M/J Introduction to Cybersecurity (#0200025) 


This document was generated on CPALMS - www.cpalms.org
You are not viewing the current course, please click the current year’s tab.

Course Standards


Name Description
SC.6.CC.1.1: Demonstrate an ability to communicate through various online tools.
SC.6.CO.1.1: Identify multiple file format types.
Clarifications:

Clarification 1: Within this benchmark, file types include formats for word processing, images, music and three-dimensional drawings.

Clarification 2: Instruction includes explaining why different file types exist.

SC.6.CO.1.2: Identify applications that have different desktop and online versions.
Clarifications:
Clarification 1: Instruction includes desktop versions and online subscription services.
SC.6.CO.1.3: Identify the differences between wired and wireless computer networks.
SC.6.CO.1.4: Describe how information is translated and communicated between computers and devices over a network.
Clarifications:
Clarification 1: Instruction focuses on both text and non-text information.
SC.6.CO.2.1: Identify and describe the major hardware components and functions of computer systems.
Clarifications:
Clarification 1: Major hardware components include motherboards, processors, hard drives, random access memory (RAM) and cooling fans.
SC.6.CO.3.2: Describe the main functions of an operating system.
Clarifications:
Clarification 1: Functions include user interface, input and output (IO), device management and task management.
SC.6.CO.3.3: Explain how an operating system provides user and system services.
Clarifications:
Clarification 1: Instruction includes discussing how an operating system manages the computer hardware and software.
SC.6.CO.3.4: Describe the major software components and functions of computer systems.
Clarifications:
Clarification 1: Major software components include operating system, application programs, graphics, firmware and others.
SC.6.CO.3.5: Evaluate various forms of input and output (IO) and peripheral devices.
Clarifications:
Clarification 1: Input and output and peripheral devices include monitor, mouse, printer, keyboard, headphone, speakers and microphone.
SC.6.CS.1.1: Define the states of data.
Clarifications:
Clarification 1: States of data include data at rest, data in motion and data in use.
SC.6.CS.1.2: Illustrate the concept of access control and how to limit access to authorized users.
SC.6.CS.1.3: Discuss the importance of cybersecurity.
SC.6.CS.1.4: Determine information that should remain confidential.
SC.6.CS.1.5: Identify the need for encryption.
SC.6.CS.1.6: Recognize the importance of digital identity.
SC.6.CS.2.1: Identify the need for security safeguards on personal devices.
SC.6.ET.1.2: Identify technology skills needed in the workplace.
SC.6.HS.1.1: Identify the connection between strong passwords and Internet safety.
SC.6.HS.1.3: Describe safe practices when participating in digital communication.
Clarifications:
Clarification 1: Instruction focuses on communications within discussion groups and blogs.
SC.6.HS.1.4: Evaluate a given website to determine if it is safe for users.
Clarifications:

Clarification 1: Instruction includes discussing the accuracy and security of given websites.

Clarification 2: Instruction includes types of personal information required for access and whether it is encrypted (https).

SC.6.HS.2.1: Define the online disinhibition effect.
SC.6.HS.2.2: List negative impacts of excessive device usage.
Clarifications:
Clarification 1: Instruction includes device addiction, online versus in-person personality traits, digital overload and others.
SC.6.HS.2.3: Implement the 20-20-20 rule for technology.
Clarifications:
Clarification 1: For instruction of this benchmark, the 20-20-20 rule is defined as for every 20 minutes of screen time, look at an object 20 feet away for 20 seconds.
SC.6.HS.3.1: Explore the impact that digital media and communication has on our behavior.
Clarifications:
Clarification 1: Instruction includes identifying impacts of computing, social networking and web technologies on an individual and society.
SC.6.PE.4.1: Recognize the phases of the software development life cycle.
SC.6.TI.1.1: Recognize the data content sources that make your digital footprint.
Clarifications:

Clarification 1: Instruction includes permanence of digital footprint.

Clarification 2: Within this benchmark, digital footprint includes digital profiles and other forms of personally identifiable information (PII).

SC.6.TI.2.1: Recognize the consequences of plagiarism on the development of creative works.
Clarifications:

Clarification 1: Creative works include projects, publications and online content.

