K-12 Computer Science Standards

UT Digital Literacy

344 Standards

1

1.1.1

Sit up straight

2

1.1.2

Feet flat on the floor

3

1.1.3

Body centered with the “G” and “H” keys

4

1.1.4

Fingers curved on home row (A, S, D, F, J, K, L, ;)

5

1.1.5

Wrists straight and elbows naturally at sides

6

1.1.6

Correct fingers used for keystrokes

7

1.1.7

Key by touch (eyes on copy or screen, not on keys)

8

1.1.8

Key with smooth rhythm

9

2.1.1

Define hardware as the physical components that make up a computing system, computer, or computing device.

10

2.1.2.A

Identify primary hardware components of a computer: Monitor

11

2.1.2.B

Identify primary hardware components of a computer: Keyboard

12

2.1.2.C

Identify primary hardware components of a computer: System unit

13

2.1.2.D

Identify primary hardware components of a computer: Motherboard

14

2.1.2.E

Identify primary hardware components of a computer: Power supply

15

2.1.2.F

Identify primary hardware components of a computer: Hard Drive/Solid State Drive (SDD)

16

2.1.2.G

Identify primary hardware components of a computer: Central Processing Unit (CPU)

17

2.1.2.H

Identify primary hardware components of a computer: Mouse/Touchpad/Touchscreen

18

2.1.3

Define peripheral devices as an internal or external device that connects directly to a computer but does not contribute to the primary function of a computer.

19

2.1.4.A

Identify primary peripheral devices: Printer

20

2.1.4.B

Identify primary peripheral devices: Camera

21

2.1.4.C

Identify primary peripheral devices: Projector

22

2.1.4.D

Identify primary peripheral devices: Speakers

23

2.1.4.E

Identify primary peripheral devices: Headphones

24

2.1.4.F

Identify primary peripheral devices: Microphone

25

2.1.4.G

Identify primary peripheral devices: Game controller

26

2.1.4.H

Identify primary peripheral devices: Virtual Reality (VR) headsets

27

2.2.1

Define software as a set of instruction that runs a computing system, computer, or other computing device.

28

2.2.2.A

Define the two types of software for a computing system: Operating system is software that controls the communication between the hardware and application software of a computer.

29

2.2.2.B

Define the two types of software for a computing system: Application software is developed to help the user perform specific tasks.

30

2.2.3.A

Identify the primary operating system of a computing device: Windows

31

2.2.3.B

Identify the primary operating system of a computing device: Mac OS

32

2.2.3.C

Identify the primary operating system of a computing device: Android

33

2.2.3.D

Identify the primary operating system of a computing device: iOS

34

2.2.3.E

Identify the primary operating system of a computing device: Linux

35

2.2.4.A

Identify the common application software for a computing device: Business software (i.e. word processing, spreadsheets, databases, presentation, email, calendaring)

36

2.2.4.B

Identify the common application software for a computing device: Communication software (i.e. social media, email, video conference, instant messaging)

37

2.2.4.C

Identify the common application software for a computing device: Entertainment software (i.e. virtual reality, streaming, gaming)

38

2.2.4.D

Identify the common application software for a computing device: Multimedia software (i.e. photo, image, video, audio, speech to text, artificial intelligence (AI ) speech technology)

39

2.2.4.E

Identify the common application software for a computing device: Education software (i.e. learning management system (LMS), gradebook, e-books)

40

2.3.1

Define input device as hardware equipment used to transfer data to a computing system for processing.

41

2.3.2.A

Explain the function of primary input devices: Keyboard

42

2.3.2.B

Explain the function of primary input devices: Mouse/Touchpad

43

2.3.2.C

Explain the function of primary input devices: Touchscreen

44

2.3.2.D

Explain the function of primary input devices: Microphone

45

2.3.2.E

Explain the function of primary input devices: Camera

46

2.3.2.F

Explain the function of primary input devices: Game controller

47

2.4.1

Define processing as interpreting input and producing output.

48

2.4.2

Define and explain the main processing device in a computer system: Central Processing Unit (CPU) is the master chip that controls all other aspects of the computer.

