K-12 Computer Science Standards

Florida MJ Navigating Technology: Digital Literacy and Digital Citizenship

159 Standards

1

SC.6.CC.1.1

Demonstrate an ability to communicate through various online tools.

2

SC.6.CC.2.1

Create a digital product individually and collaboratively.

3

SC.6.CO.1.1

Identify multiple file format types.

4

SC.6.CO.1.2

Identify applications that have different desktop and online versions.

5

SC.6.CO.1.3

Identify the differences between wired and wireless computer networks.

6

SC.6.CO.1.4

Describe how information is translated and communicated between computers and devices over a network.

7

SC.6.CO.1.6

Research questions using digital information resources.

8

SC.6.CO.2.1

Identify and describe the major hardware components and functions of computer systems.

9

SC.6.CO.3.1

Describe the essential characteristics of a software artifact.

10

SC.6.CO.3.2

Describe the main functions of an operating system.

11

SC.6.CO.3.3

Explain how an operating system provides user and system services.

12

SC.6.CO.3.4

Describe the major software components and functions of computer systems.

13

SC.6.CO.3.5

Evaluate various forms of input and output (IO) and peripheral devices.

14

SC.6.CS.1.1

Define the states of data.

15

SC.6.CS.1.2

Illustrate the concept of access control and how to limit access to authorized users.

16

SC.6.CS.1.3

Discuss the importance of cybersecurity.

17

SC.6.CS.1.4

Determine information that should remain confidential.

18

SC.6.CS.1.5

Identify the need for encryption.

19

SC.6.CS.1.6

Recognize the importance of digital identity.

20

SC.6.CS.2.1

Identify the need for security safeguards on personal devices.

21

SC.6.ET.1.1

Identify technology used to support specialized forms of human- computer interaction (HCI).

22

SC.6.ET.2.1

Identify the characteristics of Artificial Intelligence (AI).

23

SC.6.ET.2.2

Discuss the benefits associated with Artificial Intelligence (AI).

24

SC.6.ET.3.1

Explain why some tasks can be accomplished faster by computers.

25

SC.6.ET.3.2

Describe how humans and machines interact to accomplish tasks that neither can accomplish alone.

26

SC.6.HS.1.1

Identify the connection between strong passwords and Internet safety.

27

SC.6.HS.1.2

Discuss the need for downloads to come from trusted sources.

28

SC.6.HS.1.3

Describe safe practices when participating in digital communication.

29

SC.6.HS.1.4

Evaluate a given website to determine if it is safe for users.

30

SC.6.HS.2.1

Define the online disinhibition effect.

31

SC.6.HS.2.2

List negative impacts of excessive device usage.

32

SC.6.HS.2.3

Implement the 20-20-20 rule for technology.

33

SC.6.HS.3.1

Explore the impact that digital media and communication has on our behavior.

34

SC.6.TI.1.1

Recognize the data content sources that make your digital footprint.

35

SC.6.TI.1.2

Explore the history of computer and other devices.

36

SC.6.TI.1.3

Create a timeline for the innovation of an electronic device.

37

SC.6.TI.1.4

Describe various technology-related career paths.

38

SC.6.TI.2.1

Recognize the consequences of plagiarism on the development of creative works.

39

SC.6.TI.2.2

Demonstrate compliance with the school’s Acceptable Use Policy.

40

SC.6.TI.2.3

Explain fair use for using copyrighted materials.

41

SC.6.TI.2.4

Generate citations for text and non-text sources using a digital tool.

42

SC.7.CC.1.1

Apply multimedia tools for local and global group collaboration.

43

SC.7.CC.1.2

Identify productivity tools for collaboration.

44

SC.7.CC.1.3

Identify individual roles within a collaborative team.

45

SC.7.CC.2.1

Organize compiled information using a digital tool.

46

SC.7.CC.2.2

Analyze one’s own ideas with research-based information to create a unique digital artifact.

47

SC.7.CO.1.1

Identify the kinds of content associated with different file types.

48

SC.7.CO.1.2

Differentiate between different file types.

49

SC.7.CO.1.3

Describe the relationship between hardware and software.

50

SC.7.CO.1.4

Utilize a set of websites to find information for a given topic.

51

SC.7.CO.1.5

Utilize government websites to facilitate civic engagement.

52

SC.7.CO.1.6

Describe strategies for determining the reliability of resources or information on the Internet.

53

SC.7.CO.2.1

Explain the difference between wired, local area, wireless and mobile networks.

54

SC.7.CO.2.2

Identify and describe the function of the main internal parts of a basic computing device.

