M/J Navigating Technology: Digital Literacy and Digital Citizenship (#0200024) 


This document was generated on CPALMS - www.cpalms.org
You are not viewing the current course, please click the current year’s tab.

Course Standards


Name Description
SC.6.CC.1.1: Demonstrate an ability to communicate through various online tools.
SC.6.CC.2.1: Create a digital product individually and collaboratively.
Clarifications:

Clarification 1: When creating a product, students should be able to design and publish the product.

Clarification 2: Products include those that can inform, persuade or entertain.

SC.6.CO.1.1: Identify multiple file format types.
Clarifications:

Clarification 1: Within this benchmark, file types include formats for word processing, images, music and three-dimensional drawings.

Clarification 2: Instruction includes explaining why different file types exist.

SC.6.CO.1.2: Identify applications that have different desktop and online versions.
Clarifications:
Clarification 1: Instruction includes desktop versions and online subscription services.
SC.6.CO.1.3: Identify the differences between wired and wireless computer networks.
SC.6.CO.1.4: Describe how information is translated and communicated between computers and devices over a network.
Clarifications:
Clarification 1: Instruction focuses on both text and non-text information.
SC.6.CO.1.6: Research questions using digital information resources.
Clarifications:
Clarification 1: Research questions should make connections to scientific and statistical questions within this grade level.
SC.6.CO.2.1: Identify and describe the major hardware components and functions of computer systems.
Clarifications:
Clarification 1: Major hardware components include motherboards, processors, hard drives, random access memory (RAM) and cooling fans.
SC.6.CO.3.1: Describe the essential characteristics of a software artifact.
Clarifications:

Clarification 1: Essential characteristics include usability, completeness and accuracy.

Clarification 2: Instruction includes evaluating the effective use of a given program.

SC.6.CO.3.2: Describe the main functions of an operating system.
Clarifications:
Clarification 1: Functions include user interface, input and output (IO), device management and task management.
SC.6.CO.3.3: Explain how an operating system provides user and system services.
Clarifications:
Clarification 1: Instruction includes discussing how an operating system manages the computer hardware and software.
SC.6.CO.3.4: Describe the major software components and functions of computer systems.
Clarifications:
Clarification 1: Major software components include operating system, application programs, graphics, firmware and others.
SC.6.CO.3.5: Evaluate various forms of input and output (IO) and peripheral devices.
Clarifications:
Clarification 1: Input and output and peripheral devices include monitor, mouse, printer, keyboard, headphone, speakers and microphone.
SC.6.CS.1.1: Define the states of data.
Clarifications:
Clarification 1: States of data include data at rest, data in motion and data in use.
SC.6.CS.1.2: Illustrate the concept of access control and how to limit access to authorized users.
SC.6.CS.1.3: Discuss the importance of cybersecurity.
SC.6.CS.1.4: Determine information that should remain confidential.
SC.6.CS.1.5: Identify the need for encryption.
SC.6.CS.1.6: Recognize the importance of digital identity.
SC.6.CS.2.1: Identify the need for security safeguards on personal devices.
SC.6.ET.1.1: Identify technology used to support specialized forms of human- computer interaction (HCI).
Clarifications:
Clarification 1: Technologies may include augmented reality (AR), virtual reality (VR) and others.
SC.6.ET.2.1: Identify the characteristics of Artificial Intelligence (AI).
SC.6.ET.2.2: Discuss the benefits associated with Artificial Intelligence (AI).
SC.6.ET.3.1: Explain why some tasks can be accomplished faster by computers.
SC.6.ET.3.2: Describe how humans and machines interact to accomplish tasks that neither can accomplish alone.
SC.6.HS.1.1: Identify the connection between strong passwords and Internet safety.
SC.6.HS.1.2: Discuss the need for downloads to come from trusted sources.
Clarifications:
Clarification 1: Instruction focuses on a source’s legitimacy.
SC.6.HS.1.3: Describe safe practices when participating in digital communication.
Clarifications:
Clarification 1: Instruction focuses on communications within discussion groups and blogs.
SC.6.HS.1.4: Evaluate a given website to determine if it is safe for users.
Clarifications:

Clarification 1: Instruction includes discussing the accuracy and security of given websites.

Clarification 2: Instruction includes types of personal information required for access and whether it is encrypted (https).

SC.6.HS.2.1: Define the online disinhibition effect.
SC.6.HS.2.2: List negative impacts of excessive device usage.
Clarifications:
Clarification 1: Instruction includes device addiction, online versus in-person personality traits, digital overload and others.
SC.6.HS.2.3: Implement the 20-20-20 rule for technology.
Clarifications:
Clarification 1: For instruction of this benchmark, the 20-20-20 rule is defined as for every 20 minutes of screen time, look at an object 20 feet away for 20 seconds.
SC.6.HS.3.1: Explore the impact that digital media and communication has on our behavior.
Clarifications:
Clarification 1: Instruction includes identifying impacts of computing, social networking and web technologies on an individual and society.
SC.6.TI.1.1: Recognize the data content sources that make your digital footprint.
Clarifications:

Clarification 1: Instruction includes permanence of digital footprint.