Clarification 2: Instruction includes defining intellectual property.

SC.6.TI.2.2: Demonstrate compliance with the school’s Acceptable Use Policy.
SC.6.TI.2.3: Explain fair use for using copyrighted materials.
Clarifications:
Clarification 1: Copyrighted materials include images, music, video and text.
SC.6.TI.2.4: Generate citations for text and non-text sources using a digital tool.
SC.7.CO.1.1: Identify the kinds of content associated with different file types.
Clarifications:
Clarification 1: Within this benchmark, file types include .mp3’s association with audio, .mp4’s association with video and various file types associated with digital documents.
SC.7.CO.1.2: Differentiate between different file types.
Clarifications:
Clarification 1: Instruction includes researching different types of documents such as .docx, .pdf, .stl, .jpg and others.

Examples:
Example: Lukas is working on a resume to apply for a job at his local grocery store. The grocery store just adopted an all-digital application process. Identify what file type would be best for his virtual resume and why.
SC.7.CO.1.3: Describe the relationship between hardware and software.
Clarifications:
Clarification 1: Hardware and software including basic input/output systems (BIOS), operating systems and firmware.
SC.7.CO.1.6: Describe strategies for determining the reliability of resources or information on the Internet.
SC.7.CO.2.1: Explain the difference between wired, local area, wireless and mobile networks.
SC.7.CO.2.2: Identify and describe the function of the main internal parts of a basic computing device.
Clarifications:
Clarification 1: Instruction includes motherboard, hard drive, central processing unit (CPU), random access memory (RAM), graphics processing unit (GPU) and other components.
SC.7.CO.2.3: Explore devices that contain firmware.
Clarifications:
Clarification 1: Instruction includes defining firmware and exploring the importance of it.
SC.7.CO.3.1: Differentiate between desktop applications and software as a service (SaaS).
Clarifications:
Clarification 1: Instruction includes programs that have an online counterpart with varying functionality.
SC.7.CS.1.1: Describe data in its three states and potential threats to each state.
Clarifications:
Clarification 1: The three states of data are data in use, data at rest and data in motion.
SC.7.CS.1.2: Explain the concept of access control and how to limit access to authorized users.
Clarifications:
Clarification 1: Students should examine more advanced authentication and authorization methods, such as two-factor, multifactor and biometric.
SC.7.CS.1.3: Examine the basics of cybersecurity needs for business, government and organizations.
SC.7.CS.1.4: List and define the elements of the confidentiality, integrity and availability (CIA) triad.
SC.7.CS.1.5: Explain components of access control.
Clarifications:
Clarification 1: Components of access control include identification, authentication, authorization, accountability and non-repudiation.
SC.7.CS.1.6: Identify the characteristics of strong versus weak passwords in data and identity security.
SC.7.CS.1.7: Explain the proper use and operation of security technologies.
SC.7.CS.1.8: Identify actions that protect electronic devices.
Clarifications:
Clarification 1: Actions include protecting devices from viruses, intrusion, vandalism and other malicious activities.
SC.7.CS.2.1: Define the Internet of Things (IoT).
Clarifications:
Clarification 1: Instruction includes understanding that IoT is a network of devices, normally physical objects with sensors, that exchange information and data with one another and to computing systems.
SC.7.CS.3.1: Identify the types of cyberattacks.
SC.7.CS.3.2: Explore social engineering attacks.
SC.7.CS.3.3: Identify data vulnerabilities.
Clarifications:

Clarification 1: Instruction includes password strength (alphanumeric passwords), biometric access and two-factor authentication.

Clarification 2: Within this benchmark, encryptions include cryptography, Ceasar cypher, MD5 hashing and Vigenère cypher.

SC.7.ET.1.1: Investigate the latest technologies and the potential they have to improve our lives at home, work and in society.
SC.7.HS.1.1: Explain the possible consequences of cyberbullying.
Clarifications:
Clarification 1: Instruction includes the consequences that our society and schools might impose.
SC.7.HS.1.2: Discuss the impact of online disinhibition on individuals and society.
SC.7.HS.1.3: Interpret writings and communications using terminology.
SC.7.HS.1.4: Categorize potential dangers to an individual’s safety and security.
Clarifications:

Clarification 1: Instruction includes the use of email, chat rooms and other forms of direct electronic communication.

