UAE CST Framework PDF
UAE CST Framework PDF
UAE CST Framework PDF
MINISTRY OF EDUCATION
Ministry of Education
P. O. Box 3962
Dubai
United Arab Emirates
+971 (4) 263 - 3333
www.moe.gov.ae
UAE K-12 Computer Science and
Technology Standards
Table of Contents
Executive Summary
Document Revision Sheet
UAE Schools Computer Science and Technology Standards
1.0 Introduction
2.0 Development of this Document
2.1 Relation of this Standards document to Other International Standards
2.2 New Changes in this document
2.3 Overview of Grade Spans
2.4 Skills/Knowledge Acquisition
3.0 General Outcomes and Expectations of Grade Spans
3.1 Grades K through 5
3.2 Grades 6 through 9
3.3 Grades 10 through 12
3.4 Grades 10 through 12 (Advanced)
4.0 Domains and Generic Outcomes
5.0 Standards Development Methodology
6.0 Guidelines for Teachers
6.2 Teaching and learning strategies
6.3 Learning Environments and Resources
6.4 Professional knowledge and Skills
7. Scope - and - Sequence — Domains, Strands and Standards by Cycle
Domain 1: Digital literacy and Competence (DLC)
Definition
Generic Outcomes
Strands Description and Technical Keywords
Percentage of outcomes as per level of difficulty and percentage wise
Allocated Periods distribution per cycle
Strands Evolution Per Grade
Integration between DLC domain and other domains
Scope and Sequence: Domains, Strands and Standards by Grade
Student Performance Criteria
Sample Activities
Domain 2: Computational Thinking (CT)
Definition
Generic Outcomes
Strands Description and Technical Keywords
Strands Distribution Per Grade
Allocated Periods Per Cycle
Student Learning Outcomes Per Grade
Domain Evolution: Strands and Standards by Grade
Integration of CT domain with other domains
Scope and Sequence: Domain, Strands and Standards by Grade
Performance Standards by grade
Sample Activities
2
Domain 3: Computer Practice and Programming ( CPP)
Definition
Generic Outcomes
Strands Description and Common Technical Keywords
Strands Distribution Per Grade
Student Learning Outcomes distribution per Grade
Domain Strands distribution per cycle / Pie Chart
Percentage of outcomes as per level of difficulty and percentage
Estimated Periods distribution per cycle
Domains Strands Evolution Per Grade
Intersection between CPP domain and other domains
Scope and Sequence: Domains, Strands and Standards by Grade
Performance standards of CPP domain per grade
Sample Activities
Domain 4: Cyber Security, Cyber Safety, and Cyber Ethics (CCC)
Definition:
Generic Outcomes
Domain Strands Descriptions and common Technical Keywords
Strands Distribution Per Grade
Table: Horizontal Distribution of the Domain’s strands coverage across school grades.
Allocated Periods Per Cycle
Learning Outcomes Difficulty Level per Grade
Domain Evolution: Strands and Standards by Grade
Integration between CCC domain and other domains
Standards and Student Learning Outcomes by Grade
Standards and Student Learning Outcomes by Grade
CCC Domain Performance standards by grade
Sample Activities
Sample Activities with different format
CST standards Sample Implementation Scenario
CST K - 12 Scaffolding charts per domain
DLC Scaffolding Chart
CT Scaffolding Chart
CCC Scaffolding Chart
CPP Scaffolding Chart
Computer Science and Technology Integration into Other Curricula
Gaining Technology Skills While Learning the Content of the Core Curriculum
Intersections between this document and Math Document
Examples of Integrated Learning Scenarios for CST standards
Integrated Learning Scenario #1
Integrated Learning Scenario #2
Integrated Learning Scenario #3
Integrated Learning Scenario #4
Integrated Learning Scenario #5
Integrated Learning Scenario #6
List of Software Requirements:
General Guidelines for Book Authors (CT)
Guidelines for book Authors (DLC Domain)
Guidelines for Book Authors (CPP Domain)
Guidelines for Book Authors (CCC Domain)
References:
Books and Articles:
Useful Sites
Acknowledgments
3
MOE K - 12 Computer Science and Technology Standards
Executive Summary Many reports around the world state that failure to teach Computer Science and associated
technologies in the Digital Age will be disastrous. Moreover, the current state of computer science
The new global economy has a education in many countries is unacceptable at a time when computing is driving job growth and
great potential to shift economic new scientific discovery. While some countries are requiring a computer science course for high
school students just as they require math or biology, high school computer science education (as it
power on a massive level resulting would be) in many countries does not exist. As such, the lack of engagement with issues relating to
in a new and growing digital computer science education is shortsighted and potentially disastrous.
divide in the world. Over the past
This document provides comprehensive standards and performance criteria for K - 12 computer
few decades, computers have science and technology education designed to strengthen computer science fluency and
transformed both the world competency throughout primary and secondary Schools in UAE. It is written in response to the
pressing need to provide academic coherence between coursework and the rapid growth of
and the workforce in many computing and technology in the modern world, alongside the need for educated students that
profound ways. As a result, can not only utilize the technology but also build it effectively for the most benefit of UAE society.
computer science and associated These standards provide a three - level difficulty framework for computer science and technology
technologies now lie at the heart for K - 12 aimed at grade spans K - 5, 6 - 9, 10 - 12, and advanced 10 - 12, respectively. We expect
that the learning outcomes in Level 1 can be addressed in the context of other academic subjects
of economy and the way we live in the K - 5 grade span.. The learning outcomes in Level 2 and Level 3 need to be addressed through
our lives. To be well - educated discrete computer science and technology courses and utilizing subject matter experts. These
and productive citizens in a learning standards will serve as a catalyst for widespread adoption of computer science education
for all K - 12 students. We encourage you to read this document and then to take part in the
computing - intensive world and effort to implement these standards in a way that benefits both you and the K - 12 education
to be prepared for careers in community.
the 21st century, our students The standards are divided into four major and separate domains: Digital Literacy and Competence,
must have a clear understanding Computational Thinking, Computer Practice and Programming, and Cyber Security/Safety/
ethics. The standards provide learning content that should be mastered by all students; whether
of the principles and practices they are college - bound or not. Many follow - up efforts are still needed, however, to sustain the
of computer science and momentum these standards generate. Teacher training, curriculum innovation, teaching resources,
and dissemination are but a few of these challenges.
technologies. No other subject It is recognized that a set of standards is only the first foundational step in meeting our goals. These
will open as many doors in the standards must— and will be — accompanied by curriculum materials, aligned assessments and
21st century as computer science, professional development to ensure that the vision captured in them becomes a reality in every
classroom in the UAE.
regardless of a student’s ultimate
field of study or occupation. These standards are not made in a vacuum. We understand the constraints under which schools
are operating and the UAE MOE other educational priorities. Thus, we conclude this report with
a series of recommendations that are intended to provide support for a long - term evolution of
computer science and technology in K - 12 schools.
4
Document Revision Sheet
Document name: MOE Computer Science and Technology Standards
Rev 2
Rev 3
Rev 4
Rev 5
5
UAE Schools Computer Science and
Technology Standards
1.0 Introduction
This publication is designed to help today’s students take advantage of the power of technology. It provides a set of guidelines for schools, describing
what students should know and be able to do in order to use technology effectively for learning and be prepared for university/college education.
These guidelines represent realistic, attainable activities that link to the content standards of the Ministry of Education (MOE) Frameworks.
All over the world, there has been a vigorous debate about what should be done about information and communication technology (ICT) and
computer science in the school curriculum. Most universities want to reverse the decline in applicants for computer science courses/programs. Many
Gaming companies want more programmers. The UAE government wants more high - tech start - ups, while Manufacturers want trainees who can
design embedded systems. What’s missing from all this is a big vision? Instead of educating children about the most revolutionary technology of their
young lifetimes, we have focused on training them to use obsolescent software products. The reason we did this because we fell into what is called
a “category mistake” - an error in which things of one kind are presented as if they belonged to another. We made the mistake of thinking that learning
about computing is like learning to drive a car, and since knowledge of internal combustion technology is not essential for becoming a proficient driver,
it followed that an understanding of how computers work was not important for our children. What we forgot was that cars don’t run the world,
monitor our communications, power our mobile phones, manage our bank accounts, keep our diaries, mediate our social relationships, snoop on our
social activities and even - in some countries - count our votes. But networked computers do all of these things, and a lot more besides.
It is time for a dramatic change in ICT and computer science schooling education! The biggest justification for change is not economic but moral. Our
children live in a world that is shaped by physics, chemistry, biology and history, and so we - rightly - want them to understand these things. But their
world will be also shaped and configured by networked computing and if they don’t have a deeper understanding of this stuff then they will effectively
be intellectually crippled. They will grow up as passive consumers of closed devices and services, leading lives that are increasingly circumscribed by
technologies created by elites working for huge corporations such as Google, Facebook and the like.
So, what is exactly missing in the current curricula? The school children need a set of key concepts that is essential to understand the networked world
in which they are growing up. They need to appreciate that computer science field involves a new way of thinking about problem - solving: it’s called
computational thinking, and it’s about understanding the difference between human and artificial intelligence, as well as about thinking recursively,
being alert to the need for prevention, detection and protection against risks, using abstraction and decomposition when tackling large tasks, and
deploying heuristic reasoning, iteration and search to discover solutions to complex problems.
As such, the key topics include algorithms (the mathematical recipes that make up programs); cryptography (how confidential information is
protected on the net); machine intelligence (how services such as YouTube, Google and Amazon predict your preferences); computational biology
(how the genetic code works); search (how we find needles in a billion haystacks); recursion (a method where the solution to a problem depends on
solutions to smaller instances of the same problem); and heuristics (experience - based techniques for problem - solving, learning, and discovery) are
becoming essential ingredients in todays’ school curricula.