55

SC.7.CO.2.4

Explain the connection of natural resources on the manufacturing of computer hardware components.

56

SC.7.CO.3.1

Differentiate between desktop applications and software as a service (SaaS).

57

SC.7.CS.1.1

Describe data in its three states and potential threats to each state.

58

SC.7.CS.1.2

Explain the concept of access control and how to limit access to authorized users.

59

SC.7.CS.1.3

Examine the basics of cybersecurity needs for business, government and organizations.

60

SC.7.CS.1.4

List and define the elements of the confidentiality, integrity and availability (CIA) triad.

61

SC.7.CS.1.5

Explain components of access control.

62

SC.7.CS.1.6

Identify the characteristics of strong versus weak passwords in data and identity security.

63

SC.7.CS.1.7

Explain the proper use and operation of security technologies.

64

SC.7.CS.1.8

Identify actions that protect electronic devices.

65

SC.7.CS.2.1

Define the Internet of Things (IoT).

66

SC.7.CS.3.1

Identify the types of cyberattacks.

67

SC.7.CS.3.2

Explore social engineering attacks.

68

SC.7.CS.3.3

Identify data vulnerabilities.

69

SC.7.ET.1.1

Investigate the latest technologies and the potential they have to improve our lives at home, work and in society.

70

SC.7.ET.1.2

Explore emerging technologies that have the potential to impact education.

71

SC.7.ET.2.1

Explore future technologies and the role artificial intelligence (AI) may play.

72

SC.7.ET.3.1

Describe ways in which adaptive technologies can assist users in their daily lives.

73

SC.7.ET.3.2

Identify ways humans interact with computers.

74

SC.7.ET.3.3

Identify ways humans interact with hardware components.

75

SC.7.HS.1.1

Explain the possible consequences of cyberbullying.

76

SC.7.HS.1.2

Discuss the impact of online disinhibition on individuals and society.

77

SC.7.HS.1.3

Interpret writings and communications using terminology.

78

SC.7.HS.1.4

Categorize potential dangers to an individual’s safety and security.

79

SC.7.HS.1.5

Recognize the importance of reporting suspicious behavior encountered on the Internet.

80

SC.7.HS.1.6

Compare the risks and benefits of accessing the Internet.

81

SC.7.HS.1.7

Examine safe practices for technology use.

82

SC.7.HS.2.1

Identify the digital practices that may affect your physical and mental well- being.

83

SC.7.HS.3.1

Discuss how device usage can affect sleeping patterns.

84

SC.7.HS.3.2

Discuss the potential risks of device addiction and how to prevent it.

85

SC.7.HS.3.3

Explain the possible consequences of cyberbullying and inappropriate use of digital media and communication on personal life and society.

86

SC.7.TI.1.1

Discuss the ways that technology has increased the capacity for communication within a community.

87

SC.7.TI.1.2

Evaluate the responsible and irresponsible use of information on collaborative projects.

88

SC.7.TI.1.3

Identify how media is used to influence information.

89

SC.7.TI.1.4

Analyze technology-related career paths.

90

SC.7.TI.1.5

Summarize the historical impact of digital media and communication.

91

SC.7.TI.1.6

Explore the innovation of computer components.

92

SC.7.TI.2.1

Describe legal and ethical behaviors when using information and technology and describe the consequences of misuse.

93

SC.7.TI.2.2

Describe and model responsible use of modern communication media and devices.

94

SC.7.TI.2.3

Recognize the legal use of modern communication media and devices.

95

SC.7.TI.2.4

Explore the ethical use of collected data.

96

SC.7.TI.2.5

Explain how copyright law and licensing protect the owner of intellectual property.

97

SC.8.CC.1.1

Design a digital product.

98

SC.8.CC.1.2

Evaluate the benefits of collaboration compared to individual product creation.

99

SC.8.CC.2.1

Publish a digital product individually and collaboratively.

100

SC.8.CO.1.1

Integrate information from multiple file formats into a single artifact.

101

SC.8.CO.1.2

Create a collaborative project utilizing an online digital application.

102

SC.8.CO.2.1

Explain how to disassemble or reassemble a desktop computer.

103

SC.8.CO.2.2

Explore different hardware specifications and their impact on the performance of the computer.

104

SC.8.CO.2.3

Identify the major components of a network.

105

SC.8.CO.3.1

Compare the benefits and limitations of desktop applications and their complimentary online subscription version.

106

SC.8.CS.1.1

Analyze threats and vulnerabilities to information security for individuals and organizations.

107

SC.8.CS.1.2

Explain how authentication and authorization methods can protect users.