Clarification 2: Within this benchmark, dangers include predatory behavior and human trafficking on the Internet.


Examples:
Example: Create a graphic organizer to sort information security, network security and physical security into categories.
SC.7.HS.1.5: Recognize the importance of reporting suspicious behavior encountered on the Internet.
SC.7.HS.1.6: Compare the risks and benefits of accessing the Internet.
Clarifications:
Clarification 1: Instruction includes access to websites, web applications or software that does not protect against the disclosure, use or dissemination of an individual’s personal information.
SC.7.HS.1.7: Examine safe practices for technology use.
Clarifications:

Clarification 1: Instruction includes discussing personal information security.

Clarification 2: Instruction includes discussing personal safety when utilizing technology.

SC.7.HS.2.1: Identify the digital practices that may affect your physical and mental well- being.
SC.7.HS.3.1: Discuss how device usage can affect sleeping patterns.
SC.7.HS.3.2: Discuss the potential risks of device addiction and how to prevent it.
SC.7.HS.3.3: Explain the possible consequences of cyberbullying and inappropriate use of digital media and communication on personal life and society.
SC.7.PE.1.6: Develop problem solutions using a block programming language.
Clarifications:
Clarification 1: Block programming language includes looping behavior, conditional statements, expressions, variables and functions.
SC.7.PE.1.7: Create online content using advanced design tools.
Clarifications:
Clarification 1: Within this benchmark, online content includes webpages, digital portfolios and multimedia artifacts.
SC.7.PE.1.8: Identify different types of programming errors.
Clarifications:
Clarification 1: Types of programming errors include syntax, logical and runtime.
SC.7.PE.2.1: Predict outputs while showing an understanding of inputs.
SC.7.PE.4.1: Define the phases of the software development life cycle.
SC.7.TI.1.1: Discuss the ways that technology has increased the capacity for communication within a community.
SC.7.TI.1.2: Evaluate the responsible and irresponsible use of information on collaborative projects.
SC.7.TI.1.3: Identify how media is used to influence information.
SC.7.TI.2.1: Describe legal and ethical behaviors when using information and technology and describe the consequences of misuse.
SC.7.TI.2.2: Describe and model responsible use of modern communication media and devices.
Clarifications:
Clarification 1: Instruction includes discussion of personal information security.
SC.7.TI.2.3: Recognize the legal use of modern communication media and devices.
SC.7.TI.2.4: Explore the ethical use of collected data.
SC.7.TI.2.5: Explain how copyright law and licensing protect the owner of intellectual property.
SC.8.CC.2.1: Publish a digital product individually and collaboratively.
Clarifications:

Clarification 1: Instruction includes creating a product pertaining to the real- world, using a variety of digital tools and resources.

Clarification 2: Instruction includes publication of a digital product that provides value to society individually or collaboratively.

Clarification 3: Instruction includes reflecting on the individual and collaborative process.

SC.8.CO.2.1: Explain how to disassemble or reassemble a desktop computer.
SC.8.CO.2.2: Explore different hardware specifications and their impact on the performance of the computer.
Clarifications:
Clarification 1: Instruction includes multicore processing, refresh rates and their impact on operation.
SC.8.CO.2.3: Identify the major components of a network.
Clarifications:
Clarification 1: Within this benchmark, the components include connection, connecting point and other devices to communicate with.
SC.8.CS.1.1: Analyze threats and vulnerabilities to information security for individuals and organizations.
Clarifications:
Clarification 1: Threats and vulnerabilities such as malware, phishing, smishing and hacks.
SC.8.CS.1.2: Explain how authentication and authorization methods can protect users.
Clarifications:
Clarification 1: Students should examine more advanced authentication and authorization methods, such as two-factor, multifactor and biometric.
SC.8.CS.1.3: Describe defense in-depth strategies to protect simple networks.
Clarifications:
Clarification 1: Instruction includes layered strategies, such as firewalls, allow and block lists, changes to default passwords and access points.
SC.8.CS.1.4: Explain how malicious actions threaten network security.
Clarifications:
Clarification 1: Instruction includes malicious actions, such as social engineering, malware and hacks.
SC.8.CS.1.5: Explain how malicious actions threaten physical security.
SC.8.CS.1.6: Describe defense in depth and how physical access controls work together.
Clarifications:
Clarification 1: Instruction includes authentic and digital physical access controls, such as door locks, ID cards, PIN codes, bollards, lighting, fencing, cameras and guards.
SC.8.CS.1.7: Explore the process of protecting computer hardware from exploitation.
Clarifications:

Clarification 1: Instruction includes disabled or unused USB ports, windows lock screens and managed access to restricted areas.

Clarification 2: Instruction includes hardware, tablets, phones and other devices.

SC.8.CS.2.1: Evaluate security and privacy issues that relate to computer networks and Internet of Things (IoT) devices.
Clarifications:
Clarification 1: Devices include phones, tablets, smartwatches and other emerging technologies.
SC.8.CS.2.2: Describe security and privacy issues that relate to computer networks.
SC.8.CS.2.3: Describe the permanency of data on the Internet, online identity and personal privacy.
Clarifications:
Clarification 1: Instruction includes discussing the “Right to be Forgotten.”
SC.8.CS.3.1: Discuss ransomware attacks.
SC.8.CS.3.2: Discuss the necessity of immediate security updates of a program.
SC.8.CS.3.3: Identify the steps of the social engineering attack cycle.
SC.8.ET.1.1: Identify the emerging features of mobile devices, smart devices and vehicles.
SC.8.ET.1.4: Analyze the increasing impact of access to the Internet on daily life.
SC.8.HS.1.1: Describe the impacts of the presence of technology and the lack of technology on everyday life.
Clarifications:
Clarification 1: Instruction includes comparing how the presence of technology has impacted our daily lives and how the lack of technology has impacted our daily lives.
SC.8.HS.1.2: Develop procedures to protect personal information while accessing the Internet.
Clarifications:
Clarification 1: Instruction includes access to websites, web applications or software that does not protect against the disclosure, use or dissemination of an individual’s personal information.

Clarification 2: Instruction includes theft of personal data including social security numbers, banking information and identity.

SC.8.HS.2.1: Determine the association between hand-eye coordination and the use of digital devices.
SC.8.HS.2.2: Investigate the causes of headaches associated with digital device usage.
Clarifications:
Clarification 1: Within this benchmark, causes include but are not limited to poor posture, dehydration, blue light and eye strain.
SC.8.HS.2.3: Investigate the causes of physical body changes due to device usage.
Clarifications:
Clarification 1: Focal points include research on muscle, nervous and bone systems.

Clarification 2: Instruction is limited to the physical effects of direct digital device usage.

SC.8.HS.2.4: Identify the effects on cognitive function as a result of technology use.
SC.8.HS.3.1: Discuss how regulating the use of digital media and communication is important for mental and physical well-being.
SC.8.HS.3.2: Analyze how digital media and communication influence behavior.
Clarifications:
Clarification 1: Instruction includes the influences on individuals, communities and cultures.
SC.8.PE.4.1: Explore the purpose of the software development life cycle.
SC.8.PE.4.2: Explain the phases of a simple software development life cycle.
Clarifications:
Clarification 1: Instruction includes the following phases: describe the project, list necessary steps, take resources into consideration, create a visual representation, actualize the code then perform maintenance for needed changes.
SC.8.PE.4.3: Discuss the role of maintenance in the software development cycle.
Clarifications:
Clarification 1: Instruction includes the outcome of changing, modifying and improving the project to meet the user’s needs.
SC.8.TI.1.2: Describe the influence of access-to-information technologies over time.
Clarifications:

Clarification 1: Instruction includes the effects of information technology on the workplace, education and global society.

Clarification 2: Instruction includes the historical impact.