Clarification 2: Within this benchmark, digital footprint includes digital profiles and other forms of personally identifiable information (PII).

SC.6.TI.1.2: Explore the history of computer and other devices.
Clarifications:
Clarification 1: Instruction includes legacy devices and antiquated technology.
SC.6.TI.1.3: Create a timeline for the innovation of an electronic device.
SC.6.TI.1.4: Describe various technology-related career paths.
SC.6.TI.2.1: Recognize the consequences of plagiarism on the development of creative works.
Clarifications:

Clarification 1: Creative works include projects, publications and online content.

Clarification 2: Instruction includes defining intellectual property.

SC.6.TI.2.2: Demonstrate compliance with the school’s Acceptable Use Policy.
SC.6.TI.2.3: Explain fair use for using copyrighted materials.
Clarifications:
Clarification 1: Copyrighted materials include images, music, video and text.
SC.6.TI.2.4: Generate citations for text and non-text sources using a digital tool.
SC.7.CC.1.1: Apply multimedia tools for local and global group collaboration.
Clarifications:
Clarification 1: Tools include collaborative spreadsheets, video conferencing software, collaborative forms, image editing software and other programs.
SC.7.CC.1.2: Identify productivity tools for collaboration.
Clarifications:
Clarification 1: Instruction includes shared calendars, group messaging applications and other project management software.
SC.7.CC.1.3: Identify individual roles within a collaborative team.
SC.7.CC.2.1: Organize compiled information using a digital tool.
SC.7.CC.2.2: Analyze one’s own ideas with research-based information to create a unique digital artifact.
SC.7.CO.1.1: Identify the kinds of content associated with different file types.
Clarifications:
Clarification 1: Within this benchmark, file types include .mp3’s association with audio, .mp4’s association with video and various file types associated with digital documents.
SC.7.CO.1.2: Differentiate between different file types.
Clarifications:
Clarification 1: Instruction includes researching different types of documents such as .docx, .pdf, .stl, .jpg and others.

Examples:
Example: Lukas is working on a resume to apply for a job at his local grocery store. The grocery store just adopted an all-digital application process. Identify what file type would be best for his virtual resume and why.
SC.7.CO.1.3: Describe the relationship between hardware and software.
Clarifications:
Clarification 1: Hardware and software including basic input/output systems (BIOS), operating systems and firmware.
SC.7.CO.1.4: Utilize a set of websites to find information for a given topic.
SC.7.CO.1.5: Utilize government websites to facilitate civic engagement.
Clarifications:
Clarification 1: Within this benchmark, students will access local, state and federal government websites.
SC.7.CO.1.6: Describe strategies for determining the reliability of resources or information on the Internet.
SC.7.CO.2.1: Explain the difference between wired, local area, wireless and mobile networks.
SC.7.CO.2.2: Identify and describe the function of the main internal parts of a basic computing device.
Clarifications:
Clarification 1: Instruction includes motherboard, hard drive, central processing unit (CPU), random access memory (RAM), graphics processing unit (GPU) and other components.
SC.7.CO.2.4: Explain the connection of natural resources on the manufacturing of computer hardware components.
SC.7.CO.3.1: Differentiate between desktop applications and software as a service (SaaS).
Clarifications:
Clarification 1: Instruction includes programs that have an online counterpart with varying functionality.
SC.7.CS.1.1: Describe data in its three states and potential threats to each state.
Clarifications:
Clarification 1: The three states of data are data in use, data at rest and data in motion.
SC.7.CS.1.2: Explain the concept of access control and how to limit access to authorized users.
Clarifications:
Clarification 1: Students should examine more advanced authentication and authorization methods, such as two-factor, multifactor and biometric.
SC.7.CS.1.3: Examine the basics of cybersecurity needs for business, government and organizations.
SC.7.CS.1.4: List and define the elements of the confidentiality, integrity and availability (CIA) triad.
SC.7.CS.1.5: Explain components of access control.
Clarifications:
Clarification 1: Components of access control include identification, authentication, authorization, accountability and non-repudiation.
SC.7.CS.1.6: Identify the characteristics of strong versus weak passwords in data and identity security.
SC.7.CS.1.7: Explain the proper use and operation of security technologies.
SC.7.CS.1.8: Identify actions that protect electronic devices.
Clarifications:
Clarification 1: Actions include protecting devices from viruses, intrusion, vandalism and other malicious activities.
SC.7.CS.2.1: Define the Internet of Things (IoT).
Clarifications:
Clarification 1: Instruction includes understanding that IoT is a network of devices, normally physical objects with sensors, that exchange information and data with one another and to computing systems.
SC.7.CS.3.1: Identify the types of cyberattacks.
SC.7.CS.3.2: Explore social engineering attacks.
SC.7.CS.3.3: Identify data vulnerabilities.
Clarifications:

Clarification 1: Instruction includes password strength (alphanumeric passwords), biometric access and two-factor authentication.

