Checkfu

Standard set

7th Grade

Computer Science and Cybersecurity (2019-)Grades 07CSP ID: 17516C404D4C4ED8B81C0E349C4E954CStandards: 44

Standards

Showing 44 of 44 standards.

Filter by depth

7.NI

Depth 0

Networks & Internet: Networks link computers and devices locally and around the world allowing people to access and communicate information. 

7.HS

Depth 0

Hardware & Software: Devices, hardware, and software work together as a system to accomplish tasks.

7.T

Depth 0

Troubleshooting: Strategies for solving technology system problems.

7.PSA

Depth 0

Problem Solving & Algorithms: Strategies for understanding and solving problems.

7.DCA

Depth 0

Data Creation & Analysis: Data can be collected, used, and presented with computing devices or digital tools.

7.DD

Depth 0

Development & Design: Design processes to create new, useful, and imaginative solutions to solve problems.

7.A

Depth 0

Access: Effective search strategies can locate information for intellectual or creative pursuits.

7.E

Depth 0

Information sources can be evaluated for accuracy, currency, appropriateness, and purpose.

7.C

Depth 0

Create: It is important to both consume and produce information to be digitally literate. 

7.IP

Depth 0

Intellectual Property: Respect for the rights and obligations of using and sharing intellectual property. 

7.IC

Depth 0

Impacts of Computing: Past, present, and possible future impact of technology on society.

7.SI

Depth 0

Social Interactions: Technology facilitates collaboration with others.

7.SE

Depth 0

Safety & Ethics: There are both positive and negative impacts in social and ethical behaviors for using technology.

7.RU

Depth 0

Responsible Use: Respect and dignity in virtual and physical communities.

7.DI

Depth 0

Digital Identity: The responsibilities and opportunities that come with living, learning, and working in an interconnected digital world.

7.NI.1

Depth 1

Model how data is sent from one computer to another across networks.

7.HS.1

Depth 1

Compare and contrast hardware and/or software options to complete a task.

7.HS.2

Depth 1

Continued growth.

7.HS.3

Depth 1

Organize, store, and retrieve digital information with minimal guidance.

7.HS.4

Depth 1

Describe threats to technology systems. (CYSEC)

7.HS.5

Depth 1

Explain how security measures protect technology systems. (CYSEC) 

7.T.1

Depth 1

Continued growth.

7.PSA.1

Depth 1

Modify and test an algorithm to solve a problem.

7.PSA.2

Depth 1

Continued growth.

7.DCA.1

Depth 1

Represent data, in more than one way, to defend your claim.

7.DD.1

Depth 1

Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.

7.A.1

Depth 1

Continued growth.

7.E.1

Depth 1

Independently, evaluate information and its sources using student selected processes and strategies.

7.C.1

Depth 1

Continued growth.

7.IP.1

Depth 1

With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.

7.IP.2

Depth 1

Continued growth.

7.IP.3

Depth 1

Identify strategies to avoid personal works and the works of others from being pirated and plagiarized. (CYSEC)

7.IC.1

Depth 1

Compare and contrast the impacts of technology, including bias and accessibility. 

7.SI.1

Depth 1

Use collaborative technology to gather and share information.

7.SI.2

Depth 1

Continued growth. 

7.SE.1

Depth 1

Continued growth.

7.SE.2

Depth 1

Identify a variety of methods to maintain digital privacy and security. (CYSEC)

7.SE.3

Depth 1

Continued growth.

7.SE.4

Depth 1

Describe how to respond to threats to personal cybersecurity. (CYSEC)

7.RU.1

Depth 1

Describe different forms of cyberbullying and the effects on all parties involved.

7.RU.2

Depth 1

Identify strategies to prevent and stop cyberbullying. 

7.RU.3

Depth 1

Continued growth.

7.RU.4

Depth 1

Understand the purpose of and comply with Acceptable Use Policies.

7.DI.1

Depth 1

Evaluate how digital identity can impact a person now and in the future.

Framework metadata

Source document
North Dakota Computer Science and Cybersecurity Standards Kindergarten through Twelfth Grade 2019
License
CC BY 4.0 US