SC.8.TI.2.2: Use a local or federal government website to engage with a public official.
SC.8.TI.2.3: Compare various technology-related career paths.
SC.K12.CTR.1.1: Actively participate in effortful learning both individually and collaboratively. 
Students who actively participate in effortful learning both individually and with others:
  • Build perseverance by modifying methods as needed while solving a challenging task.
  • Stay engaged and maintain a positive mindset when working to solve tasks.
  • Help and support each other when attempting a new method or approach.
Clarifications:
Teachers who encourage students to participate actively in effortful learning both individually and with others:
  • Cultivate a community of learners.
  • Foster perseverance in students by choosing challenging tasks.
  • Recognize students’ effort when solving challenging problems.
  • Emphasize project-based learning.
  • Establish a culture in which students ask questions of the teacher and their peers, and errors as a learning opportunity.
  • Develop students’ ability to justify methods and compare their responses to the responses of their peers.
SC.K12.CTR.2.1: Demonstrate understanding by decomposing a problem.
Students who demonstrate understanding by decomposing a problem:
  • Analyze the problems in a way that makes sense given the task.
  • Ask questions that will help with solving the task.
  • Break down complex problems into individual problems.
  • Decompose a complex problem into manageable parts.
Clarifications:

Teachers who encourage students to demonstrate understanding by decomposing a problem:

  • Develop students’ ability to analyze and problem-solve.
  • Help students break complex tasks into subtasks.
  • Show students that the solution to individual parts allows them to solve complex problems more effectively.
SC.K12.CTR.3.1:

Complete tasks with digital fluency.
Students who complete tasks with digital fluency:Select and use appropriate digital tools by their functions.

  • Demonstrate proper typing techniques and keyboarding skills.
  • Understand responsible technology use.
  • Use feedback to improve efficiency using digital tools.
  • Relate previously learned concepts to new concepts.
  • Solve problems by developing, testing and refining technological processes.
Clarifications:

Teachers who encourage students to complete tasks with digital fluency:

  • Provide students with opportunities to increase critical thinking skills.
  • Provide students with opportunities to use various technology hardware and software, so that technology is an integral part of the learning experience. Develop students’ ability to construct relationships between their current understanding and more sophisticated ways of thinking.
SC.K12.CTR.4.1:

Express solutions as computational steps.
Students who express solutions as computational steps:

  • Solve problems step by step rather than all at once.
  • Represent solutions to problems in multiple ways, based on context or purpose.
  • Use patterns and structures to understand and connect computational concepts.
  • Check computations when solving problems.
Clarifications:

Teachers who encourage students to express solutions as computational steps:

  • Provide opportunities for students to develop sequentially based understandings of problems. 
  • Guide students to align tasks to a step-by-step solution.
  • Select sequence and present student work to advance and deepen understanding of correct and increasingly efficient methods.
  • Prompt students to continually ask, “Does this solution make sense? How do you know?”
  • Reinforce that students check their work as they progress within and after a task.
  • Strengthen students’ ability to verify solutions through justification.
SC.K12.CTR.5.1:

Create an algorithm to achieve a given goal.
Students who create algorithms to achieve a given goal:

  • Create or use a well-defined series of steps to achieve a desired outcome.
  • Compare the efficiency of an algorithm to those expressed by others.
  • Design a sequence of steps to follow.
  • Verify possible solutions by explaining the program or methods used.
Clarifications:

Teachers who encourage students to create an algorithm to achieve a given goal:

  • Support students to develop generalizations based on the similarities found among problems.
  • Have students estimate or predict solutions before solving.
  • Help students recognize the patterns in the world around them and connect these patterns to other concepts.
SC.K12.CTR.6.1:

Differentiate between usable data and miscellaneous information.
Students who differentiate between usable data and miscellaneous information:

  • Express connections between concepts and representations.
  • Construct possible arguments based on evidence.
  • Perform decision-making between two actions.
  • Practice evaluating information and sources.
  • Perform investigations to gather data or determine if a program or method is appropriate.
  • Discern relevant, meaningful data from irrelevant or extraneous information.
  • Understand the characteristics and criteria determining whether data is relevant to a specific problem or task.
Clarifications:

Teachers who encourage students to differentiate between useable data and miscellaneous information:

  • Support students as they validate conclusions by comparing them to the given situation.
  • Create opportunities for students to discuss their thinking with peers.
SC.K12.CTR.7.1:

Solve real-life problems in science and engineering using computational thinking.
Students who solve real-life problems in science and engineering using computational thinking:

  • Adapt procedures to find solutions and apply them to a new context.
  • Look for similarities among problems.
  • Connect solutions of problems to more complicated large-scale situations.
  • Connect concepts to everyday experiences.
  • Use programs, models and methods to understand, represent and solve problems.
  • Indicate how various concepts can be applied to other disciplines.
  • Redesign programs, models and methods to improve accuracy or efficiency. Evaluate results based on the given context.
Clarifications:

Teachers who encourage students to solve real-life problems in science and engineering using computational thinking:

  • Create learning opportunities that require logical reasoning and problem-solving skills.
  • Provide opportunities for students to create plans and procedures to solve problems.
  • Provide opportunities for students to create programs or models, both concrete and abstract, and perform investigations.
  • Challenge students to question the accuracy of their programs, models and methods.
MA.K12.MTR.1.1: Actively participate in effortful learning both individually and collectively.  

Mathematicians who participate in effortful learning both individually and with others: 

  • Analyze the problem in a way that makes sense given the task. 
  • Ask questions that will help with solving the task. 
  • Build perseverance by modifying methods as needed while solving a challenging task. 
  • Stay engaged and maintain a positive mindset when working to solve tasks. 
  • Help and support each other when attempting a new method or approach.

 

Clarifications:
Teachers who encourage students to participate actively in effortful learning both individually and with others:
  • Cultivate a community of growth mindset learners. 
  • Foster perseverance in students by choosing tasks that are challenging. 
  • Develop students’ ability to analyze and problem solve. 
  • Recognize students’ effort when solving challenging problems.
MA.K12.MTR.2.1: Demonstrate understanding by representing problems in multiple ways.  

Mathematicians who demonstrate understanding by representing problems in multiple ways:  

  • Build understanding through modeling and using manipulatives.
  • Represent solutions to problems in multiple ways using objects, drawings, tables, graphs and equations.
  • Progress from modeling problems with objects and drawings to using algorithms and equations.
  • Express connections between concepts and representations.
  • Choose a representation based on the given context or purpose.
Clarifications:
Teachers who encourage students to demonstrate understanding by representing problems in multiple ways: 
  • Help students make connections between concepts and representations.
  • Provide opportunities for students to use manipulatives when investigating concepts.
  • Guide students from concrete to pictorial to abstract representations as understanding progresses.
  • Show students that various representations can have different purposes and can be useful in different situations. 
MA.K12.MTR.3.1: Complete tasks with mathematical fluency. 

Mathematicians who complete tasks with mathematical fluency:

  • Select efficient and appropriate methods for solving problems within the given context.
  • Maintain flexibility and accuracy while performing procedures and mental calculations.
  • Complete tasks accurately and with confidence.
  • Adapt procedures to apply them to a new context.
  • Use feedback to improve efficiency when performing calculations. 
Clarifications:
Teachers who encourage students to complete tasks with mathematical fluency:
  • Provide students with the flexibility to solve problems by selecting a procedure that allows them to solve efficiently and accurately.
  • Offer multiple opportunities for students to practice efficient and generalizable methods.
  • Provide opportunities for students to reflect on the method they used and determine if a more efficient method could have been used. 
MA.K12.MTR.4.1: Engage in discussions that reflect on the mathematical thinking of self and others. 

Mathematicians who engage in discussions that reflect on the mathematical thinking of self and others:

  • Communicate mathematical ideas, vocabulary and methods effectively.
  • Analyze the mathematical thinking of others.
  • Compare the efficiency of a method to those expressed by others.
  • Recognize errors and suggest how to correctly solve the task.
  • Justify results by explaining methods and processes.
  • Construct possible arguments based on evidence. 
Clarifications:
Teachers who encourage students to engage in discussions that reflect on the mathematical thinking of self and others:
  • Establish a culture in which students ask questions of the teacher and their peers, and error is an opportunity for learning.
  • Create opportunities for students to discuss their thinking with peers.
  • Select, sequence and present student work to advance and deepen understanding of correct and increasingly efficient methods.
  • Develop students’ ability to justify methods and compare their responses to the responses of their peers. 
MA.K12.MTR.5.1: Use patterns and structure to help understand and connect mathematical concepts. 