The UAE Schools Computing Standards and Expectations (UAE - CSE) incorporate the Information and Communication Technology (ICT) Literacy
skills developed and based on well - known international standards that includes: (a) Partnership for 21st Century Skills; (b) the National Educational
Technology Standards for Students (NETS - S) developed by the International Society for Technology in Education (ISTE); and (c) Computer Science
Teacher Association (CSTA) from Association for Computing Machinery (ACM) organization.
The Computer Science and Technology Standards 2015 fall into four broad categories/domains (as shown in Fig 1 below):
1. Digital Literacy and Competence: Demonstrate proficiency in the use of computers and applications, as well as an understanding of the concepts
underlying hardware, software, operation, and connectivity, communication, productivity, and collaboration.
2. Computational Thinking: Demonstrate the ability to use technology for research, critical thinking, problem solving, decision making, data
representation, creativity, and innovation that is vital in the 21st century. Computational thinking also consists of some very specific problem solving
skills such as the ability to think logically, algorithmically and recursively.
3. Computer Practice and Programming: Demonstrate the ability to write computer code for problem solving, accomplish certain tasks, and decision
making, and have the opportunity to progress to the next level of excellence in these activities.
6
4. Cyber Security, Safety, and Ethics: Demonstrate the responsible use of technology and an understanding of ethics and safety issues in using electronic
media at home, in school, and in society.
7
2.0 Development of this Document
In October 2008, the UAE MOE published the UAE MOE Recommended ICT Standards to define what UAE MOE K - 12 students should know and be
able to do in order to use technology for learning. Since then, continuing technological advances have led to new opportunities, new challenges, and
new risks. As a result, the MOE has called for a comprehensive update on the original document to include the knowledge and skills that students are
likely to need now and in the future.
Another reason is the rise of the worldwide accepted standards - based teaching. The adoption of Standards in Teaching and Learning contributes
significantly to economic development and social well - being in developed and developing countries. Evidence worldwide suggests that system wide
educational improvement has been a significant contributing factor to economic development to many countries (e.g., USA, UK, Singapore, Australia,
etc.). These countries have developed and implemented clear, coherent, demanding, and publicly disseminated student learning standards that
demonstrated consistently high levels of educational performance on international assessments. These findings confirm that implementing rigorous
student learning standards leads to high achievement.
During the last quarter of 2014, UAE MOE conducted student and teacher surveys after which MOE reported the number of students who have met
the technology standards of 2008 as part of the Collection of Education Data. The results showed that students and teachers felt there is a great gap
between advances in the computer science and technology field around the world and current deliverables of the standards developed in 2008.
In October 2014, the UAE MOE Leadership brought together a group of educators from higher education, K - 12 school departments, and educational
organizations to help the Ministry review and update the original document. The working group reviewed, compared, and evaluated a number of
national and local standards documents in order to ensure that the UAE MOE standards would be as comprehensive as possible. The group first looked
at the 2008 UAE MOE standards, which were based on those published in 1998 by the National Educational Technology Standards (NETS) Project1.
Next the group examined standards from other countries. The group also studied the newly updated standards developed by the Computer Science
Teacher Association (CSTA) of ACM organization. A draft of the revised UAE MOE Computing Standards was developed in October 2014.
In February 2015, the Ministry shared the draft of the updated standards with a small number of business representatives from the UAE MOE
Technology Leadership Partners inside UAE. In addition, educators across the country had an opportunity to review and comment on the anticipated
new standards draft at roundtable discussion meeting in October 2014. Educators also submitted additional comments and suggestions to the Ministry
using electronic feedback forms and e - mail. The UAE MOE Curriculum Department has incorporated these recommendations into this current
version.
a. International Society for Technology in Education (ISTE) (formerly known as the NETS) standards, Ministry has incorporated the new NETS
standards into the 2015 Standards. The ISTE Standards are the standards for learning, teaching and leading in the digital age and are widely
recognized and adopted worldwide. The family of ISTE Standards work together to transform education. The goal of the ISTE - NETS Project is to
develop national standards for educational technology. The framework for the Refreshed ISTE NETS includes the following standards:
b. Computer Science Teachers Association: The Computer Science Teachers association, working under the auspices of ACM, has been organized
to serve as a focal point for addressing several serious issues in K - 12 computer science education. The CSTA goal is to promote the importance
of teaching computer science during the K - 12 schooling. CSTA sets forth the computer science knowledge and skills that students must have—
at all stages of their learning—to enable them to thrive in this new global information economy. They defined a core set of learning standards
designed to provide the foundation for a complete computer science curriculum and its implementation at the K - 12 level. The Organization of
the Learning Outcomes was divided into three Levels corresponding to three grade spans and Five Strands as shown in Fig. 2. The five strands are:
computational thinking; collaboration; computing practice; computers and communication devices; and community, global, and ethical impacts.
1 NETS is an initiative of the International Society for Technology in Education (ISTE) and the U.S. Department of Education.
8
Fig.2 : CSTA standards breakdown
c. 21st Century Skills: The updated version of the UAE MOE K - 12 Technology Literacy Standards also incorporates the recommendations of the
Partnership for 21st Century Skills. The Partnership’s Framework for 21st Century Learning includes six key elements/standards:
1. Core subjects as identified by the No Child Left behind Act.
2. 21st century content that includes global awareness; financial, economic, business and entrepreneurial literacy; civic literacy; and health and
wellness awareness.
3. Learning and thinking skills that include Computational thinking/critical thinking and problem solving, communication skills, creativity and
innovation skills, collaboration skills, contextual learning skills, and information and media literacy skills.
4. Information and communications technology (ICT) literacy, enabling students to learn, think critically, solve problems, use information,
communicate, innovate, and collaborate.
5. Life skills that include leadership, ethics, accountability, personal productivity, personal responsibility, people skills, self - direction, and social
responsibility.
6. 21st century assessments that measure the core subjects, 21st century content, learning and thinking skills, ICT literacy, and life skills. The use
of modern technologies in assessment is recommended to “increase efficiency and timeliness.”
In this document, the MoE incorporated the all of previously mentioned standards into the four domains of the new UAE Ministry of Education
Computer Science and Technology Standards as follows:
UAE K - 12 Computer
Corresponding CSTA Corresponding Corresponding
Science and Technology
Standards ISTE 21st Century Skills
Standards
1. There is a stronger balance between procedures (i.e., how to solve problems), concepts (i.e., why the procedures make sense), and applications (i.e.,
9
when do these procedures and concepts get used).
2. The document splits content areas into major domains and is organized by strands that cross a set of grades and define coherent progressions
of computer science and technology understanding that incorporate developmental readiness, identify prerequisite understanding and reduce
duplication.
• There are fewer student learning outcomes (SLOs) for many grades to allow more time to focus in depth on the important computing for that
grade especially in higher grades (qualitative vs. Quantitative).
• The core 10 - 12 program is fully specified, and then supplemented by standards for additional Grade 10, 11 and Grade 12 advanced computer
science and technology course offerings.
3. The new standards reflect world - class expectations as the development process drew from the existing UAE ICT 2008 standards, and the K - 12
standards from ISTE, CSTA, and 21st century skills along with associated student Assessment.
4. The new standards focus on fundamental concepts with the following general goals:
a) The curriculum should prepare students to understand the nature of computer science with its technologies and its place in the modern world.
b) Students should understand that computer science interweaves concepts and skills.
c) Students should be able to use computer science skills (especially computational thinking) in their problem - solving activities in other subjects.
It is worth mentioning that in order to accommodate the needs of high school students and teachers better, this publication lists technology skills for
all high school years. Teachers should integrate the appropriate and advanced technology skills into their courses to help their students learn those
subject areas and/or prepare for future careers.
In this publication, specific technology skills are listed collectively for each grade span and then individually for each grade. Although these proficiency
expectations are recommended by the Ministry, local school management can make their own decisions about their students’ technology proficiency.
Local decisions should be based on the accessibility and availability of technology, as well as the developmental readiness of an educational district’s
students. Overall, the Ministry will work with various schools to provide a minimum unified CST technology curriculum that satisfy a minimum set of
schools across all the country.
Currently, UAE adopts the notion of dividing the grade span into three spans, or so called cycles, each consists of number of grades in addition to K
grades in a separate cycle. Based on the developmental readiness of the students and age factors, this document groups the technology skills in three
grade spans as per Ministry of Education definition (see Fig. 3):
Cycle 1: Grades K - 5
Cycle 2: Grades 6 - 9
Cycle 3: Grades 10 - 12 (Grades 10 - 12 Advanced)
The ministry decides also to introduce the notion of advanced program for talented students in the last cycle. In this document we refer to this cycle as
Advanced Grades (G10A, G11A, G12A).
10
2.4 Skills/Knowledge Acquisition
Students can acquire the skills/knowledge enumerated in this document in a variety of ways:
• Everyday classroom activities (gaining technology skills while learning the content of the curriculum).
• Specific course work (e.g., taking a Web design course)
• Independent study (e.g., supporting a specific project)
• An after - school activity (e.g., publishing a school newsletter)
• Peer tutoring (e.g., a high school student coaching a middle school student)
• Work at home (Assuming all homes are equipped with necessary technology tools. In fact, many surveys indicate a much higher presence of
computers in the homes of low income and limited English proficient families than many educators presume; such surveys at the classroom and
school level can be instructive.)
The teaching of technology literacy skills should not be separate from the curriculum. Integrating the appropriate use of technology into the
curriculum should enhance the learning of the content. The examples of certain scenarios on Page 353 are a good demonstration of how a school
provides students the technology skills they need, not as a discrete subject, but as “flowing through the curriculum.”
In this document, we focus on educational/instructional technology as well as relevant computer science and/or technology/engineering standards.
11
3.0 General Outcomes and Expectations of Grade Spans
The following summarizes the generic outcomes of the new standards document as per each grade span:
In summary, when students enter the tenth grade, they should be able to use technology to learn and enhance their understanding of academic
subjects and the world around them. Technology should be incorporated into their everyday learning activities, both inside and outside the classroom.