Clarification 2: Within this benchmark, encryptions include cryptography, Ceasar cypher, MD5 hashing and Vigenère cypher.

SC.7.ET.1.1: Investigate the latest technologies and the potential they have to improve our lives at home, work and in society.
SC.7.ET.1.2: Explore emerging technologies that have the potential to impact education.
SC.7.ET.2.1: Explore future technologies and the role artificial intelligence (AI) may play.
SC.7.ET.3.1: Describe ways in which adaptive technologies can assist users in their daily lives.
SC.7.ET.3.2: Identify ways humans interact with computers.
Clarifications:
Clarification 1: Instruction includes software and user interface.
SC.7.ET.3.3: Identify ways humans interact with hardware components.
Clarifications:
Clarification 1: Instruction includes probes, sensors and handheld devices.
SC.7.HS.1.1: Explain the possible consequences of cyberbullying.
Clarifications:
Clarification 1: Instruction includes the consequences that our society and schools might impose.
SC.7.HS.1.2: Discuss the impact of online disinhibition on individuals and society.
SC.7.HS.1.3: Interpret writings and communications using terminology.
SC.7.HS.1.4: Categorize potential dangers to an individual’s safety and security.
Clarifications:

Clarification 1: Instruction includes the use of email, chat rooms and other forms of direct electronic communication.

Clarification 2: Within this benchmark, dangers include predatory behavior and human trafficking on the Internet.


Examples:
Example: Create a graphic organizer to sort information security, network security and physical security into categories.
SC.7.HS.1.5: Recognize the importance of reporting suspicious behavior encountered on the Internet.
SC.7.HS.1.6: Compare the risks and benefits of accessing the Internet.
Clarifications:
Clarification 1: Instruction includes access to websites, web applications or software that does not protect against the disclosure, use or dissemination of an individual’s personal information.
SC.7.HS.1.7: Examine safe practices for technology use.
Clarifications:

Clarification 1: Instruction includes discussing personal information security.

Clarification 2: Instruction includes discussing personal safety when utilizing technology.

SC.7.HS.2.1: Identify the digital practices that may affect your physical and mental well- being.
SC.7.HS.3.1: Discuss how device usage can affect sleeping patterns.
SC.7.HS.3.2: Discuss the potential risks of device addiction and how to prevent it.
SC.7.HS.3.3: Explain the possible consequences of cyberbullying and inappropriate use of digital media and communication on personal life and society.
SC.7.TI.1.1: Discuss the ways that technology has increased the capacity for communication within a community.
SC.7.TI.1.2: Evaluate the responsible and irresponsible use of information on collaborative projects.
SC.7.TI.1.3: Identify how media is used to influence information.
SC.7.TI.1.4: Analyze technology-related career paths.
SC.7.TI.1.5: Summarize the historical impact of digital media and communication.
Clarifications:
Clarification 1: Instruction includes discussing the historical purposes of digital media and communication.
SC.7.TI.1.6: Explore the innovation of computer components.
SC.7.TI.2.1: Describe legal and ethical behaviors when using information and technology and describe the consequences of misuse.
SC.7.TI.2.2: Describe and model responsible use of modern communication media and devices.
Clarifications:
Clarification 1: Instruction includes discussion of personal information security.
SC.7.TI.2.3: Recognize the legal use of modern communication media and devices.
SC.7.TI.2.4: Explore the ethical use of collected data.
SC.7.TI.2.5: Explain how copyright law and licensing protect the owner of intellectual property.
SC.8.CC.1.1: Design a digital product.
Clarifications:
Clarification 1: Instruction includes creating a product pertaining to the real world using a variety of digital tools and resources.

Clarification 2: Instruction includes the creation of a digital product that provides value to society individually or collaboratively.

SC.8.CC.1.2: Evaluate the benefits of collaboration compared to individual product creation.
Clarifications:
Clarification 1: Instruction includes circumstances in which working as a collaborative group would not be optimal or possible.
SC.8.CC.2.1: Publish a digital product individually and collaboratively.
Clarifications:

Clarification 1: Instruction includes creating a product pertaining to the real- world, using a variety of digital tools and resources.