49

2.4.3.A

Define the relationship of an algorithm, loop, and conditional in computer processing: Algorithm is a set of instructions to complete a task

50

2.4.3.AA

The CPU uses the algorithm as an input to produce output: The CPU uses the algorithm as an input to produce output

51

2.4.3.B

Loop is a programming structure that repeats a set of instructions as long as a specific condition is true

52

2.4.3.BB

Loop is a programming structure that repeats a set of instructions as long as a specific condition is true: The CPU uses the loop as an input to repeat the task to output data until the specific condition is true

53

2.4.3.C

Conditional is a feature of a programming language that performs different computations or actions depending on whether a programmer-specified Boolean condition evaluate to true or false

54

2.4.3.C.i

Conditional is a feature of a programming language that performs different computations or actions depending on whether a programmer-specified Boolean condition evaluate to true or false: The CPU uses the conditional as an input to continue to evaluate whether or not to send output data

55

2.4.4

Explain the role of the CPU, memory, and storage when purchasing a computing device based on the individual user’s needs

56

2.5.1

Define memory as temporarily stored data for immediate use in a computer system.

57

2.5.2.A

Define the two types of memory for a computer system: Random Access Memory (RAM) is used by the operating system and application software while the computer is running

58

2.5.2.B

Define the two types of memory for a computer system: Read Only Memory (ROM) is preloaded instructions for booting up the computer

59

2.5.3

Define storage as a place where data can be held and retrieved at a later time.

60

2.5.4.A

Identify the benefits of using different types of primary storage: Define hard drive as an internal storage device that stores data

61

2.5.4.B

Identify the benefits of using different types of primary storage: Define external hard drive as a portable storage device that stores data

62

2.5.4.C

Identify the benefits of using different types of primary storage: Define flash drive as a small, portable storage device that uses electrical rewritable storage (flash) to store or transfer data (i.e. USB, thumb drive, memory stick, jump drive)

63

2.5.4.D

Identify the benefits of using different types of primary storage: Define Solid-state drive (SSD) as a storage device that uses an electrical rewritable storage (flash) and performs tasks faster than a hard drive

64

2.5.4.E

Identify the benefits of using different types of primary storage: Define memory card as a small, flat flash drive used in mobile devices and digital cameras (i.e. SD card, micro SD card).

65

2.5.4.F

Identify the benefits of using different types of primary storage: Define cloud storage as storage where data is transmitted and stored on remote storage systems where it is maintained, managed, and backed up and made available to users over a network (i.e. Google Drive, iCloud, Dropbox, OneDrive)

66

2.5.5

Explain the role of memory and storage when purchasing a computing device based on the individual user’s needs.

67

2.6.1

Define output as information processed from a computing system and received by the user.

68

2.6.2

Define output device as hardware equipment used to transfer data out from a computer system.

69

2.6.3.A

Explain the function of primary output devices: Monitor/Screen

70

2.6.3.B

Explain the function of primary output devices: Printer

71

2.6.3.C

Explain the function of primary output devices: Projector

72

2.6.3.D

Explain the function of primary output devices: Speakers

73

2.6.3.E

Explain the function of primary output devices: Headphones

74

3.1.1

Define network as a group of two or more digital devices connected to share information.

75

3.1.2

Define Internet as a global network.

76

3.1.3

Define bandwidth as the amount of information that can travel on an Internet connection in a certain timeframe.

77

3.1.4

Define uniform resource locator (URL) as an address for a worldwide webpage

78

3.1.5

Define Internet protocol (IP) address as a unique set of numbers separated by periods that identifies each digital device using the Internet to communicate.

79

3.1.6

Define Internet browser as an application used to access and view websites.

80

3.1.7

Define search engine as a program that searches for and identifies items in a database using keywords to find websites for information on the Internet.

81

3.1.8

Define server as a computer or computer program which manages access to databases of information in a network.

82

3.2.1

Identify the different components required for an Internet connection

83

3.2.1.A

Define Internet service provider (ISP) as a company that provides subscribers with access to the Internet

84

3.2.1.B

Define modem as a hardware component that converts packets into a usable signal to allow another device, such as a router, to connect to the Internet

85

3.2.1.BB

Define packet as small bits of data sent over a network

86

3.2.1.C

Define router as a device that transports the packets of information between the digital device and modem

87

3.2.1.D

Define digital device as a device that utilizes hardware and software during the information processing cycle

88

3.2.2.A

Identify types of Internet connections: Cellular

89

3.2.2.B

Identify types of Internet connections: Digital Subscriber Line (DSL)

90

3.2.2.C

Identify types of Internet connections: Fiber optic

91

3.2.2.D

Identify types of Internet connections: Satellite

92

3.2.2.E

Identify types of Internet connections: Wireless (WiFi)

93

3.2.3

Explain how Internet connection and bandwidth impact speed and accessibility.