12
By the completion of high school, students should have developed an appreciation for the capabilities and capacities of technology, as well as an
understanding of how these tools can be used for lifelong learning. In addition, students should be knowledgeable about the role technology plays in
various fields of work, enabling them to better plan for their careers in the 21st century.
In high school, students will master legal, ethical, security, and safety issues concerning the use of all electronic resources. They should be able to
address various types of malicious software and rules and regulations governing misuse of all technology resources.
By the completion of high school, students should have developed an appreciation for the capabilities and capacities of technology, as well as an
understanding of how these tools can be used for lifelong learning. In addition, students should be knowledgeable about the role technology plays in
various fields of work, enabling them to better plan for their careers in the 21st century.
13
4.0 Domains and Generic Outcomes
The 2015 Computer Science and Technology Standards have identified the following major domains and strands as the backbone for the new
curriculum and related activities.
Digital Literacy and Competence (DLC)
Students demonstrate a sound understanding of technology concepts, systems, and operations. Students will:
a) understand and use technology systems.
b) apply digital tools, media, and environment to gather, evaluate, use, communicate and work collaboratively.
c) evaluate, select, and use information sources and digital tools based on the appropriateness to specific tasks
effectively and productively.
d) process data and report results.
e) interact, collaborate, and publish with peers or project teams.
f) communicate information and ideas effectively using a variety of media and formats.
g) troubleshoot systems and applications.
h) transfer current knowledge to learning of new technologies.
Students use critical thinking skills to plan and conduct research, manage projects, solve problems, and make informed
decisions using appropriate digital tools and resources. Students will:
a) identify and define authentic problems and significant questions for investigation.
b) plan and manage activities to develop a solution or complete a project.
c) collect and analyze data to identify solutions and/or make informed decisions.
d) use multiple processes and diverse perspectives to explore alternative solutions.
e) apply existing knowledge to generate new ideas, products, or processes.
f) identify trends and forecast possibilities.
g) demonstrate creative thinking, construct knowledge, and develop innovative products.
h) use predefined methods to divide a complex problem into simpler parts.
i) explain how sequence, selection, iteration, and recursion are building blocks of algorithms.
j) discuss the value of abstraction to manage problem complexity.
Students understand, analyze, write, test, and document computer programs that model behavior and theories. Students
will:
a) describe a software development process used to solve problems (e.g., design, coding, testing, verification).
b) use appropriate software tools and libraries to help solve algorithmic and computational problems.
c) understand the broad array of programming languages and tools across other fields and disciplines.
d) design, develop, publish, and present products (e.g., webpages, mobile applications, animations) using technology
resources.
e) demonstrate an understanding of algorithms and their practical application.
f) implement problem solutions using a programming language, including: looping behavior, conditional statements,
logic, expressions, variables, and functions.
g) collect and analyze data that is output from multiple runs of a computer program.
Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior.
Students will:
a) advocate and practice safe, legal, and responsible use of information and technology.
b) exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity.
c) demonstrate personal responsibility for lifelong learning.
d) exhibit leadership for digital citizenship.
e) locate, organize, analyze, evaluate, synthesize, and ethically use information from a variety of sources and media.
f) develop cultural understanding and global awareness by engaging with learners of other cultures.
g) demonstrate good practices in personal information security, using passwords, encryption, and secure transactions.
14
5.0 Standards Development Methodology
The process by which these standards were developed began with agreement that high - quality teaching and learning standards systematically
organize content in a given subject area—in this case, Computer Science and Technology—into domains and strands, and then into standards and
SLOs that specify, on a grade - by - grade basis, exactly what specific Mathematics should be taught and learned. The table below (Table 1) shows the
K - 12 domains and the grade band strands within which grade level standards and SLOs were developed. The four domains were further broken down
into several strands that span across all grades as shown below:
1. Computer Operation 1. Algorithmic thinking 1. Programming Evolution 1. Responsible Use & Cyber -
2. Productivity Tools 2. Evaluation 2. Human Computer Interaction Security
3. Internet surfing and 3. Decomposition (HCI) 2. Impacts of Technology
information retrieval 4. Abstraction 3. Data Representation 3. Information accuracy &
4. Collaboration tools 5. Generalization 4. Coding reliability
5. Computer Networking. 5. Testing and Validation 4. Cyber Ethics & Laws
6. Documentation and 5. Cyber Safety
Deployment
The development of the document followed the below structure and as depicted in the hierarchical figure shown below (See Fig. 3).
Subject
is the curriculum area of interest and the first level of analysis in the structure of standards.
Domains
are the major elements of a subject. In the UAE, CST has four domains
(see Table 1). Domains run through the entire K - 12 system.
Strands
are the key topics that domains consist of. All of the strands for each domain are shown in Table 1. In CST, strands cover a
number of grades but rarely run through the entire K - 12 system.
Standards
are the broad target objectives within each strand and are grade specific.
15
The below figure (Fig. 4) lists key content areas per domain:
Human Computer
Operating System Algorithm Components Impacts of Technology
Interface
Block Based
Software Application Abstraction Cyber Ethics & Laws
Programming
Generalization Documentation
Computational Thinking
Data Representation
Applications
Functional Correctness
16
The major part of this document will list all expected student learning outcomes (SLOs) per domain per cycle.
The below table (Table 2) summarizes the quantitative analysis of the SLOs for all grades/cycles per domain and their associated percentages:
17
DLC CT CPP CCC DLC CT CPP CCC
Domain
18.6 Distribution:
4.65 2.1 4.65 30 12.4 5.2 7.75 4.65 30
Cycle 1 Cycle 2
16% 16%
7% 41%
26%
16% 62%
17%
DLC DLCCT CT CPP CPP CCC CCC DLC DLCCT CT CPP CPP CCC CCC
9.3 15.5 27.9 9.3 62 13.95 32.55 32.55 13.95 93
Cycle 3 Cycle 3A
25%
35% 35%
45%
18
6.0 Guidelines for Teachers
In this section, we present general guidelines for teachers who are going to implement the essence of this standards document. To streamline the
presentation, the guidelines will be presented in four general categories:
19
7.0 Scope - and - Sequence — Domains, Strands and Standards by Cycle
The following sections provide a narrative holistic summary of the key aspects of the four domains, strands, and standards for each grade along with
performance criteria.
20
Collaboration
Productivity
Operation
Communication
Internet
21
22
Domain 1: Digital literacy and
Competence (DLC)
Definition
Digital Literacy is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring
both cognitive and technical skills.
There are eight essential elements of digital literacy. These elements are cultural, cognitive, constructive, communicative, confidence, creative, critical
and civic. The cultural element requires the ability to use technology in different contexts. Whereas, the cognitive component enables mastery of
technological tools, software, and platforms. Also, one of the most important elements of digital literacy is the ability to reuse, remix existing resources
to create and share new data digitally with others depending on emerging needs, while using different communication devices with proficiency to
communicate.
Gaining competence with digital technologies will create confidence and suitable environment to support self - learning. Students/learners will be
part of online communities where they can share knowledge and content. Furthermore, It is providing a place for creativity where learners become
able to create new products using their searching and constructing skills. and use their critical skills to develop various perspectives and take different
circumstances into account.
Generic Outcomes
KG - G5 (cycle 1)
At the end of cycle one, the students will be able to identify the basic components of a personal computer. They will safely and correctly perform
basic operations involving a personal computer. They will launch and use specified software to create and edit word document, presentation and
spreadsheet and introduce basic keyboarding skills.
G6 - G9 (cycle 2)
At the end of cycle two, the students will be able to explain the computer organization and compare computer performances; They will Create
animated stories using multimedia tools. They will perform effective search methods on the web. They will practice collaboration activities using age
appropriate tools and sites and Exhibit abilities in technical writing and enhanced computer skills.
23
Strands Description and Technical Keywords
In this strand, students will develop their Knowledge, skills and behaviors to Computer hardware - computer
utilize computers and related technology efficiently. They will use a range software - computer uses -
1 Computer Operation of skills covering different levels from basic to advance on how computers Computer organization - Input
work and operate. They will be able to solve common hardware and software and output devices - Storage
problems. devices - operating systems.
In this strand, students will understand and use different productivity tools. Microsoft Paint - Microsoft
During K - 9 students will explore and use the most common productivity Word - Microsoft PowerPoint
software application used in business, education and home. They will learn - Microsoft Excel - Publisher -
how to create word processing documents, spreadsheets, databases and Photoshop - Microsoft Database
2 Productivity Tools multimedia products. - Adobe Flash - Dreamweaver -
At Secondary level, they will understand advance concepts and technology of Sony Vegas
different media. They will be able to select appropriate application to develop
storyboard, animation, website, video and audio projects to solve a real
problem and communicate the wider community.
In this strand, students will know how to connect to the Inernet, browse Internet Components - different
different websites and customize browsers. They will be able to control their types of Internet connections -
privacy and security while serving the net. search engine
Internet Surfing and
3 They will be introduced to different search options and strategies to find
Information Retrieval
appropriate information to suit the requested task. They will be able to make
informed choices of search sites, search tools, precise keywords that yield the
best results and reliable resources.
In this strand, students will examine new technologies, devices, online tools Mobile apps - groupware -
and strategies to communicate effectively over a network. They will use interactive website - video
Inernet and online resources to collaboratively select and interact together conference - Bulletin boards
4 Collaboration Tools while working on school tasks or projects. - discussion forums - web
conferencing - wiki - blog -
version control - online web tools
- IDEs
From secondary level, students will start to examine networking concepts in Network Devices - Network
more depth. They will develop their knowledge and practical application skills service - Inernet protocols -
Computer in networking. They will focus on hardware and software components and use network cables - Networks
5
Networking them to connect and manage networks while understanding security network operating systems
issues. They also, study how networks affected individual life, organization
systems and Teams’ collaborative works.