108

SC.8.CS.1.3

Describe defense in-depth strategies to protect simple networks.

109

SC.8.CS.1.4

Explain how malicious actions threaten network security.

110

SC.8.CS.1.5

Explain how malicious actions threaten physical security.

111

SC.8.CS.1.6

Describe defense in depth and how physical access controls work together.

112

SC.8.CS.1.7

Explore the process of protecting computer hardware from exploitation.

113

SC.8.CS.2.1

Evaluate security and privacy issues that relate to computer networks and Internet of Things (IoT) devices.

114

SC.8.CS.2.2

Describe security and privacy issues that relate to computer networks.

115

SC.8.CS.2.3

Describe the permanency of data on the Internet, online identity and personal privacy.

116

SC.8.CS.3.1

Discuss ransomware attacks.

117

SC.8.CS.3.2

Discuss the necessity of immediate security updates of a program.

118

SC.8.CS.3.3

Identify the steps of the social engineering attack cycle.

119

SC.8.ET.1.1

Identify the emerging features of mobile devices, smart devices and vehicles.

120

SC.8.ET.1.2

Identify challenges faced by users when learning to use computer interfaces.

121

SC.8.ET.1.3

Identify the impact of natural resources on the manufacturing of computer hardware components.

122

SC.8.ET.2.1

Explore the use of an artificial intelligence (AI) device to accomplish a task.

123

SC.8.ET.2.2

Discuss the utilization of intelligent behavior in technology.

124

SC.8.ET.3.1

Investigate the advancement of robotics.

125

SC.8.HS.1.1

Describe the impacts of the presence of technology and the lack of technology on everyday life.

126

SC.8.HS.1.2

Develop procedures to protect personal information while accessing the Internet.

127

SC.8.HS.1.3

Model a procedure to mitigate risks to personal safety while accessing the Internet.

128

SC.8.HS.2.1

Determine the association between hand-eye coordination and the use of digital devices.

129

SC.8.HS.2.2

Investigate the causes of headaches associated with digital device usage.

130

SC.8.HS.2.3

Investigate the causes of physical body changes due to device usage.

131

SC.8.HS.2.4

Identify the effects on cognitive function as a result of technology use.

132

SC.8.HS.3.1

Discuss how regulating the use of digital media and communication is important for mental and physical well-being.

133

SC.8.HS.3.2

Analyze how digital media and communication influence behavior.

134

SC.8.TI.1.1

Examine the historical progression and impact of digital media and communication.

135

SC.8.TI.1.2

Describe the influence of access-to-information technologies over time.

136

SC.8.TI.2.1

Describe legal and ethical behaviors when using technology.

137

SC.8.TI.2.2

Use a local or federal government website to engage with a public official.

138

SC.8.TI.2.3

Compare various technology-related career paths.

139

SC.K12.CTR.1.1

Actively participate in effortful learning both individually and collaboratively.

140

SC.K12.CTR.2.1

Demonstrate understanding by decomposing a problem.

141

SC.K12.CTR.3.1

Complete tasks with digital fluency.

142

SC.K12.CTR.4.1

Express solutions as computational steps.

143

SC.K12.CTR.5.1

Create an algorithm to achieve a given goal.

144

SC.K12.CTR.6.1

Differentiate between usable data and miscellaneous information.

145

SC.K12.CTR.7.1

Solve real-life problems in science and engineering using computational thinking.

146

MA.K12.MTR.1.1

Actively participate in effortful learning both individually and collectively.

147

MA.K12.MTR.2.1

Demonstrate understanding by representing problems in multiple ways.

148

MA.K12.MTR.3.1

Complete tasks with mathematical fluency.

149

MA.K12.MTR.4.1

Engage in discussions that reflect on the mathematical thinking of self and others.

150

MA.K12.MTR.5.1

Use patterns and structure to help understand and connect mathematical concepts.

151

MA.K12.MTR.6.1

Assess the reasonableness of solutions.

152

MA.K12.MTR.7.1

Apply mathematics to real-world contexts.

153

ELA.K12.EE.1.1

Cite evidence to explain and justify reasoning.

154

ELA.K12.EE.2.1

Read and comprehend grade-level complex texts proficiently.

155

ELA.K12.EE.3.1

Make inferences to support comprehension.

156

ELA.K12.EE.4.1

Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.

157

ELA.K12.EE.5.1

Use the accepted rules governing a specific format to create quality work.

158

ELA.K12.EE.6.1

Use appropriate voice and tone when speaking or writing.

159

ELD.K12.ELL.MA.1

English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program