94

3.2.4

Define uniform resource locator (URL) as an address of a World Wide webpage on the Intenet.

95

3.2.5.A

Explain the component of a URL: Scheme (i.e. http://, https://)

96

3.2.5.B

Explain the component of a URL: Sub-domain (WWW)

97

3.2.5.C

Explain the component of a URL: Domain name (name of the website)

98

3.2.5.D

Explain the component of a URL: Top Level Domain (i.e. .org, .com, .net., .edu., .gov)

99

3.2.5.E

Explain the component of a URL: File path (description of the exact webpage location)

100

3.2.6.A

Search Internet content efficiently and effectively: Search engine (i.e. Google, Bing)

101

3.2.6.B

Search Internet content efficiently and effectively: Don’t use common words and punctuation

102

3.2.6.C

Search Internet content efficiently and effectively: Specific keywords

103

3.2.6.D

Search Internet content efficiently and effectively: Use quotation marks

104

3.2.7.A

Demonstrate the use of common website navigation components: Menu - Chrome app launcher (waffle)

105

3.2.7.AA

Demonstrate the use of common website navigation components: Menu - Three dots (kabob)

106

3.2.7.AB

Demonstrate the use of common website navigation components: Menu - Three lines (hamburger)

107

3.2.7.B

Demonstrate the use of common website navigation components: Home page

108

3.2.7.C

Demonstrate the use of common website navigation components: Search bar

109

3.2.7.D

Demonstrate the use of common website navigation components: Graphics

110

3.2.7.E

Demonstrate the use of common website navigation components: Hyperlinks

111

3.2.8.A

Identify components of credible online content: Author

112

3.2.8.B

Identify components of credible online content: Date

113

3.2.8.C

Identify components of credible online content: Verified sources

114

3.2.8.D

Identify components of credible online content: Domain

115

3.2.8.E

Identify components of credible online content: Design

116

3.2.8.F

Identify components of credible online content: Writing style

117

3.3.1.A

Identify different types of communication programs: Define email as messages distributed by email application software from one digital device to another using a network (i.e. Gmail, Outlook, Yahoo)

118

3.3.1.B

Identify different types of communication programs: Define instant messaging as online chat that offers real-time text communication over the Internet (i.e. Google Chat, Instagram DM (Direct Message), Facebook Messenger)

119

3.3.1.C

Identify different types of communication programs: Define video conference as a conference where participants, in different locations, are able to communicate with each other in sound and vision (i.e. Skype, Google Meet, Microsoft Teams, FaceTime, Zoom)

120

3.3.1.D

Identify different types of communication programs: Define web authoring as a category of software that allows the user to develop a website using visual tools based on code (i.e. Weebly, Google Sites, Wix, Adobe Spark, WordPress).

121

3.3.1.E

Identify different types of communication programs: Define social networking as the use of internet based social media sites to stay connected with others

122

3.3.2.A

Identify the primary feature of an email: Define subject as an informative, catchy, and brief line of text seen when the email reaches the recipient’s inbox

123

3.3.2.B

Identify the primary feature of an email: Define CC as a courtesy copy (previously known as carbon copy) including one or more recipients when a message is intended for one person but is relevant to other people as well

124

3.3.2.C

Identify the primary feature of an email: Define BCC as a blind courtesy copy (previously known as blind carbon copy) to let others see an email without the main recipient knowing

125

3.3.2.CA

Define BCC as a blind courtesy copy (previously known as blind carbon copy) to let others see an email without the main recipient knowing: Explain a variety of scenarios where CC and BCC would be used in an email.