Clarification 2: Instruction includes publication of a digital product that provides value to society individually or collaboratively.

Clarification 3: Instruction includes reflecting on the individual and collaborative process.

SC.8.CO.1.1: Integrate information from multiple file formats into a single artifact.
SC.8.CO.1.2: Create a collaborative project utilizing an online digital application.
Clarifications:
Clarification 1: Projects include those that inform, persuade and entertain others.
SC.8.CO.2.1: Explain how to disassemble or reassemble a desktop computer.
SC.8.CO.2.2: Explore different hardware specifications and their impact on the performance of the computer.
Clarifications:
Clarification 1: Instruction includes multicore processing, refresh rates and their impact on operation.
SC.8.CO.2.3: Identify the major components of a network.
Clarifications:
Clarification 1: Within this benchmark, the components include connection, connecting point and other devices to communicate with.
SC.8.CO.3.1: Compare the benefits and limitations of desktop applications and their complimentary online subscription version.
SC.8.CS.1.1: Analyze threats and vulnerabilities to information security for individuals and organizations.
Clarifications:
Clarification 1: Threats and vulnerabilities such as malware, phishing, smishing and hacks.
SC.8.CS.1.2: Explain how authentication and authorization methods can protect users.
Clarifications:
Clarification 1: Students should examine more advanced authentication and authorization methods, such as two-factor, multifactor and biometric.
SC.8.CS.1.3: Describe defense in-depth strategies to protect simple networks.
Clarifications:
Clarification 1: Instruction includes layered strategies, such as firewalls, allow and block lists, changes to default passwords and access points.
SC.8.CS.1.4: Explain how malicious actions threaten network security.
Clarifications:
Clarification 1: Instruction includes malicious actions, such as social engineering, malware and hacks.
SC.8.CS.1.5: Explain how malicious actions threaten physical security.
SC.8.CS.1.6: Describe defense in depth and how physical access controls work together.
Clarifications:
Clarification 1: Instruction includes authentic and digital physical access controls, such as door locks, ID cards, PIN codes, bollards, lighting, fencing, cameras and guards.
SC.8.CS.1.7: Explore the process of protecting computer hardware from exploitation.
Clarifications:

Clarification 1: Instruction includes disabled or unused USB ports, windows lock screens and managed access to restricted areas.

Clarification 2: Instruction includes hardware, tablets, phones and other devices.

SC.8.CS.2.1: Evaluate security and privacy issues that relate to computer networks and Internet of Things (IoT) devices.
Clarifications:
Clarification 1: Devices include phones, tablets, smartwatches and other emerging technologies.
SC.8.CS.2.2: Describe security and privacy issues that relate to computer networks.
SC.8.CS.2.3: Describe the permanency of data on the Internet, online identity and personal privacy.
Clarifications:
Clarification 1: Instruction includes discussing the “Right to be Forgotten.”
SC.8.CS.3.1: Discuss ransomware attacks.
SC.8.CS.3.2: Discuss the necessity of immediate security updates of a program.
SC.8.CS.3.3: Identify the steps of the social engineering attack cycle.
SC.8.ET.1.1: Identify the emerging features of mobile devices, smart devices and vehicles.
SC.8.ET.1.2: Identify challenges faced by users when learning to use computer interfaces.
SC.8.ET.1.3: Identify the impact of natural resources on the manufacturing of computer hardware components.
SC.8.ET.2.1: Explore the use of an artificial intelligence (AI) device to accomplish a task.
SC.8.ET.2.2: Discuss the utilization of intelligent behavior in technology.
Clarifications:
Clarification 1: Instruction includes speech and language understanding and computer vision.

Examples:

Example: Discuss the autonomous robotic vacuum cleaner’s ability to map and analyze structures to avoid obstacles.

Example: Analyze the advantages of implementing drones to spray crops or detect predators in an agricultural environment.

SC.8.ET.3.1: Investigate the advancement of robotics.
SC.8.HS.1.1: Describe the impacts of the presence of technology and the lack of technology on everyday life.
Clarifications:
Clarification 1: Instruction includes comparing how the presence of technology has impacted our daily lives and how the lack of technology has impacted our daily lives.
SC.8.HS.1.2: Develop procedures to protect personal information while accessing the Internet.
Clarifications:
Clarification 1: Instruction includes access to websites, web applications or software that does not protect against the disclosure, use or dissemination of an individual’s personal information.

Clarification 2: Instruction includes theft of personal data including social security numbers, banking information and identity.

SC.8.HS.1.3: Model a procedure to mitigate risks to personal safety while accessing the Internet.
Clarifications:
Clarification 1: Instruction focuses on knowledge of location and personal privacy.