Productivity Tools
competence
Collaboration Tools
Computer Networking
Table 3: DLC Domain Strands Distribution across all grades
24
Student Learning Outcomes distribution Per Grade
Cycle 1 Cycle 2 Cycle 3 Cycle 3A
Domains Strand
KG1 KG2 G1 G2 G3 G4 G5 G6 G7 G8 G9 G10 G11 G12 G10A G11A G12A
Computer Operation 4 4 8 4 5 4 6 35 2 2 1 1 6 0 0 0 0 0 0 0 0
Digital literacy and competence
Productivity Tools 1 1 2 2 3 5 7 21 5 3 3 5 15 2 2 2 6 2 3 2 7
Collaboration Tools 0 0 0 0 0 0 4 4 3 2 1 1 7 3 3 2 8 3 3 2 8
computer networking 0 0 0 0 0 0 0 0 0 0 0 0 0 3 3 3 9 3 3 4 10
Computer Productivity Internet Collaboratio Computer Computer Productivity Internet Collaboratio Computer
Operation Tools Surfing and n Tools Networking Operation Tools Surfing and n Tools Networking
Total Information 79 38 Information 23 25
Retrieval Retrieval
Table 4: Quantitative Analysis of DLC domain SLOs per Grade
44 27 24 5 0 100 16 40 26 18 0 100
26%
Computer Productivity Internet Collaboratio Computer Computer Productivity Internet Collaboratio 40%
Computer
Operation Tools Surfing and
Information 27%
n Tools Networking Operation Tools Surfing and
Information
n Tools Networking
Retrieval Retrieval
0 26 0 35 39 100 0 28 0 32 40 100
26% 28%
39% 40%
35% 32%
25
Percentage of outcomes as per level of difficulty and percentage wise
No of outcomes Outcomes Percentage
1 2 3 Sum 1 2 3
G1 6 6 0 12 50% 50% 0%
G2 5 3 0 8 63% 38% 0%
G3 4 8 0 12 33% 67% 0%
G4 2 10 0 12 17% 83% 0%
G5 9 10 1 20 45% 50% 5%
G8 0 5 2 7 0% 71% 29%
G9 0 8 2 10 0% 80% 20%
C1 C2 C3 C3A Total
DLC
18.6 12.4 9.3 14 54.3
26
Strands Evolution Per Grade
Domain Strand Grade 1 Grade 2 Grade 3 Grade 4 Grade 5
• Understand the • Identify the • Identify types of • Identify the • Identify the
pervasiveness of function of computers, how they function of function of
computers and computer hardware process information computer hardware computer hardware
Computer Operation
• Demonstrate the • Demonstrate the • Demonstrate the • Demonstrate the • Demonstrate the
ability to use tools ability to use tools ability to use tools ability to use tools ability to use tools
in drawing programs in drawing programs in word processing in word processing in word processing
to communicate and to communicate and programs to programs to programs to
Digital literacy and competence
exchange ideas exchange ideas communicate and communicate and communicate and
Productivity Tools
• Access and use the • Access and use the • Student should be • Student should be • Understanding the
Information Retrieval
Internet Surfing and
World Wide Web World Wide Web to able to use various able to use various meaning of network
to browse a specific browse a website web browser features web browser features and their features.
website • Use the search engine • Use technologies to • Perform basic
to locate information locate, collect and searches to locate
• Use the search engine organize information information, using
to locate information techniques to refine
and limit such
searches
• Communicate
Collaboration Tools
27
Domain Strand Grade 6 Grade 7 Grade 8 Grade 9
• Use different features of • Apply strategies for • Apply strategies for • Apply strategies for
Computer
Operation
computer operating system identifying simple hardware identifying and solving identifying and solving
and software problems that routine hardware problems routine hardware problems
may occur during use that occur during everyday that occur during everyday
computer use computer use
• Select appropriate software • Design spreadsheet for given • Demonstrate the ability to • Compose digital artworks
to develop a multimedia task and use it to make use desktop publishing tools to achieve effective
presentation for a specific predictions. in to communicate and communication
Productivity Tools
use tools in word processing to achieve effective tools to access, organize and
programs to communicate communication using present information
and exchange ideas graphics tools
• Design spreadsheet for given
task and use it to make
predictions
• Use technology tools for • Apply specific criteria to • Apply specific criteria to • Apply specific criteria to
and Information
Internet Surfing
effective searching and evaluate information from a evaluate information from a evaluate information from a
Retrieval
multimedia tools and develop, publish and present develop, publish and present develop, publish and present
peripherals to group products using technology products using technology products using technology
Tools
collaboration and support resources that demonstrate resources that demonstrate resources that demonstrate
learning throughout the and communicate and communicate and communicate
curriculum curriculum concept curriculum concept curriculum concept
• Produce different types of multimedia • Produce different types of multimedia • Produce different types of multimedia
Productivity Tools
projects using a variety of applications projects using a variety of applications projects using a variety of applications
to communicate the wider community to communicate the wider community to communicate the wider community
Digital literacy and competence
• Plan and implement a collaborative • Plan and implement a collaborative • Plan and implement a collaborative
Information Retrieval
Internet Surfing and
project using effective communication project using effective communication project using effective communication
tools tools tools
Computer Networking
• Demonstrate understanding of • Describe types of networks,topologies, • Describe key services and protocols
key components and functions of access methods and network models of local and wide area network
computer networks technologies.
28
Integration between DLC domain and other domains
DLC CCC CT CPP
29
30
Scope and Sequence
Domains, Strands and Standards by Grade
31
32
Grade: KG1
(1.1.2) (KG1.1.1.2.1) 2
Develop understanding of major Demonstrate starting, and shutting
windows desktop components down a computer
(KG1.1.1.2.2) 2
1.
Use the desktop icons to open a
Digital literacy
program
and competence
(1.2) (1.2.1) (KG1.1.2.1.1) 2
Productivity Demonstrate the ability to use Draw simple shapes using
Tools tools in drawing programs to appropriate tools or software
communicate and exchange
ideas
Grade: KG2
(1.1.2) (KG2.1.1.2.1) 2
Develop understanding of major Demonstrate rebooting, Log on and
windows desktop components log out procedure
(KG2.1.1.2.2) 2
1.
Use the desktop icons to open an
Digital literacy
application
and competence
(1.2) (1.2.1) (KG2.1.2.1.1) 2
Productivity Demonstrate the ability to use Draw simple shapes using
Tools tools in drawing programs to appropriate tools or software
communicate and exchange
ideas
33
Grade: 1
(G1.1.1.2.2) 1
Identify elements of windows
desktop
(G1.1.1.2.3) 2
Manipulate windows using basic
functions
(1.1.3) (G1.1.1.3.1) 1
Understand the pervasiveness Describe the importance of
of computers and computing in computers in today’s world
daily life
(G1.1.1.3.2) 1
Identify the main parts of a computer
(G1.1.1.3.3) 1
List different type of computer based
on size, use and application
(1.1.4) (G1.1.1.4.1) 1
Expand student’s typing ability Classify types of basic keys on the
and promote the correct keyboard
keyboarding position
(G1.1.1.4.2) 2
Apply basic keyboarding techniques
34
Grade: 2
(1.1.5) (G2.1.1.5.1) 1
Identify the function of Identify the input and output devices
computer hardware components
(1.1.6) (G2.1.1.6.1) 2
Utilize basic OS user interface Use the OS start menu and taskbar
elements
(G2.1.3.1.3) 2
Navigate different web site using
basic functions
35
Grade: 3
(G3.1.1.4.2) 2
Promote accuracy and speed of
typing
(1.1.7) (G3.1.1.7.1) 2
Utilize Intermediate OS user Manipulate desktop folders and icons
interface elements
(1.1.8) (G3.1.1.8.1) 1
Identify types of computers, Identify main processing components
how they process information of a computer
and how individual computers
interact with other computing (G3.1.1.8.2) 1
systems and device Describe the flow of information
between storage devices to the
microprocessor and RAM in relation
to everyday computer operations
(1.2.5) (G3.1.2.5.1) 2
Use a presentation tools to Create a simple presentation
communicate and exchange
ideas
(1.3.3) (G3.1.3.3.1) 1
Use the search engine to locate Define search engines
information
(G3.1.3.3.2) 2
Find specific information on a web
site
36
Grade: 4
(G4.1.1.4.2) 2
Promote Accuracy and speed of
typing
(1.1.5) (G4.1.1.5.1) 1
Identify the function of Identify the types of storage devices
computer hardware components
(1.1.9) (G4.1.1.9.1) 2
Manipulate and control the Mange files using the windows
windows desktop files and disks explorer / file manager
(1.2.4) (G4.1.2.4.1) 2
Use a media tools to Create a simple movie
communicate among classes or
groups within a class
(1.2.8) (G4.1.2.8.1) 2
Demonstrate the ability to Insert objects
use tools in word processing
programs to communicate and (G4.1.2.8.2) 2
exchange ideas Modify documents
(1.3.4) (G4.1.3.4.1) 2
Use technologies to locate, Search the Internet for information
collect and organize information based on specified keywords
37
Grade: 5
(1.1.5) (G5.1.1.5.1) 1
Identify the function of Describe how hardware and software
computer hardware components interact
(G5.1.1.5.2) 1
Define simple terms and concepts
related to the software development
process
(G5.1.1.5.3) 1
Identify issues related to software
upgrades
(1.1.10) (G5.1.1.10.1) 1
1. Use various operating system Identify different control panel
Digital literacy features. settings
and competence (1.2) (1.2.5) (G5.1.2.5.1) 2
Productivity Use a presentation tools to Modify a slide layout.