126

3.3.2.D

Define attachment as a file sent with an email message (i.e. image, video, text document). Often represented by a paperclip icon

127

3.3.2.E

Define inline image as an image that is placed inside the body of the email. This allows the recipient to view the image without having to open the attachment

128

3.3.2.EA

Explain a variety of scenarios where attachment and incline image would be used in an email

129

3.3.2.F

Define signature block as a personalized block of text automatically included at the bottom of an email. A signature can include name, address, phone number, website, and other business information

130

3.3.2.G

Define reply as the response to an email that goes to a single person (the person who sent the original email or the person who sent the last message in the email thread)

131

3.3.2.H

Define reply all as the response to an email that goes to everyone who was included in the email, including CC

132

3.3.2.HA

Explain a variety of scenarios where reply and reply all would be used in an email

133

3.3.2.I

Define forward as the operation of re-sending an email message delivered to one email address to one or more different email addresses

134

3.3.3.A

Identify the primary email folders: Inbox

135

3.3.3.B

Identify the primary email folders: Deleted/Trash

136

3.3.3.C

Identify the primary email folders: SPAM/Junk Mail

137

4.1.1

Define digital citizenship as continuously developing norms of appropriate, responsible, and empowered technology use.

138

4.1.2

Define digital footprint as the information about a particular person that exists on the Internet as a result of their online activity.

139

4.2.1

Define online safety as being aware of online risks and maximizing the user’s personal safety.

140

4.2.2.A

Identify guidelines to protect users from various types of online predators: Avoid using suggestive screen names or photos

141

4.2.2.B

Identify guidelines to protect users from various types of online predators: Avoid using suggestive screen names or photos

142

4.2.2.C

Identify guidelines to protect users from various types of online predators: Be aware of excessive attention

143

4.2.2.D

Identify guidelines to protect users from various types of online predators: Do not talk to anyone that wants to get too personal

144

4.2.2.E

Identify guidelines to protect users from various types of online predators: Keep in mind that people are not always who they say they are

145

4.2.2.F

Identify guidelines to protect users from various types of online predators: Never arrange to meet with someone you only know online in person

146

4.2.2.G

Identify guidelines to protect users from various types of online predators: Tell a trusted adult if you encounter a problem

147

4.2.3

Define digital security as tools used to secure identify and data online.

148

4.2.4.A

Identify threats in the digital world: Define adware as software that automatically displays unwanted advertising material when a user in online (i.e. pop-up advertisements)

149

4.2.4.B

Identify threats in the digital world: Define computer worm virus as a malicious software that replicates itself to spread to other digital devices through a network

150

4.2.4.C

Identify threats in the digital world: Define denial of service attacks as an attack to shut down a computer device or network by flooding it with traffic to make it inaccessible to the intended users

151

4.2.4.D

Identify threats in the digital world: Define hackers as a person or program that uses computers to gain unauthorized access to data

152

4.2.4.E

Identify threats in the digital world: Define malware as software that is specifically designed to disrupt, damage, or gain unauthorized access to a digital device

153

4.2.4.F

Identify threats in the digital world: Define ransomware as a type of malicious software that is used to block access to a digital device until a sum of money is paid

154

4.2.4.G

Identify threats in the digital world: Define spyware as software that enables a user to obtain private information about another’s computer activity by transmitting data secretly from their hard drive

155

4.2.4.H

Identify threats in the digital world: Define Trojan Horse as a malicious code that looks legitimate and takes control of your computer to damage, disrupt, and destroy your data

156

4.2.5

Explain the importance of using anti-virus protection software on your digital device: Define anti-virus protection software as software designed to protect your computing device and destroy computer viruses.

157

4.2.5.A

Explain the importance of using anti-virus protection software on your digital device.

158

4.2.6

Define online privacy as the protection of private data and communication.

159

4.2.7.A

Identify threats to online transactions: Browser extensions

160

4.2.7.B

Identify threats to online transactions: Credit card fraud

161

4.2.7.C

Identify threats to online transactions: Data misuse

162

4.2.7.D

Identify threats to online transactions: Hacking

163

4.2.7.E

Identify threats to online transactions: Money theft

164

4.2.7.F

Identify threats to online transactions: Unprotective services

165

4.2.8.A

Identify threats to email and online communication: Catfishing

166

4.2.8.B

Identify threats to email and online communication: Email scams

167

4.2.8.C

Identify threats to email and online communication: Hacking

168

4.2.8.D

Identify threats to email and online communication: Phishing

169

4.2.8.E

Identify threats to email and online communication: Spoofing

170

4.2.9.A

Explain the importance of different security measures on your digital devices: Password/passphrase

171

4.2.9.B

Explain the importance of different security measures on your digital devices: Two-factor authentication

172

4.2.9.C

Explain the importance of different security measures on your digital devices: Firewalls

173

4.2.9.D

Explain the importance of different security measures on your digital devices: Secure website (HTTPS)

174

4.2.9.E

Explain the importance of different security measures on your digital devices: Updates

175

4.3.1

Define intellectual property as a creative work or idea for which an individual has ownership rights.