Examples:
Example: Jennifer is playing a game online competing against other players. Her opponent has messaged within the game to ask her where she is from and how old she is. Develop procedures that would mitigate risks for Jennifer’s personal safety.
SC.8.HS.2.1: Determine the association between hand-eye coordination and the use of digital devices.
SC.8.HS.2.2: Investigate the causes of headaches associated with digital device usage.
Clarifications:
Clarification 1: Within this benchmark, causes include but are not limited to poor posture, dehydration, blue light and eye strain.
SC.8.HS.2.3: Investigate the causes of physical body changes due to device usage.
Clarifications:
Clarification 1: Focal points include research on muscle, nervous and bone systems.

Clarification 2: Instruction is limited to the physical effects of direct digital device usage.

SC.8.HS.2.4: Identify the effects on cognitive function as a result of technology use.
SC.8.HS.3.1: Discuss how regulating the use of digital media and communication is important for mental and physical well-being.
SC.8.HS.3.2: Analyze how digital media and communication influence behavior.
Clarifications:
Clarification 1: Instruction includes the influences on individuals, communities and cultures.
SC.8.TI.1.1: Examine the historical progression and impact of digital media and communication.
Clarifications:

Clarification 1: Instruction includes how digital media and communication has changed over time.

Clarification 2: Instruction includes physical meeting places prior to the popularity of the Internet.

SC.8.TI.1.2: Describe the influence of access-to-information technologies over time.
Clarifications:

Clarification 1: Instruction includes the effects of information technology on the workplace, education and global society.

Clarification 2: Instruction includes the historical impact.

SC.8.TI.2.1: Describe legal and ethical behaviors when using technology.
SC.8.TI.2.2: Use a local or federal government website to engage with a public official.
SC.8.TI.2.3: Compare various technology-related career paths.
SC.K12.CTR.1.1: Actively participate in effortful learning both individually and collaboratively. 
Students who actively participate in effortful learning both individually and with others:
  • Build perseverance by modifying methods as needed while solving a challenging task.
  • Stay engaged and maintain a positive mindset when working to solve tasks.
  • Help and support each other when attempting a new method or approach.
Clarifications:
Teachers who encourage students to participate actively in effortful learning both individually and with others:
  • Cultivate a community of learners.
  • Foster perseverance in students by choosing challenging tasks.
  • Recognize students’ effort when solving challenging problems.
  • Emphasize project-based learning.
  • Establish a culture in which students ask questions of the teacher and their peers, and errors as a learning opportunity.
  • Develop students’ ability to justify methods and compare their responses to the responses of their peers.
SC.K12.CTR.2.1: Demonstrate understanding by decomposing a problem.
Students who demonstrate understanding by decomposing a problem:
  • Analyze the problems in a way that makes sense given the task.
  • Ask questions that will help with solving the task.
  • Break down complex problems into individual problems.
  • Decompose a complex problem into manageable parts.
Clarifications:

Teachers who encourage students to demonstrate understanding by decomposing a problem:

  • Develop students’ ability to analyze and problem-solve.
  • Help students break complex tasks into subtasks.
  • Show students that the solution to individual parts allows them to solve complex problems more effectively.
SC.K12.CTR.3.1:

Complete tasks with digital fluency.
Students who complete tasks with digital fluency:Select and use appropriate digital tools by their functions.

  • Demonstrate proper typing techniques and keyboarding skills.
  • Understand responsible technology use.
  • Use feedback to improve efficiency using digital tools.
  • Relate previously learned concepts to new concepts.
  • Solve problems by developing, testing and refining technological processes.
Clarifications:

Teachers who encourage students to complete tasks with digital fluency:

  • Provide students with opportunities to increase critical thinking skills.
  • Provide students with opportunities to use various technology hardware and software, so that technology is an integral part of the learning experience. Develop students’ ability to construct relationships between their current understanding and more sophisticated ways of thinking.
SC.K12.CTR.4.1:

Express solutions as computational steps.
Students who express solutions as computational steps:

  • Solve problems step by step rather than all at once.
  • Represent solutions to problems in multiple ways, based on context or purpose.
  • Use patterns and structures to understand and connect computational concepts.
  • Check computations when solving problems.
Clarifications:

Teachers who encourage students to express solutions as computational steps:

  • Provide opportunities for students to develop sequentially based understandings of problems. 
  • Guide students to align tasks to a step-by-step solution.
  • Select sequence and present student work to advance and deepen understanding of correct and increasingly efficient methods.
  • Prompt students to continually ask, “Does this solution make sense? How do you know?”
  • Reinforce that students check their work as they progress within and after a task.
  • Strengthen students’ ability to verify solutions through justification.
SC.K12.CTR.5.1:

Create an algorithm to achieve a given goal.
Students who create algorithms to achieve a given goal:

  • Create or use a well-defined series of steps to achieve a desired outcome.
  • Compare the efficiency of an algorithm to those expressed by others.
  • Design a sequence of steps to follow.
  • Verify possible solutions by explaining the program or methods used.
Clarifications:

Teachers who encourage students to create an algorithm to achieve a given goal:

  • Support students to develop generalizations based on the similarities found among problems.
  • Have students estimate or predict solutions before solving.
  • Help students recognize the patterns in the world around them and connect these patterns to other concepts.
SC.K12.CTR.6.1:

Differentiate between usable data and miscellaneous information.
Students who differentiate between usable data and miscellaneous information:

  • Express connections between concepts and representations.
  • Construct possible arguments based on evidence.
  • Perform decision-making between two actions.
  • Practice evaluating information and sources.
  • Perform investigations to gather data or determine if a program or method is appropriate.
  • Discern relevant, meaningful data from irrelevant or extraneous information.
  • Understand the characteristics and criteria determining whether data is relevant to a specific problem or task.
Clarifications:

Teachers who encourage students to differentiate between useable data and miscellaneous information:

  • Support students as they validate conclusions by comparing them to the given situation.
  • Create opportunities for students to discuss their thinking with peers.
SC.K12.CTR.7.1:

Solve real-life problems in science and engineering using computational thinking.
Students who solve real-life problems in science and engineering using computational thinking:

  • Adapt procedures to find solutions and apply them to a new context.
  • Look for similarities among problems.
  • Connect solutions of problems to more complicated large-scale situations.
  • Connect concepts to everyday experiences.
  • Use programs, models and methods to understand, represent and solve problems.
  • Indicate how various concepts can be applied to other disciplines.
  • Redesign programs, models and methods to improve accuracy or efficiency. Evaluate results based on the given context.
Clarifications:

Teachers who encourage students to solve real-life problems in science and engineering using computational thinking:

  • Create learning opportunities that require logical reasoning and problem-solving skills.
  • Provide opportunities for students to create plans and procedures to solve problems.
  • Provide opportunities for students to create programs or models, both concrete and abstract, and perform investigations.
  • Challenge students to question the accuracy of their programs, models and methods.
MA.K12.MTR.1.1: Actively participate in effortful learning both individually and collectively.  

Mathematicians who participate in effortful learning both individually and with others: 

  • Analyze the problem in a way that makes sense given the task. 
  • Ask questions that will help with solving the task. 
  • Build perseverance by modifying methods as needed while solving a challenging task. 
  • Stay engaged and maintain a positive mindset when working to solve tasks. 
  • Help and support each other when attempting a new method or approach.

 

Clarifications:
Teachers who encourage students to participate actively in effortful learning both individually and with others:
  • Cultivate a community of growth mindset learners. 
  • Foster perseverance in students by choosing tasks that are challenging. 
  • Develop students’ ability to analyze and problem solve. 
  • Recognize students’ effort when solving challenging problems.
MA.K12.MTR.2.1: Demonstrate understanding by representing problems in multiple ways.  

Mathematicians who demonstrate understanding by representing problems in multiple ways:  

  • Build understanding through modeling and using manipulatives.
  • Represent solutions to problems in multiple ways using objects, drawings, tables, graphs and equations.
  • Progress from modeling problems with objects and drawings to using algorithms and equations.
  • Express connections between concepts and representations.
  • Choose a representation based on the given context or purpose.
Clarifications:
Teachers who encourage students to demonstrate understanding by representing problems in multiple ways: 
  • Help students make connections between concepts and representations.
  • Provide opportunities for students to use manipulatives when investigating concepts.
  • Guide students from concrete to pictorial to abstract representations as understanding progresses.
  • Show students that various representations can have different purposes and can be useful in different situations. 
MA.K12.MTR.3.1: Complete tasks with mathematical fluency. 

Mathematicians who complete tasks with mathematical fluency:

  • Select efficient and appropriate methods for solving problems within the given context.
  • Maintain flexibility and accuracy while performing procedures and mental calculations.
  • Complete tasks accurately and with confidence.
  • Adapt procedures to apply them to a new context.
  • Use feedback to improve efficiency when performing calculations. 
Clarifications:
Teachers who encourage students to complete tasks with mathematical fluency:
  • Provide students with the flexibility to solve problems by selecting a procedure that allows them to solve efficiently and accurately.
  • Offer multiple opportunities for students to practice efficient and generalizable methods.
  • Provide opportunities for students to reflect on the method they used and determine if a more efficient method could have been used. 
MA.K12.MTR.4.1: Engage in discussions that reflect on the mathematical thinking of self and others. 