Mathematicians who use patterns and structure to help understand and connect mathematical concepts:

  • Focus on relevant details within a problem.
  • Create plans and procedures to logically order events, steps or ideas to solve problems.
  • Decompose a complex problem into manageable parts.
  • Relate previously learned concepts to new concepts.
  • Look for similarities among problems.
  • Connect solutions of problems to more complicated large-scale situations. 
Clarifications:
Teachers who encourage students to use patterns and structure to help understand and connect mathematical concepts:
  • Help students recognize the patterns in the world around them and connect these patterns to mathematical concepts.
  • Support students to develop generalizations based on the similarities found among problems.
  • Provide opportunities for students to create plans and procedures to solve problems.
  • Develop students’ ability to construct relationships between their current understanding and more sophisticated ways of thinking.
MA.K12.MTR.6.1: Assess the reasonableness of solutions. 

Mathematicians who assess the reasonableness of solutions: 

  • Estimate to discover possible solutions.
  • Use benchmark quantities to determine if a solution makes sense.
  • Check calculations when solving problems.
  • Verify possible solutions by explaining the methods used.
  • Evaluate results based on the given context. 
Clarifications:
Teachers who encourage students to assess the reasonableness of solutions:
  • Have students estimate or predict solutions prior to solving.
  • Prompt students to continually ask, “Does this solution make sense? How do you know?”
  • Reinforce that students check their work as they progress within and after a task.
  • Strengthen students’ ability to verify solutions through justifications. 
MA.K12.MTR.7.1: Apply mathematics to real-world contexts. 

Mathematicians who apply mathematics to real-world contexts:

  • Connect mathematical concepts to everyday experiences.
  • Use models and methods to understand, represent and solve problems.
  • Perform investigations to gather data or determine if a method is appropriate. • Redesign models and methods to improve accuracy or efficiency. 
Clarifications:
Teachers who encourage students to apply mathematics to real-world contexts:
  • Provide opportunities for students to create models, both concrete and abstract, and perform investigations.
  • Challenge students to question the accuracy of their models and methods.
  • Support students as they validate conclusions by comparing them to the given situation.
  • Indicate how various concepts can be applied to other disciplines.
ELA.K12.EE.1.1: Cite evidence to explain and justify reasoning.
Clarifications:
K-1 Students include textual evidence in their oral communication with guidance and support from adults. The evidence can consist of details from the text without naming the text. During 1st grade, students learn how to incorporate the evidence in their writing.

2-3 Students include relevant textual evidence in their written and oral communication. Students should name the text when they refer to it. In 3rd grade, students should use a combination of direct and indirect citations.

4-5 Students continue with previous skills and reference comments made by speakers and peers. Students cite texts that they’ve directly quoted, paraphrased, or used for information. When writing, students will use the form of citation dictated by the instructor or the style guide referenced by the instructor. 

6-8 Students continue with previous skills and use a style guide to create a proper citation.

9-12 Students continue with previous skills and should be aware of existing style guides and the ways in which they differ.

ELA.K12.EE.2.1: Read and comprehend grade-level complex texts proficiently.
Clarifications:
See Text Complexity for grade-level complexity bands and a text complexity rubric.
ELA.K12.EE.3.1: Make inferences to support comprehension.
Clarifications:
Students will make inferences before the words infer or inference are introduced. Kindergarten students will answer questions like “Why is the girl smiling?” or make predictions about what will happen based on the title page. Students will use the terms and apply them in 2nd grade and beyond.
ELA.K12.EE.4.1: Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
Clarifications:
In kindergarten, students learn to listen to one another respectfully.

In grades 1-2, students build upon these skills by justifying what they are thinking. For example: “I think ________ because _______.” The collaborative conversations are becoming academic conversations.

In grades 3-12, students engage in academic conversations discussing claims and justifying their reasoning, refining and applying skills. Students build on ideas, propel the conversation, and support claims and counterclaims with evidence.