176

4.3.2.A

Define copyrights as the exclusive legal right given to the creator of works printed, posted, published, filmed, or recorded.

177

4.3.2.B

Define creative commons as licenses that allow for the distribution of copyrighted works when the creator wants to give other people the right to share, use, or build upon what they have created.

178

4.3.2.C

Define patents as the legal right granted to an inventor.

179

4.3.2.D

Define public domain as intellectual property that is available for public use.

180

4.3.2.E

Define trade secrets as formulas, patterns, or methods used to produce a creative work that is generally not known outside a company.

181

4.3.2.F

Define trademarks as a distinctive protected mark or feature that identifies a person or thing.

182

4.3.3

Identify intellectual property violations.

183

4.3.3.A

Define plagiarism as the practice of taking someone else’s intellectual property and using it as your own (i.e. copy/paste, images).

184

4.3.3.B

Define copyright infringement (piracy) as the unauthorized use of or reproduction of another’s work for financial gain (i.e. music, movies, images).

185

4.3.4

Define digital ethics as how to manage oneself ethically and professionally when using digital device.

186

4.3.5

Define netiquette as being courteous and respectful when communicating online.

187

4.3.6

Explain the personal responsibilities of being ethical in a digital world.

188

4.3.6.A

Explain the personal responsibilities of being ethical in a digital world.

189

4.3.6.B

Explore appropriate and safe sites.

190

4.3.6.C

Follow copyright laws.

191

4.3.6.D

Help prevent cyberbullying.

192

4.3.6.E

Maintain a positive digital footprint.

193

4.3.6.F

Always use netiquette.

194

4.4.1

Define digital wellness as the preventative measures aimed at regulating and improving the healthy use of technology.

195

4.4.2

Identify measures to achieve personal digital wellness.

196

4.4.2.A

Understand device use (i.e. get a detailed understanding of technology use)

197

4.4.2.B

Create boundaries (i.e. set limits for certain apps and sites, limit notifications) Understand device use (i.e. get a detailed understanding of technology use)

198

4.4.2.C

Make adjustments to device screen (i.e. remove distracting apps on your screen, adjust light preferences)

199

4.4.2.D

Try single-tasking (i.e. to improve focus, try reducing the number of screens around you)

200

4.4.3

Define cyberbullying as the use of electronic communication to bully a person, typically by sending messages of an intimidating, embarrassing, or threatening nature.

201

4.4.4

Identify strategies to deal with cyberbullying.

202

4.4.4.A

Seek assistance from a trusted adult.

203

4.4.4.B

Be assertive (not aggressive, fighting, or teasing back).

204

4.4.4.C

Avoid unsafe websites.

205

4.4.4.D

Use positive statements to maintain positive self-esteem.

206

4.4.4.E

Avoid getting emotionally upset.

207

4.4.5

Identify the steps to report cyberbullying.

208

4.4.5.A

Don’t respond to and don’t forward the cyberbullying messages.

209

4.4.5.B

Keep evidence of cyberbullying.

210

4.4.5.BA

Record dates, times and descriptions of instance when cyberbullying occurred.

211

4.4.5.BB

Save and print screenshots, emails, and text messages.

212

4.4.5.C

Block the person who is cyberbullying.

213

4.4.5.D

Tell a trusted adult.

214

4.4.6

Identify consequences of cyberbullying for the perpetrator and victim.

