Checkfu

Standard set

6th Grade

Computer Science and Cybersecurity (2019-)Grades 06CSP ID: 939AFFC50BE44F39BCF0976E4C2AE750Standards: 45

Standards

Showing 45 of 45 standards.

Filter by depth

6.NI

Depth 0

Networks & Internet: Networks link computers and devices locally and around the world allowing people to access and communicate information.

6.HS

Depth 0

Hardware & Software: Devices, hardware, and software work together as a system to accomplish tasks.

6.T

Depth 0

Troubleshooting: Strategies for solving technology system problems.

6.PSA

Depth 0

Problem Solving & Algorithms: Strategies for understanding and solving problems.

6.DCA

Depth 0

Data Creation & Analysis: Data can be collected, used, and presented with computing devices or digital tools.

6.DD

Depth 0

Development & Design: Design processes to create new, useful, and imaginative solutions to solve problems.

6.A

Depth 0

Access: Effective search strategies can locate information for intellectual or creative pursuits. 

6.E

Depth 0

Evaluate: Information sources can be evaluated for accuracy, currency, appropriateness, and purpose.

6.C

Depth 0

Create: It is important to both consume and produce information to be digitally literate.

6.IP

Depth 0

Intellectual Property: Respect for the rights and obligations of using and sharing intellectual property. 

6.IC

Depth 0

Impacts of Computing: Past, present, and possible future impact of technology on society.

6.SI

Depth 0

Social Interactions: Technology facilitates collaboration with others.

6.SE

Depth 0

Safety & Ethics: There are both positive and negative impacts in social and ethical behaviors for using technology.

6.RU

Depth 0

Responsible: Use Respect and dignity in virtual and physical communities.

6.DI

Depth 0

Digital Identity: The responsibilities and opportunities that come with living, learning, and working in an interconnected digital world.

6.NI.1

Depth 1

Explain how data is sent across networks.

6.HS.1

Depth 1

Use hardware and/or software to complete a task.

6.HS.2

Depth 1

Use software features to accomplish a goal.

6.HS.3

Depth 1

Organize, store, and retrieve digital information with guidance.

6.HS.4

Depth 1

Identify threats to technology systems. (CYSEC) 

6.HS.5

Depth 1

Identify security measures to protect technology systems. (CYSEC)

6.T.1

Depth 1

Apply basic troubleshooting strategies.

6.PSA.1

Depth 1

Identify and test an algorithm to solve a problem. 

6.PSA.2

Depth 1

Debug a program that includes sequencing, loops, or conditionals. 

6.PSA.3

Depth 1

Compare and contrast the efficiencies of multiple solutions to a task.

6.DCA.1

Depth 1

Collect and analyze data to support a claim. 

6.DD.1

Depth 1

Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.

6.A.1

Depth 1

Use a variety of strategies to refine and revise search results. 

6.E.1

Depth 1

Evaluate information and its sources. 

6.C.1

Depth 1

Repurpose or remix original works following fair use guidelines. 

6.IP.1

Depth 1

With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain. 

6.IP.2

Depth 1

Cite a variety of sources using the appropriate format.

6.IP.3

Depth 1

Describe negative consequences of piracy and plagiarism.

6.IC.1

Depth 1

Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility.

6.SI.1

Depth 1

Use collaborative technology.

6.SI.2

Depth 1

Identify how social interactions can impact a person’s self-image.

6.SE.1

Depth 1

Identify steps for responding to uncomfortable situations when interacting online. (CYSEC) 

6.SE.2

Depth 1

Identify basic methods to maintain digital privacy and security. (CYSEC)

6.SE.3

Depth 1

Recognize that data-collection technology can be used to track navigation online. (CYSEC)

6.SE.4

Depth 1

Identify threats to personal cybersecurity. (CYSEC)

6.RU.1

Depth 1

Identify different forms of cyberbullying. 

6.RU.2

Depth 1

Identify strategies to stop cyberbullying. 

6.RU.3

Depth 1

Use appropriate digital etiquette in avariety of situations.

6.RU.4

Depth 1

Understand the purpose of and comply with Acceptable Use Policies. 

6.DI.1

Depth 1

Describe personal online usage and determine how it affects identity on- and offline.

Framework metadata

Source document
North Dakota Computer Science and Cybersecurity Standards Kindergarten through Twelfth Grade 2019
License
CC BY 4.0 US