ELA.K12.EE.5.1: Use the accepted rules governing a specific format to create quality work.
Clarifications:
Students will incorporate skills learned into work products to produce quality work. For students to incorporate these skills appropriately, they must receive instruction. A 3rd grade student creating a poster board display must have instruction in how to effectively present information to do quality work.
ELA.K12.EE.6.1: Use appropriate voice and tone when speaking or writing.
Clarifications:
In kindergarten and 1st grade, students learn the difference between formal and informal language. For example, the way we talk to our friends differs from the way we speak to adults. In 2nd grade and beyond, students practice appropriate social and academic language to discuss texts.
ELD.K12.ELL.MA.1: English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.



General Course Information and Notes

VERSION DESCRIPTION

This course will introduce students to the field of computer science, specifically the study of the many aspects of computing and networking systems and the rules, guidelines, and laws that affect their use in education, business, and everyday life.

In Grades 6-8, Introduction to Cybersecurity - Computer Science, instructional time will focus on areas such as computer hardware and software, wired and wireless networking, computing languages, internet and online safety, copyright and digital footprint, and career exploration.


General Notes

This course should be taught using Florida’s State Academic Standards for Computer Science: Florida’s B.E.S.T. ELA Expectations (EE), Mathematical Thinking and Reasoning Standards (MTRs) and Computational Thinking and Reasoning Standards (CTRs) for students. Florida educators should intentionally embed these standards within the content and their instruction as applicable.

English Language Development ELD Standards Special Notes Section

Teachers are required to provide listening, speaking, reading and writing instruction that allows English language learners (ELL) to communicate information, ideas and concepts for academic success in the content area of Mathematics. For the given level of English language proficiency and with visual, graphic, or interactive support, students will interact with grade level words, expressions, sentences and discourse to process or produce language necessary for academic success. The ELD standard should specify a relevant content area concept or topic of study chosen by curriculum developers and teachers which maximizes an ELL’s need for communication and social skills. To access an ELL supporting document which delineates performance definitions and descriptors, please click on the following link: https://cpalmsmediaprod.blob.core.windows.net/uploads/docs/standards/eld/si.pdf.

Accommodations

Federal and state legislation requires the provision of accommodations for students with disabilities as identified on the secondary student's Individual Educational Plan (IEP) or 504 plan or postsecondary student's accommodations' plan to meet individual needs and ensure equal access.  Accommodations change the way the student is instructed.  Students with disabilities may need accommodations in such areas as instructional methods and materials, assignments and assessments, time demands and schedules, learning environment, assistive technology and special communication systems.  Documentation of the accommodations requested and provided should be maintained in a confidential file.

In addition to accommodations, some secondary students with disabilities (students with an IEP served in Exceptional Student Education (ESE) will need modifications to meet their needs.  Modifications change the outcomes and or what the student is expected to learn, e.g., modifying the curriculum of a secondary career and technical education course.


General Information

Course Number: 0200025 Course Path: Section: Grades PreK to 12 Education Courses > Grade Group: Grades 6 to 8 Education Courses > Subject: Computer Science > SubSubject: General >
Abbreviated Title: M/J INTRO CYBERSEC
Course Attributes:
  • Florida Standards Course
Course Type: Elective Course Course Level: 2
Course Status: Course Approved



Educator Certifications

Computer Science (Elementary and Secondary Grades K-12)
Classical Education - Restricted (Elementary and Secondary Grades K-12)

Section 1012.55(5), F.S., authorizes the issuance of a classical education teaching certificate, upon the request of a classical school, to any applicant who fulfills the requirements of s. 1012.56(2)(a)-(f) and (11), F.S., and Rule 6A-4.004, F.A.C. Classical schools must meet the requirements outlined in s. 1012.55(5), F.S., and be listed in the FLDOE Master School ID database, to request a restricted classical education teaching certificate on behalf of an applicant.



Qualifications

As well as any certification requirements listed on the course description, the following qualifications may also be acceptable for the course:

Any field when certification reflects a bachelor or higher degree.


There are more than 1840 related instructional/educational resources available for this on CPALMS. Click on the following link to access them: https://www.cpalms.org/PreviewCourse/Preview/23344