215

4.4.6.A

Perpetrator

216

4.4.6.AA

Criminal record

217

4.4.6.AB

Internet or app restrictions

218

4.4.6.AC

Negative digital footprint

219

4.4.6.AD

School discipline

220

4.4.6.B

Victim

221

4.4.6.BA

Anxious/Depression

222

4.4.6.BB

Changes in appetite

223

4.4.6.BC

Stress of being in a constant state of fear

224

5.1.1

Identify the primary structural elements of the user interface

225

5.1.1.A

Define icons as an image that represents a capability of a computer and is usually selected

226

5.1.1.B

Define menus as list of options or commands to help the user find information or complete a task

227

5.1.1.C

Define tabs as part of a computer window that allows the user to go to different parts of the program or website

228

5.1.1.D

Define toolbar as a set of icons used to perform certain functions.

229

5.1.1.E

Define window as a viewing area on a computer.

230

5.1.2

Identify the primary interaction elements of the user interface.

231

5.1.2.A

Define adjustment handle as a small box that appears on the corners and edges of an element allowing the user to adjust size and shape

232

5.1.2.B

Define command button as an element the user interacts with to tell the digital device to complete a task

233

5.1.2.C

Define cursor as a movable indicator on a computer screen, identifying the point that will be affected by input from the user

234

5.1.2.D

Define insertion point as the blinking vertical line in your document where you can enter text on your page

235

5.1.3

Identify primary keyboard shortcuts

236

5.1.3.A

Identify primary keyboard shortcuts: Cut

237

5.1.3.B

Identify primary keyboard shortcuts: Copy

238

5.1.3.C

Identify primary keyboard shortcuts: Paste

239

5.1.3.D

Identify primary keyboard shortcuts: Undo

240

5.1.3.E

Identify primary keyboard shortcuts: Redo

241

5.1.3.F

Identify primary keyboard shortcuts: Save

242

5.1.3.G

Identify primary keyboard shortcuts: Print

243

5.1.3.H

Identify primary keyboard shortcuts: Find

244

5.1.4

Identify the difference between Save and Save As.

245

5.1.4.A

Define Save as a command that creates an original file and location or updates changes made in a document while keeping the original file name and location

246

5.1.4.B

Define Save As as a command that creates a copy of a current document and allows the user to rename and/or relocate the document

247

5.2.1

Perform basic file management system tasks

248

5.2.2

Define file management system as software that manages the storage of data files

249

5.2.2.A

Create and delete files

250

5.2.2.AA

Define file as storage of computer recorded data

251

5.2.2.B

Create and delete folders

252

5.2.2.BA

Define folders as an icon on a computer used to access a directory of file storage

253

5.2.2.C

Create subfolders

254

5.2.2.CA

Define subfolders as a folder contained within another folder

255

5.2.2.D

Duplicate files

256

5.2.3

Identify where deleted content is contained (i.e. recycle bin, trash can, permanently deleted).

257

5.2.4

Demonstrate the ability to sort and locate files based on search terms and file type

258

5.2.5

Rename files and save in a new location

259

5.3.1

Perform basic tasks by using word processing software

260

5.3.1.A

Open a new document

261

5.3.1.B

Print a document

262

5.3.1.C

Save a document

263

5.3.2

Perform primary page layout tasks

264

5.3.2.A

Perform primary page layout tasks: Page orientation

265

5.3.2.B

Perform primary page layout tasks: Page margins

266

5.3.3

Perform basic text formatting tasks

267

5.3.3.A

Perform basic text formatting tasks: Alignment (Left, Right, Center, Justify)

268

5.3.3.B

Perform basic text formatting tasks: Bold

269

5.3.3.C

Perform basic text formatting tasks: Font

270

5.3.3.D

Perform basic text formatting tasks: Font color

271

5.3.3.E

Perform basic text formatting tasks: Font highlight

272

5.3.3.F

Perform basic text formatting tasks: Font size

273

5.3.3.G

Perform basic text formatting tasks: Italics

274

5.3.3.H

Perform basic text formatting tasks: Underline

275

5.3.4.A

Insert and format a table: Insert table

276

5.3.4.B

Insert and format a table: Add/delete columns and rows

277

5.3.4.C

Insert and format a table: Merge cells

278

5.3.4.D

Insert and format a table: Split cells

279

5.3.4.E

Insert and format a table: Border/Shading

280

5.3.5.A

Insert and format an image: Insert image

281

5.3.5.B

Insert and format an image: Wrap text

282

5.3.5.C

Insert and format an image: Adjust size

283

5.3.6

Perform a spelling and grammar check on a document

284

5.4.1

Identify the primary components of a spreadsheet

285

5.4.1.A

Define active cell as the selected cell ready to input data

286

5.4.1.B

Define cell as the intersection between a row and a column on a spreadsheet

287

5.4.1.C

Define row as the horizontal cells identified by numbers

288

5.4.1.D

Define column as the vertical cells identified by letters

289

5.4.1.E

Define fill handle as a command that fills data in spreadsheet cells based on an existing pattern