Tools communicate among classes or
groups within a class (G5.1.2.5.2) 2
Add animation and transitions to
slides and objects
(1.2.6) (G5.1.2.6.1) 1
Demonstrate the ability to use Define the spreadsheet
tools in spreadsheet programs
to communicate and exchange (G5.1.2.6.2) 2
ideas Create simple spreadsheet
(G5.1.2.6.3) 2
Write formulas using arithmetic
operators
(1.2.8) (G5.1.2.8.1) 2
Demonstrate the ability to Use Text and Language Tools
use tools in word processing
programs to communicate and (G5.1.2.8.2) 2
exchange ideas Insert advanced objects
38
Grade: 5
(1.3.6) (G5.1.3.6.1) 2
Perform basic searches to locate Develop the basic techniques to find
information, using techniques to specific file format
refine and limit such searches
1.
Digital literacy (1.4) (1.4.1) (G5.1.4.1.1) 1
and competence Collaboration Communicate with other using Identify the features of online
Tools appropriate technology including communications
email
(G5.1.4.1.2) 1
Apply communication tools (email)
(1.4.2) (G5.1.4.2.1) 1
Communicate and collaborate Identify social network
with others using social network
(G5.1.4.2.2) 3
Classify the features of online social
networks
39
Grade: 6
(G6.1.1.11.2) 1
Identify how to change system
settings, install and remove software
(1.2.8) (G6.1.2.8.1) 3
Demonstrate the ability to Perform common editing and
use tools in word processing formatting functions in word
programs to communicate and processing
exchange ideas
(G6.1.2.8.2) 2
Insert, edit and format tables in a
document
(1.2.9) (G6.1.2.9.1) 2
Design spreadsheet for given task Modify worksheet data and structure
1. and use it to make predictions
Digital literacy (G6.1.2.9.2) 2
and competence Add and modify charts in a
worksheet
(G6.1.3.7.3) 2
Searching a Specific Web Site (Using
Directories Using Portal Sites)
(G6.1.4.3.3) 2
Interact with peers employing a
variety of digital environments and
media
40
Grade: 7
1. (G7.1.2.9.2) 3
Digital literacy Analyze data using appropriate tools
and competence
(1.3) (1.3.8) (G7.1.3.8.1) 2
Internet Surfing Apply specific criteria to evaluate Differentiate between Search Tools
and Information information from a range of
Retrieval sources (G7.1.3.8.2) 2
Search for information using advance
strategies
41
Grade: 8
(1.2.11) (G8.1.2.11.1) 2
Compose digital artwork to Create digital artwork
achieve effective communication
1. using graphics tools (G8.1.2.11.2) 2
Digital literacy Operate a wide range of program
and competence tools
42
Grade: 9
(G9.1.2.12.2) 2
Demonstrate a range of techniques
to produce high quality results
(1.2.13) (G9.1.2.13.1) 2
Select and implement Build a database with related tables
appropriate procedure and tools
to access, organize and present (G9.1.2.13.2) 2
information Query a database using different
1. methods
Digital literacy
and competence (G9.1.2.13.3) 2
Design forms and reports
(G9.1.3.8.3) 2
Process data and report results
43
Grade: 10
(G10.1.4.5.2) 3
Investigate methods of using
1. communications in commerce,
Digital literacy education, home and government
and competence (G10.1.4.5.3) 1
Discuss the advantages and
disadvantages of different
communication tools which used to
collaborate with peers
(G10.1.5.1.2) 1
Describe key functions of network OS
(G10.1.5.1.3) 3
Compare and contrast client - server
and peer-to-peer network strategies
44
Grade: 10A
(G10A.1.4.5.2) 3
Investigate methods of using
communications in commerce,
1. education, home and government
Digital literacy
and competence (G10A.1.4.5.3) 3
Justify the advantage and
disadvantage of different
communication tools which used to
collaborate with peers
(G10A.1.5.1.2) 3
Compare and contrast client - server
and peer-to-peer network strategies
(G10A.1.5.1.3) 2
Use suitable hardware, cables and
software to connect and operate a
network
45
Grade: 11
(G11.1.4.5.2) 3
Evaluate selected communication
1. strategies and online tools based on
Digital literacy specific criteria
and competence
(G11.1.4.5.3) 2
Select appropriate online
communication tools to collaborate
with peers, community members,
and field experts
(G11.1.5.2.3) 1
Discuss common network models
46
Grade: 11A
(G11A.1.3.14.3) 3
Evaluate aspects of design and
development of a multi - platform
international implementation
(G11A.1.4.5.3) 2
Select appropriate online
communication tools to collaborate
with peers, community members,
and field experts
(G11A.1.5.2.3) 3
Examine parts of OSI and TCP/IP
network models
47
Grade: 12
1. (G12.1.4.5.2) 2
Digital literacy Select appropriate tool to
and competence collaboratively develop a software
product
(G12.1.5.3.3) 2
Use appropriate network operating
system to setup and manage small
network
48
Grade: 12A
(G12A.1.4.5.2) 2
Use one project collaboration
1. tools, version control systems,
Digital literacy and integrated development
and competence environments (IDEs ) while working
on a collaborative software project
(G12A.1.5.3.3) 2
Use appropriate software to operate
and manage small network
(1.5.4) (G12A.1.5.4.1) 3
Identify career options in Research career options related to
network technologies networking
49
50
Student Performance Criteria
51
52
KG1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• draw shapes using • draw shapes using • draw shapes using • draw shapes using
Productivity Tools drawing tools with a lot of drawing tools with some drawing tools with little drawing tools
assistance. assistance. assistance. independently.
Internet and • define Internet with many • define Internet with few • define Internet with few • define Internet and open
errors and open a website errors and open a website errors and open a website a website independently.
Information Search with a lot of assistance. with some assistance. with little assistance.
KG2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• draw shapes using • draw shapes using • draw shapes using • draw shapes using
Productivity Tools drawing tools with a lot of drawing tools with some drawing tools with little drawing tools
assistance. assistance. assistance. independently.
Internet and • define Internet with many • define Internet with few • define Internet with few • define Internet and open
errors and open a website errors and open a website errors and open a website a website independently.
Information Search with a lot of assistance. with some assistance. with little assistance.
53
Grade 1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• identify 1 - 2 main parts • identify 2 - 4 main parts • identify 2 - 4 main parts • identify main parts of
of computer, sort types of computer, sort types of computer, sort types computer, sort types
of computer based on of computer based on of computer based on of computer based on
size, power and purpose, size, power and purpose, size, power and purpose, size, power and purpose,
elements of windows elements of windows elements of windows elements of windows
desktop and manipulate desktop and manipulate desktop and manipulate desktop and manipulate
windows with a lot of windows with some a windows with little a windows independently.
Computer Operation assistance. assistance. assistance. • define types of keys on
• define 1 - 2 types of keys • define 3 - 4 types of keys • define types of keys on the keyboard and keeps
on the keyboard and on the keyboard and the keyboard and keep fingers on the home row
rarely keeps fingers on hardly keep fingers on fingers on the home row keys while typing with
the home row keys while the home row keys while keys while typing with curved hands and proper
typing. typing. curved hands and proper wrist position almost the
wrist position most of the entire time.
time.
• draw pictures using • draw pictures using • draw pictures and • draw and edit pictures
shapes tools only. different tools and enter entering text using using different tools and
Productivity Tools simple text with some different tools. easily work with text.
assistance.
Internet and • define Internet with many • define Internet with few • define Internet with few • define Internet and open
errors and open a website errors and open a website errors and open a website a website independently.
Information Search with a lot of assistance. with some assistance. with little assistance.
Grade 2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• name and sort 0 - 2 parts • name and sort 3 - 5 parts • name and sort 5 - 7 parts • name and categorize 5 - 7
of input and output of input and output of input and output parts of input and output
devices and use OS devices and use OS devices and use OS devices and use OS start
start menu with a lot of start menu with some start menu with little menu independently.
assistance. assistance. assistance. • define types of keys on
• define 1 - 2 types of keys • define 3 - 4 types of keys • define types of keys on the keyboard and keeps
Computer Operation on the keyboard and on the keyboard and the keyboard and keep fingers on the home row
rarely keeps fingers on hardly keep fingers on fingers on the home row keys while typing with
the home row keys while the home row keys while keys while typing with curved hands and proper
typing. typing. curved hands and proper wrist position almost the
wrist position most of the entire time.
time.
• draw pictures using • draw pictures using • draw pictures using • draw and edit pictures
Productivity Tools drawing tools only with a different tools and menus different tools and menus using different tools and
lot of assistance. with some assistance. with little assistance. menus independently.
54
Grade 3
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• name and show 0 - 2 • name and show 3 - 5 • name and show all parts • name and show all parts
parts of main processing parts of main processing of main processing of main processing
components and components and components and components and
manipulate folders manipulate folders manipulate folders and manipulate folders and
and icons with a lot of and icons with some icons with little assistance. icons independently.
Computer Operation assistance. assistance. • keep fingers on the home • keep fingers on the home
• rarely keep fingers on • keep fingers on the home row keys while typing row keys while typing
the home row keys while row keys while typing with curved hands and with curved hands and
typing with curved hands with curved hands and proper wrist position proper wrist position
and proper wrist position. proper wrist position most of the time. almost the entire time.
about half the time.
• type and create • change size, color and • change size, color and • change the size, color and
document using the look of the text in a look of the text in a look of the text to make
letter, number, space bar document with some document with little their document more
and enter keys assistance. assistance. interesting.
Productivity Tools • create simple • create 2 - 3 slides in • create 3 - 5 slides in • create 5 - 7 slides in
presentation contain presentation contain only presentation contain text presentation contain text,
text only with a lot of text. and pictures. pictures and shapes.
assistance.