Mathematicians who engage in discussions that reflect on the mathematical thinking of self and others:

  • Communicate mathematical ideas, vocabulary and methods effectively.
  • Analyze the mathematical thinking of others.
  • Compare the efficiency of a method to those expressed by others.
  • Recognize errors and suggest how to correctly solve the task.
  • Justify results by explaining methods and processes.
  • Construct possible arguments based on evidence. 
Clarifications:
Teachers who encourage students to engage in discussions that reflect on the mathematical thinking of self and others:
  • Establish a culture in which students ask questions of the teacher and their peers, and error is an opportunity for learning.
  • Create opportunities for students to discuss their thinking with peers.
  • Select, sequence and present student work to advance and deepen understanding of correct and increasingly efficient methods.
  • Develop students’ ability to justify methods and compare their responses to the responses of their peers. 
MA.K12.MTR.5.1: Use patterns and structure to help understand and connect mathematical concepts. 

Mathematicians who use patterns and structure to help understand and connect mathematical concepts:

  • Focus on relevant details within a problem.
  • Create plans and procedures to logically order events, steps or ideas to solve problems.
  • Decompose a complex problem into manageable parts.
  • Relate previously learned concepts to new concepts.
  • Look for similarities among problems.
  • Connect solutions of problems to more complicated large-scale situations. 
Clarifications:
Teachers who encourage students to use patterns and structure to help understand and connect mathematical concepts:
  • Help students recognize the patterns in the world around them and connect these patterns to mathematical concepts.
  • Support students to develop generalizations based on the similarities found among problems.
  • Provide opportunities for students to create plans and procedures to solve problems.
  • Develop students’ ability to construct relationships between their current understanding and more sophisticated ways of thinking.
MA.K12.MTR.6.1: Assess the reasonableness of solutions. 

Mathematicians who assess the reasonableness of solutions: 

  • Estimate to discover possible solutions.
  • Use benchmark quantities to determine if a solution makes sense.
  • Check calculations when solving problems.
  • Verify possible solutions by explaining the methods used.
  • Evaluate results based on the given context. 
Clarifications:
Teachers who encourage students to assess the reasonableness of solutions:
  • Have students estimate or predict solutions prior to solving.
  • Prompt students to continually ask, “Does this solution make sense? How do you know?”
  • Reinforce that students check their work as they progress within and after a task.
  • Strengthen students’ ability to verify solutions through justifications. 
MA.K12.MTR.7.1: Apply mathematics to real-world contexts. 

Mathematicians who apply mathematics to real-world contexts:

  • Connect mathematical concepts to everyday experiences.
  • Use models and methods to understand, represent and solve problems.
  • Perform investigations to gather data or determine if a method is appropriate. • Redesign models and methods to improve accuracy or efficiency. 
Clarifications:
Teachers who encourage students to apply mathematics to real-world contexts:
  • Provide opportunities for students to create models, both concrete and abstract, and perform investigations.
  • Challenge students to question the accuracy of their models and methods.
  • Support students as they validate conclusions by comparing them to the given situation.
  • Indicate how various concepts can be applied to other disciplines.
ELA.K12.EE.1.1: Cite evidence to explain and justify reasoning.
Clarifications:
K-1 Students include textual evidence in their oral communication with guidance and support from adults. The evidence can consist of details from the text without naming the text. During 1st grade, students learn how to incorporate the evidence in their writing.

2-3 Students include relevant textual evidence in their written and oral communication. Students should name the text when they refer to it. In 3rd grade, students should use a combination of direct and indirect citations.

4-5 Students continue with previous skills and reference comments made by speakers and peers. Students cite texts that they’ve directly quoted, paraphrased, or used for information. When writing, students will use the form of citation dictated by the instructor or the style guide referenced by the instructor. 

6-8 Students continue with previous skills and use a style guide to create a proper citation.

9-12 Students continue with previous skills and should be aware of existing style guides and the ways in which they differ.

ELA.K12.EE.2.1: Read and comprehend grade-level complex texts proficiently.
Clarifications:
See Text Complexity for grade-level complexity bands and a text complexity rubric.
ELA.K12.EE.3.1: Make inferences to support comprehension.
Clarifications:
Students will make inferences before the words infer or inference are introduced. Kindergarten students will answer questions like “Why is the girl smiling?” or make predictions about what will happen based on the title page. Students will use the terms and apply them in 2nd grade and beyond.
ELA.K12.EE.4.1: Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
Clarifications:
In kindergarten, students learn to listen to one another respectfully.

In grades 1-2, students build upon these skills by justifying what they are thinking. For example: “I think ________ because _______.” The collaborative conversations are becoming academic conversations.