290

5.4.2

Create basic mathematical formulas and functions in a spreadsheet

291

5.4.2.A

Define cell range as a group of cells within a row and/or column

292

5.4.2.B

Define formula as any calculation in a spreadsheet

293

5.4.2.C

Define formula as any calculation in a spreadsheet

294

5.4.3

Perform the following formulas in a spreadsheet

295

5.4.3.A

Perform the following formulas in a spreadsheet: Addition

296

5.4.3.B

Perform the following formulas in a spreadsheet: Subtraction

297

5.4.3.C

Perform the following formulas in a spreadsheet: Division

298

5.4.3.D

Perform the following formulas in a spreadsheet: Multiplication

299

5.4.4

Perform the following functions in a spreadsheet

300

5.4.4.A

Perform the following functions in a spreadsheet: SUM

301

5.4.4.B

Perform the following functions in a spreadsheet: MIN

302

5.4.4.C

Perform the following functions in a spreadsheet: MAX

303

5.4.4.D

Perform the following functions in a spreadsheet: COUNT

304

5.4.4.E

Perform the following functions in a spreadsheet: AVERAGE

305

5.4.5

Insert a column and pie chart using data from a cell range.

306

5.4.5.A

Insert a column and pie chart using data from a cell range: Include a title

307

5.4.5.B

Insert a column and pie chart using data from a cell range: Include a legend

308

5.4.5.BA

Insert a column and pie chart using data from a cell range: Include a legend (Define legend as the box that contains small samples of each color on the chart as well as a short description of what each color means)

309

5.5.1

Apply different layouts to a slide

310

5.5.1.A

Apply different layouts to a slide: Title Slide

311

5.5.1.B

Apply different layouts to a slide: Title and Content

312

5.5.1.C

Apply different layouts to a slide: Two Content

313

5.5.2

Perform basic functions in a presentation

314

5.5.2.A

Perform basic functions in a presentation: Define animation as movement of an object or image within a slide

315

5.5.2.B

Perform basic functions in a presentation: Define animation as movement of an object or image within a slide

316

5.5.3

Add images and/or media content to a presentation

317

5.6.1

Define field as a single piece of data

318

5.6.2

Define record as a group of fields and contains all the data about one person, company or item

319

5.6.3

Define query as a request for information from a database table

320

5.6.4

Define table as a database composed of records and fields that hold data

321

5.6.5

Identify different real-world uses for databases

322

5.7.1

Create events and/or appointments with the following features

323

5.7.1.A

Create events and/or appointments with the following features: Individual

324

5.7.1.B

Create events and/or appointments with the following features: Recurring

325

5.7.1.C

Create events and/or appointments with the following features: Location

326

5.7.1.D

Create events and/or appointments with the following features: Time Zone

327

5.7.1.E

Create events and/or appointments with the following features: Notes

328

5.7.1.F

Create events and/or appointments with the following features: Invitations

329

6.1.1

Understand platform compatibility

330

6.1.2

Define streaming as use of real-time audio and video over the Internet

331

6.1.3

Define downloading as saving a file from the Internet or other digital device to be used offline

332

6.2.4.A

Audio: Record

333

6.2.4.B

Audio: Trim

334

6.2.4.C

Audio: Volume level

335

6.2.5.A

Image: Crop

336

6.2.5.B

Image: Brightness/Contrast

337

6.2.5.C

Image: Export as a variety of file types (i.e. .jpeg, .png, .pdf, .gif)

338

6.2.6.A

Video: Record

339

6.2.6.B

Video: Trim

340

6.2.6.C

Video: Volume level

341

6.2.6.D

Video: Add audio track

342

6.2.7.A

Voice: Record

343

6.2.7.B

Voice: Trim

344

6.2.7.C

Voice: Volume level

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program