55
Grade 4
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• format text with stumble • format text with ability • format paragraph with • format paragraph with
through inserting pictures of finding, inserting ability of finding, inserting ability of finding, inserting
and shapes in word and resizing in word and resizing clipart and resizing clipart
processing. processing with some illustrations in word illustrations in word
• create simple assistance. processing with little processing independently.
presentation, placing • create simple assistance. • create simple
pictures and clipart with a presentation, placing • create simple presentation, placing
lot of assistance. pictures or clipart presentation, placing pictures or clipart, and
• storyboard of the choosing colors and pictures or clipart, use use design skills or select
movie shows little to no layout of slide with some colors and layouts that a template to make
Productivity Tools evidence of preplanning. assistance. make the information presentation easy to view
Over use or misuse of • storyboard of the movie clear with little assistance. independently.
graphics, color, effects, shows some evidence • storyboard of the movie • storyboard shows
transitions and music in of pre - planning with shows evidence of pre - strong evidence of pre
creating movie. somewhat vague goal in planning with clear intent - planning and achieves
mind. Makes attempted in mind. Makes a good the goal. Excellent use of
use of graphics, color, use of color, graphics, color, graphics, effects,
effects, transitions and effects, transitions and transitions and music was
music was inappropriate music. clearly planned.
to topic.
• define web browser with • define web browser with • define web browser, use • define web browser, use
a lot of errors and Needs few errors, use basic 3 - 4 advance tool bar, and 5 advance tool bar, and
Internet and assistance throughout tool bar and construct select suitable terms or select suitable terms
Information Search process from key term or a search with some phrases in searching with or phrases in searching
search word selection to assistance. little assistance. independently.
result selection.
56
Grade 5
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• describe how hardware • stumble in describing • describe how hardware • describe how hardware
and software interact how hardware and and software interact, and software interact,
with a lot of errors and software interact with few upgrade software, upgrade software,
customizing the desktop errors and customizing customizing the desktop customizing the desktop
display with a lot of the desktop display with display, mouse, Keyboard, display, mouse, Keyboard,
assistance. some assistance. date & time, and install date & time, and install
Computer Operation • produce more than 15 • produce between 11 - 15, new fonts with a little new fonts independently.
spelling and grammar spelling and grammar assistance. • produce few spelling
mistakes (0 - 69% level of mistakes(70 - 79% level of • produce between 5 - 10, and grammar mistakes,
accuracy). accuracy). spelling and grammar between 1 - 4 (90 - 99%
mistakes (80 - 89% level of level of accuracy).
accuracy).
• spot and correct spelling • spot and correct • spot and correct spelling • spot and correct spelling
mistakes in their writing spelling errors in writing errors, check grammar, errors, check grammar
document but might miss document but might have find / replace, and use errors, find / replace, use
one or two. one spelling or grammar word account in writing word account, thesaurus
• modify slide layout and error. document. and translate in writing
use animated clipart that • modify slide layout, use • add sounds, timing to document
helps to explain idea. animated clipart, add slide transitions, insert • add custom animation to
• format and organize the clipart sound and video in clip art sound and video. pictures and text to add
Productivity Tools spreadsheet with a lot of presentation. • format and organize meaning and emphasis to
assistance. Spreadsheet • format and organize spreadsheet with little the presentation.
has no formula(s). spreadsheet with some assistance. Formula(s) will • format and organize
assistance. Formula(s) correctly determine the spreadsheet
cannot be used to needed information. independently.
correctly determine the Formula(s) are well
needed information. - developed and will
correctly determine the
needed information.
• define network with a lot • define network with few • define network and • define network and
Internet and of errors and download errors and download file download file from download file to specific
file from the Inernet with form the Inernet with Inernet with little place in a computer
Information Search a lot of assistance. some assistance. assistance. independently.
• identify the features of • identify the features of • identify the features of • identify the features of
online communications online communications online communications online communications
and social networks and social networks and social networks with and social networks,
Collaboration Tools with a lot of errors. with a few of errors. little errors. create, receive create, receive and send
create email with a lot of create email with some and send emails with independently.
assistance assistance. some assistance.
57
Grade 6
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• defining operating system • describe the operating • describing the purpose of • describing the purpose of
with error and change the system with errors and an operating system and an operating system and
desktop background with change simple control the difference between the difference between
help. panel setting. operating system and operating system and
Computer Operation application software, application software,
customize the desktop customize the desktop
using the control panel using the control panel
and managing application and managing application
program with few errors. program easily.
58
Grade 7
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• Perform simple editing to • create Simple Formulas • use the right function • use the right function
spreadsheet and difficult with some difficulties in to manipulate formula to manipulate formula
Productivity Tools to create formulas. the spreadsheet. and methods of tracking and methods of tracking
down invalid entries with down invalid entries.
some errors.
• list 0 - 2 of search tools • list most of search tools • differentiate between • use the suitable search
Internet Surfing and and use basic search and use basic search search tools and search tools and advanced
Information Retrieval strategies with a lot of strategies with some of using advanced strategies search strategies.
hesitation. hesitation. with few errors.
• identify social network • list some social network • list new social network • list new social network
trends with error. trends and chose tools to trends and select the trends and select
Collaboration Tools communicate with some appropriate tools to the effective tools to
difficulties. communicate with few communicate.
difficulties.
59
Grade 8
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• use disk software utilities, • use disk software utilities, • organize data directory • organize data directory
stumble in backup the stumble in backup the structure, develop backup structure, develop backup
Computer Operation system and solve little of system and solve little of routine schemes and routine schemes and
common problems with a common problems with solve simple solution to solve advanced solution
lot of help from teacher. some teacher assistance. common problems. to common problems.
• create sample desktop • create sample publishing • create a variety of • redesign and create
publishing document with simple editing publication for different templates; use special
somewhat organized techniques. purpose. and advanced formatting
readability. • demonstrate basic skills in • use painting tools and features to create
• use painting tools to developing artworks with manipulate, edit, and different publication
create digital artwork some of difficulties. adjust images by using, purpose.
Productivity Tools with a lot of difficulties. the different tools and • use painting tools and
blending modes to manipulate, edit, and
create special effects and adjust images by using,
quality artworks with few the different tools and
difficulties. blending modes to create
special effects and quality
artworks.
• identify search strategies • list search strategies to • plan basic strategies to • select the suitable
with a lot of mistakes. guide inquiry with some guide inquiry and select strategies to guide
Internet Surfing and mistakes. the information sources inquiry and select the
Information Retrieval based on appropriate information sources
task. based on appropriate
task.
• select tool to collaborate • select appropriate tool to • select appropriate tool to • use with proficiency
and develop a software collaborate and develop collaborate and develop selected communication
Collaboration Tools product with more a software product with a software product, tools to produce works
difficulty. some difficulty. independently. with team.
60
Grade 9
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• detect the problem and • detect the problem and • choose the suitable • choose the suitable
difficult to fix it. try to fix it with difficulty. methods to detect the methods to detect the
Computer Operation problem and fix some of problem and fix most of
problems. problems.
• optimize images for use • optimize images for use • optimize images for use • optimize images for use
on the Web, and use on the Web, and use on the Web, and use on the Web, and use
image-slicing techniques image-slicing techniques image-slicing techniques image-slicing techniques
with more difficulties. with some difficulties. with few difficulties. easily.
• create a database with a • create a database with • create a database to • create a database to
Productivity Tools lot of difficulties. some difficulties. support the creation of support the creation of
multi - table forms, create multi - table forms, create
queries that search for queries that search for
specific data and reports specific data and reports.
with few difficulties.
• use search strategies • plan basic strategies • plan advanced strategies • select the suitable
Internet Surfing and and difficult to evaluate to guide inquiry with to guide inquiry with advanced strategies
information sources. teacher help and found evaluation of information to guide inquiry with
Information Retrieval information without sources. evaluation of information
evaluating. sources.
• identify collaboration • identify influences on • use suitable selected • use with proficiency
tools influences on design design and development media tools to selected media tools
Collaboration Tools and difficult to develop of software product with communicate with to communicate with
software product. errors. project team. project team.
61
Grade 10
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• identify few of the main • identify some of the main • identify most of the main • identify most of the main
network components, network components, network components, network components,
available network available network available network available network
operating systems and its operating systems and its operating systems and its operating systems and its
functions, client - server functions, client - server functions, client - server functions, client - server
and peer-to-peer network and peer-to-peer network and peer-to-peer network and peer-to-peer network
strategies with a lot of strategies with strategies with adequate strategies with adequate
Computer Networks mistakes, and able to • little mistakes, and able explanation, and able to explanation, and able to
select network devices to select network devices select network devices select network devices
and operating system and operating system and operating system and operating system
based on the evaluation based on the evaluation based on the evaluation based on the evaluation
of its effectiveness and of its effectiveness and of its effectiveness and of its effectiveness and
reliability to design small reliability to design small reliability to design small reliability to design small
network, with a lot of network, with the help of network, with adequate network, with excellent
difficulty and mistakes. the teacher. level of explanation. explanation.
• identify few key • identify some key • identify most of the key • identify all of the key
functions of hardware functions of hardware functions of hardware functions of hardware
and software tools used and software tools used and software tools used and software tools used
in communication, in communication, in communication, in communication,
few advantages and some advantages and advantages and advantages and
disadvantages of different disadvantages of different disadvantages of different disadvantages of different
communication tools communication tools communication tools communication tools
Collaboration Tools used to collaborate used to collaborate used to collaborate used to collaborate
with peers with with peers and explain with peers and explain with peers and explain
limited explanation of communication links with communication links with communication links with
communication links with commerce, education, commerce, education, commerce, education,
commerce, education, home and government. home and government. home and government.
home and government. with the help of the with good demonstration with excellently.
teacher. of knowledge.
• describe the processes • describe the processes • describe the processes • describe the processes
of acquiring, capturing, of acquiring, capturing, of acquiring, capturing, of acquiring, capturing,
manipulating, storing, manipulating, storing, manipulating, storing, manipulating, storing,
displaying and displaying and displaying and displaying and
distributing data types distributing data types distributing data types distributing data types
and use appropriate and use appropriate and use appropriate and use appropriate
Productivity Tools
presenting application to presenting application presenting application presenting application
create animation with a to create animation with to create animation with to create animation
lot of difficulty and many some difficulty and with acceptable standards with excellent standards
errors. the help of teacher. while meeting the most while meeting all of
of task requirements the task requirements
independently. independently.