In grades 3-12, students engage in academic conversations discussing claims and justifying their reasoning, refining and applying skills. Students build on ideas, propel the conversation, and support claims and counterclaims with evidence.

ELA.K12.EE.5.1: Use the accepted rules governing a specific format to create quality work.
Clarifications:
Students will incorporate skills learned into work products to produce quality work. For students to incorporate these skills appropriately, they must receive instruction. A 3rd grade student creating a poster board display must have instruction in how to effectively present information to do quality work.
ELA.K12.EE.6.1: Use appropriate voice and tone when speaking or writing.
Clarifications:
In kindergarten and 1st grade, students learn the difference between formal and informal language. For example, the way we talk to our friends differs from the way we speak to adults. In 2nd grade and beyond, students practice appropriate social and academic language to discuss texts.
ELD.K12.ELL.MA.1: English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.



General Course Information and Notes

VERSION DESCRIPTION

Navigating Technology: Digital Literacy and Citizenship is a comprehensive year-long course for grades 6-8 that equips students with the foundational skills needed to thrive in a digital age. The courses focuses on essential aspects of digital literacy, including online safety, information literacy, ethical technology use, and digital communication. Students will explore the societal impact of technology and learn how to engage with digital tools responsibly and effectively.

Throughout the course, students will deveop confidence and responsibility in their digital interactions, learning to make informed decisions about their online activities and understanding the broader implications of their digital actions. By the end of this course, students will have gained a deep understanding of digital literacy and citizenship, enhanced their critical thinking and communication skills in digital environments, and fostered safe and responsible online behavior. The course also encourages creativity and collaboration, providing students with the tools to navigate and evaluate online content while understanding the importance of privacy, security, and ethical considerations in the digital world.


General Notes

This course should be taught using Florida’s State Academic Standards for Computer Science: Florida’s B.E.S.T. ELA Expectations (EE), Mathematical Thinking and Reasoning Standards (MTRs) and Computational Thinking and Reasoning Standards (CTRs) for students. Florida educators should intentionally embed these standards within the content and their instruction as applicable.

English Language Development ELD Standards Special Notes Section

Teachers are required to provide listening, speaking, reading and writing instruction that allows English language learners (ELL) to communicate information, ideas and concepts for academic success in the content area of Mathematics. For the given level of English language proficiency and with visual, graphic, or interactive support, students will interact with grade level words, expressions, sentences and discourse to process or produce language necessary for academic success. The ELD standard should specify a relevant content area concept or topic of study chosen by curriculum developers and teachers which maximizes an ELL’s need for communication and social skills. To access an ELL supporting document which delineates performance definitions and descriptors, please click on the following link: https://cpalmsmediaprod.blob.core.windows.net/uploads/docs/standards/eld/si.pdf.

Accommodations

Federal and state legislation requires the provision of accommodations for students with disabilities as identified on the secondary student's Individual Educational Plan (IEP) or 504 plan or postsecondary student's accommodations' plan to meet individual needs and ensure equal access.  Accommodations change the way the student is instructed.  Students with disabilities may need accommodations in such areas as instructional methods and materials, assignments and assessments, time demands and schedules, learning environment, assistive technology and special communication systems.  Documentation of the accommodations requested and provided should be maintained in a confidential file.

In addition to accommodations, some secondary students with disabilities (students with an IEP served in Exceptional Student Education (ESE) will need modifications to meet their needs.  Modifications change the outcomes and or what the student is expected to learn, e.g., modifying the curriculum of a secondary career and technical education course.


General Information

Course Number: 0200024 Course Path: Section: Grades PreK to 12 Education Courses > Grade Group: Grades 6 to 8 Education Courses > Subject: Computer Science > SubSubject: General >
Abbreviated Title: M/J NAV TECH
Course Attributes:
  • Florida Standards Course
Course Type: Elective Course Course Level: 2
Course Status: Course Approved



Educator Certifications

Computer Science (Elementary and Secondary Grades K-12)
Classical Education - Restricted (Elementary and Secondary Grades K-12)

Section 1012.55(5), F.S., authorizes the issuance of a classical education teaching certificate, upon the request of a classical school, to any applicant who fulfills the requirements of s. 1012.56(2)(a)-(f) and (11), F.S., and Rule 6A-4.004, F.A.C. Classical schools must meet the requirements outlined in s. 1012.55(5), F.S., and be listed in the FLDOE Master School ID database, to request a restricted classical education teaching certificate on behalf of an applicant.



Qualifications

As well as any certification requirements listed on the course description, the following qualifications may also be acceptable for the course:

Any field when certification reflects a bachelor or higher degree.


There are more than 1840 related instructional/educational resources available for this on CPALMS. Click on the following link to access them: https://www.cpalms.org/PreviewCourse/Preview/23343