasis is on continuing to improve keyboarding skills, with a focus on increasing speed as well as accuracy
Students connect with others (students, teachers, families, the community, and/or experts) to further their learning for a specific purpose, give and receive feedback, and created a shared product.
Ideas:
Mastery of this standard implies an understanding of how different search tools work, why different search tools provide different results, and how and why some websites rise to the top of a search.
Ideas for Grade 8:
Explore a historical event and do research using different search engines like Google, Google Scholar, Google News, Gale in Context, Bing etc
Teachers should designate a school-approved location for students to publish artifacts for an audience to view. Advanced digital tools may refer to the tool itself (i.e. the tool is more advanced) or to utilization of more advanced features on a tool.
Ideas for Grade 8:
Create choices for students to showcase their learning using different products each time
New technologies could include different tools for collaboration, creation, etc. that the student has not used before.
A focus should be on learning about privacy settings on social media accounts, exploring the concept of a positive online presence/identity, and identifying behaviors and information that could potentially affect them now and in the future.
Ideas:
Learning for Justice Lessons
Students are able to strategize ways to keep online spaces safe. Identify types of negative online behaviors including cyberbullying, harassment, trolling/flaming, excluding, outing, dissing, masquerading, and impersonation.