62
Grade 10A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• identify few of the main • identify some of the main • identify most of the main • identify most of the main
network components, network components, network components, network components,
available network available network available network available network
operating systems and its operating systems and operating systems and its operating systems and its
functions, client - server its functions, client - functions, client - server functions, client - server
and peer-to-peer network server and peer-to-peer and peer-to-peer network and peer-to-peer network
strategies with a lot of network strategies with strategies with adequate strategies with adequate
mistakes, and able to little mistakes, and able explanation, and able to explanation, and able to
select network devices to select network devices select network devices select network devices
and operating system and operating system and operating system and operating system
based on the evaluation based on the evaluation based on the evaluation based on the evaluation
Computer Networks of its effectiveness and of its effectiveness and of its effectiveness and of its effectiveness and
reliability to design small reliability to design small reliability to design small reliability to design small
network, with a lot of network, with the help of network, with adequate network, with excellent
difficulty and mistakes. the teacher. level of explanation explanation
• identify with a lot of • identify with some errors, • identify and select the • identify and use the
difficulty few hardware, hardware, cables and most suitable hardware, most suitable hardware,
cables and software that software that is require cables and software that cables and software that
is require to connect and to connect and operate is require to connect is require to connect and
operate network. network. and operate network, operate network, with
with good and sufficient excellent explanation.
explanation.
• identify few key • identify some key • identify most of the key • identify all of the key
functions of hardware functions of hardware functions of hardware functions of hardware
and software tools used and software tools used and software tools used and software tools used
in communication, in communication, in communication, in communication,
few advantages and some advantages and advantages and advantages and
disadvantages of different disadvantages of different disadvantages of different disadvantages of different
communication tools communication tools communication tools communication tools
Collaboration Tools used to collaborate used to collaborate used to collaborate used to collaborate
with peers with with peers and explain with peers and explain with peers and explain
limited explanation of communication links with communication links with communication links with
communication links with commerce, education, commerce, education, commerce, education,
commerce, education, home and government. home and government. home and government.
home and government. with the help of the with good demonstration with excellently.
teacher. of knowledge.
• describe the processes • describe the processes • describe the processes • describe the processes
of acquiring, capturing, of acquiring, capturing, of acquiring, capturing, of acquiring, capturing,
manipulating, storing, manipulating, storing, manipulating, storing, manipulating, storing,
displaying and displaying and displaying and displaying and
distributing data types distributing data types distributing data types distributing data types
and use appropriate and use appropriate and use appropriate and use appropriate
Productivity Tools presenting application to presenting application presenting application presenting application
create animation with a to create animation with to create animation with to create animation
lot of difficulty and many some difficulty and with acceptable standards with excellent standards
errors. the help of teacher. while meeting the most while meeting all of
of task requirements the task requirements
independently. independently.
63
Grade 11
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• explain few of network • explain some of network • explain most of network • explain all network
types, technologies. types, technologies with types and technologies. types and technologies.
and describe with a lot mistakes. and describe describe with some describe with token
of difficulty token ring, with some hesitate token hesitate token ring, ring, Ethernet methods
Ethernet methods to ring, Ethernet methods to Ethernet methods to to send data over a
send data over a network, send data over a network, send data over a network, network, with confident,
Computer Networks and define few terms and define some terms with confident. and and define all the terms
related to OSI and TCP/ related to OSI and TCP/IP define most of the terms related to OSI and TCP/
IP network models with a network models with help related to OSI and TCP/ IP network models with
lot of mistakes. of the teachers. IP network models with excellent explanation
adequate explanation independently.
independently.
• identify few • identify some • identify and use with • identify, evaluate and use
communication strategies communication proficiency selected with proficiency selected
and online tools to strategies and online communication strategies communication strategies
use while working tools to use while and online tools while and online tools while
collaboratively on working collaboratively working collaboratively working collaboratively
projects with a lot of on projects, with the on projects, and describe on projects, and describe
Collaboration Tools difficulty, and describe help of the teacher, and how computer’s tools how computer’s tools
how computer’s tools describe how computer’s enhance traditional enhance traditional
enhance traditional tools enhance traditional forms and enable new forms and enable new
forms and enable new forms and enable new forms of experience, forms of experience,
forms of experience, forms of experience, communication with communication with
communication with a lot communication with confident. excellent demonstration
of hesitant. some hesitant. of knowledge.
• use web-authoring • use web-authoring • use web-authoring tool to • use web-authoring tool to
tool to create, edit, and tool to create, edit, and create, edit, and publish create, edit, and publish
publish well organized publish well organized well organized web sites well organized web sites
web sites with acceptable web sites with acceptable with good navigation, with effective navigation,
Productivity Tools navigation, and evaluate navigation, and evaluate and evaluate a website and evaluate a website
a website using design a website using design using design criteria, using design criteria,
criteria with a lot of criteria with some independently with independently with
difficulty. difficulty and the help of adequate level. professional confident.
the teacher.
64
Grade 11A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• explain few of network • explain some of network • explain most of network • explain all network
types, technologies. types, technologies with types and technologies. types and technologies.
and describe with a lot mistakes. and describe describe with some describe with token
of difficulty token ring, with some hesitate token hesitate token ring, ring, Ethernet methods
Ethernet methods to ring, Ethernet methods to Ethernet methods to to send data over a
send data over a network, send data over a network, send data over a network, network, with confident,
Computer Networks and define few terms and define some terms with confident. and and define all the terms
related to OSI and TCP/ related to OSI and TCP/IP define most of the terms related to OSI and TCP/
IP network models with a network models with help related to OSI and TCP/ IP network models with
lot of mistakes. of the teachers. IP network models with excellent explanation
adequate explanation independently
independently.
• identify few • identify some • identify and use with • identify, evaluate and use
communication strategies communication proficiency selected with proficiency selected
and online tools to strategies and online communication strategies communication strategies
use while working tools to use while and online tools while and online tools while
collaboratively on working collaboratively working collaboratively working collaboratively
projects, with a lot of on projects, with the on projects, and describe on projects, and describe
Collaboration Tools difficulty, and describe help of the teacher, and how computer’s tools how computer’s tools
how computer’s tools describe how computer’s enhance traditional enhance traditional
enhance traditional tools enhance traditional forms and enable new forms and enable new
forms and enable new forms and enable new forms of experience, forms of experience,
forms of experience, forms of experience, communication with communication with
communication with a lot communication with confident. excellent demonstration
of hesitant. some hesitant. of knowledge.
• use web-authoring • use web-authoring • use web-authoring tool to • use web-authoring tool to
tool to create, edit, and tool to create, edit, and create, edit, and publish create, edit, and publish
publish well organized publish well organized well organized web sites well organized web sites
web sites with acceptable web sites with acceptable with good navigation, with effective navigation,
Productivity Tools navigation, and evaluate navigation, and evaluate and evaluate a website and evaluate a website
a website using design a website using design using design criteria, using design criteria,
criteria with a lot of criteria with some independently with independently with
difficulty. difficulty and the help of adequate level. professional confident.
the teacher.
65
Grade 12
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list few services provided • list some services • list most of the services • list all of the services
by a network, few Inernet provided by a network, provided by a network, provided by a network,
protocols with many some Inernet protocols most of Inernet Inernet protocols with
errors, and use network with errors, and use protocols with adequate excellent explanation,
Computer Networks operating system to network operating system explanation, and use and use network
setup and manage small to setup and manage network operating system operating system to
network with a lot of small network with the to setup and manage setup and manage small
difficulty. help of the teacher. small network with little network with confident
errors, independently. independently.
66
Grade 12A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list few services provided • list some services • list most of the services • list all of the services
by a network, few Inernet provided by a network, provided by a network, provided by a network,
protocols with many some Inernet protocols most of Inernet Inernet protocols with
errors, and use network with errors, and use protocols with adequate excellent explanation,
operating system to network operating system explanation, and use and use network
setup and manage small to setup and manage network operating system operating system to
Computer Networks network with a lot of small network with the to setup and manage setup and manage small
difficulty, and identify help of the teacher, and small network with little network with confident,
career options related to identify career options errors, independently, and independently. and
networking with limited related to networking identify career options identify career options
details. with some details and the related to networking related to networking
help of the teacher. with acceptable details, with in - depth details,
independently. independently.
67
68
Sample Activities
69
70
Sample Activity (Grade 1):
By the end of Grade 1, the student will be able to:
Grade 1
• identify main • The monitor is the • Label the kind of monitor under • Circle the monitor that represent
parts of visual component the pictures: high resolution:
computer. of the computer.
It displays
information to
the user. Kinds of
monitors are LCD,
LED, CRT and
Computer Operation touch screen.
• define types • Alphanumeric • Color the numbers keys red, and • Write the letters and numbers in
of keys on the keys are all of letters keys blue. the right place.
keyboard. the letters and
numbers on the
keyboard. A-Z and
0-9.
• draw and edit • Draw a picture • Draw a house using shapes tools • Which tools we should use to
pictures using using circle, in paint program: draw this picture:
different tools square, rectangle
and work with and triangle tools.
text.
Productivity Tools
• define Internet • Open a website • Open code website using the url : • Circle the part that we use to
and open a using Google www.code.org open a specific web site.
website. chrome browser.
Internet Surfing and
Information Retrieval
71
Sample Activity (Grade 4):
By the end of Grade 4, the student will be able to:
Grade 4
• list different • A data storage • In group of 3 write name of each • Categorize the storage device to
types of storage device is a device storage device: primary or secondary storage.
devices. for recording
(storing)
information
(data). There
are two types
of storage
devices used in
computers; a
Computer Operation primary storage
device, such
as RAM, and a
secondary storage
device, like a hard
drive. Secondary
storage can be
a removable,
internal, or
external storage.
• manage slides in • Change slides • Open a presentation using • Use the background tool to
presentation. background. PowerPoint program. change the color of the slides.
Productivity Tools • Change the background of the
first slide to blue color.
• search the • Search the • Open Google search. • Search about the UAE builder?
Internet for Internet for • Search about the history of the
Internet Surfing and information information based United Arab Emirates
Information Retrieval based on on specified
specified keywords.
keywords.
72
Sample Activity (Grade 7):
By the end of Grade 7, the student will be able to:
Grade 7
• solve common • Student is able to • Some keyboard keys stopped • Stir brainstorming among student
problems related solve common working. by offering some computer
to computer computer problems and ask student to
hardware. problems. search for the solution in a report.
Computer Operation
• sort data in the • Student is able • Sort the table ascending by the • What is the advantage of using
spreadsheet. to sort data country. sort data in the spreadsheet?
ascending and • Sort the table by last name first
descending by and sales second.
one column or
more.
Productivity Tools
• list search • Student is able to • Compare between search tools: • Compare between different
tools and find list search tools search tools in a presentation.
the difference and differentiate
between them. between them.
Internet Surfing and
Information Retrieval
73
Sample Activity (Grade 10):
By the end of Grade 10, the student will be able to:
Grade 10
• discuss the • Use Google drive • Discuss Google drive online • List the main tasks that can be
advantages and to collaborate tools and how it can facilitate accomplished using Google drive
disadvantages over Inernet. communication and collaboration while team collaboration.
of different over Inernet. • Explain main advantages of
communication Google drive tools.
tools which used
to collaborate
with peers.
Collaboration Tools
• In groups of 3 work together
online to use the tools and then
summarize the advantages and
disadvantages of this tools.
• Present and share with other
groups.
74
Algorithmic Thinking
Evaluation
Decomposition
Abstraction
Generalization
75
76
Domain 2: Computational Thinking (CT)
Definition
Computational thinking is the thought processes involved in formulating problems and their solutions so that the solutions are represented in a form
that can be effectively carried out by an information - processing agent.
There are five core concepts involved in computational thinking:
• Algorithmic thinking
• Evaluation
• Decomposition
• Abstraction
• Generalization
Algorithmic thinking is a way of getting to a solution through clear definition of the steps. Rather than coming up with a single answer, like 42, the
students develop a set of instructions or rules that if followed precisely (whether by a person or a computer) leads to answers to that and similar
problems.
Evaluation is the process of ensuring an algorithmic solution is a good one: that it is fit for purpose. Various properties of algorithms need to be
evaluated including whether they are correct, are fast enough, are economic in the use of resources, are easy for people to use and promote an
appropriate experience. Trade - offs need to be made as there is rarely a single ideal solution for all situations. There is a specific and often extreme focus
on attention to detail in computational thinking based evaluation.
Decomposition is a way of thinking about problems, algorithms, artifacts, processes and systems in terms of their parts. The separate parts can then be
understood, solved, developed and evaluated separately. This makes complex problems easier to solve and large systems easier to design.
Abstraction involves hiding detail and removing unnecessary complexity. The skill is in choosing the right detail to hide so that the problem becomes
easier without losing anything that is important.
Generalization is a way of quickly solving new problems based on previous problems we have solved.
Generic Outcomes
KG - G5 (cycle 1)
By the end of cycle 1, students will be able to:
1. differentiate various artifacts based on certain parameters.
2. demonstrate the ability to follow steps of simple processes.
3. demonstrate ability to rank, sort, and search objects manually based on some criteria.
4. demonstrate the ability to use logical thinking tools.
At this stage, student will be able to use different technological resources to solve simple problems to illustrate his/her thoughts, ideas, and stories in
a step-by-step manner. Different online visual coding resources such as (code.org) will be used to give appropriate logical instructions to solve logical
problems which involve sequences, repetitions and conditional instructions. In addition, student will be able to use logical thinking programs to solve
some puzzles. Student will be able to understand how to arrange (sort) information into useful order. Moreover, student will be able to describe the
process of sorting items from smallest to biggest as well as finding or inserting items in a sorted set of items.
G6 - G9 (cycle 2)
By the end of cycle 2, students will be able to:
1. identify various elements of a problem.
2. express problem solutions as a sequence of steps.
3. decompose a problem into sub problems that are easier to solve than the original problem.
4. show basic ability to simulate and model natural processes and systems.
Show the connection between the Computer Science problems and other fields.
At this stage, student will be able to define an algorithm as sequence of instructions that can be processed by a computer. Student will be able to
formulate the problem mathematically using different techniques other than sequencing such as selection and iteration. Analyzing the correctness of
the developed algorithm is one of the objectives of this stage as well as determining the complexity of the algorithm. To enhance algorithmic thinking,
basic searching and sorting techniques will be introduced. The student will learn how to decompose a large/difficult problem into smaller problems.
Moreover, student will be able to describe the notion of hierarchy and abstraction in computing. Furthermore, student will able to understand the
concept of simulation and list different area of applications to solve real life problems. Student will also be able to define the link between Computer
Science and other fields.
77
G10 - G12 (cycle 3 + cycle 3 advanced)
By the end of Cycle 3 and Cycle 3 A, students will be able to:
1. demonstrate the ability to evaluate algorithm working, complexity and structure.
2. organize algorithmic solution into logical modules.
3. use various data structure in algorithmic solutions.
4. use various decomposition and parallelization techniques.
5. analyze data and identify patterns through models and simulation.
At this stage, student will be able to understand algorithms complexity and classify problems in terms of difficulty. In addition, he/she will be able to
explain the value of heuristic algorithms to approximate solutions for hard problems. Student will also be able to evaluate algorithms by their efficiency,
correctness, and clarity. Moreover, he will be able to compare and contrast simple data structures and their uses. Student will also be able to use
functions and parameters, classes and methods to divide a complex problem into simpler parts. Recursion techniques will be introduced at this stage
as another way of using repetition. Furthermore, student will be able to describe the concept of parallel processing as a strategy to solve large problems.
Advanced modeling and simulation techniques will be used to formulate, refine, and test scientific hypotheses. Finally, student will be able to show
the symmetry between real-life problems and computer - related problems and identify different patterns and commonalities in problems, processes,
solutions, or data.
78
Strands Description and Technical Keywords
Algorithmic thinking aims to build the problem solving skill and methodology. Function, loop, iteration,
It allows the students to identify the problem components (i.e. input, output, conditional statements,
1 Algorithmic Thinking
and processing) prior to developing the solution. In addition to using various procedure, parallel processing,
techniques to organize the solution steps. data structures
This strand allows the student to evaluate the time and number of steps algorithm complexity, big O
ramifications of various solution designs, compare and contrast the notation, run time, memory
2 Evaluation
performance various algorithms, and be able to evaluate the memory requirements
requirements of algorithmic solutions.
Nowadays problems are very complicated. Decomposition divides large Divide and conquer, greedy
problems into smaller sub problems that are easier to solve. Solutions to some algorithms, recursion, object,
3 Decomposition of these constituting sub - problems can be later reused when it comes to class
software components. To this end, students need to get exposed to various
decomposition techniques.
Abstraction removes unnecessary details and focuses on the fundamental Modeling, simulation, pattern
4 Abstraction problem. It requires the ability to identify patterns in data. Through modeling recognition, abstraction
and simulation, some systems problems maybe abstracted.
By identifying the relationship of Computer Science to modern problems, it Adaptation, solution transfer
is possible to generalize and adapt existing solutions to new problems. The
5 Generalization students need to be able to identify the symmetry in problems all around us,
and solve new problems based on previous problems that have been solved
before.
Abstraction
Decomposition
Generalization
Evaluation
79
Student Learning Outcomes distribution Per Grade
Cycle 1 Cycle 2 Cycle 3 Cycle 3A
Domains Strand
KG1 KG2 G1 G2 G3 G4 G5 G6 G7 G8 G9 G10 G11 G12 G10A G11A G12A
Algorithmic Thinking 4 4 3 4 4 4 4 27 7 5 7 6 25 3 5 2 10 3 5 2 10
Computational Thinking
Abstraction 2 1 1 2 2 2 2 12 2 5 3 1 11 3 3 3 9 3 3 3 9
Decomposition 0 0 0 0 0 0 0 0 2 2 2 3 9 1 3 3 7 2 3 3 8
Generalization 0 0 0 0 0 0 0 0 1 1 2 2 6 1 1 1 3 1 1 1 3
Evaluation 0 0 0 0 0 0 0 0 0 0 0 0 0 5 3 4 12 5 3 4 12
Algorithmic Total
Abstraction Decompositi Generalizatio Evaluation 39Algorithmic Abstraction 51Decompositi 41
Generalizatio Evaluation 42
Thinking on n Thinking on n
69 31 0 0 0 100 49 21 18 12 0 100
12%
31%
18%
49%
69%
21%
Algorithmic Abstraction Decompositi Generalizatio Evaluation Algorithmic Abstraction Decompositi Generalizatio Evaluation
Thinking on n Thinking on n
25 22 17 7 29 100 24 21 19 7 29 100
7% 7% 21%
22%
17% 19%
80
Percentage of outcomes as per level of difficulty and percentage wise
No of outcomes Outcomes Percentage
1 2 3 Sum 1 2 3
Cycle 1
Cycle 2
Cycle 3
Cycle 3A
C1 C2 C3 C3A Total
DLC
4.65 6.2 15.5 32.6 58.9
81
Strands Evolution Per Grade
Domain Strand Grade 1 Grade 2 Grade 3 Grade 4 Grade 5
• Utilize technological • Utilize technological • Utilize technological • Utilize technological • Utilize technological
resources to solve resources to solve resources to solve resources to solve resources to solve
Algorithmic Thinking
simple problems simple problems simple problems simple problems simple problems
• Utilize authoring • Utilize authoring • Utilize authoring • Illustrate thoughts, • Utilize technological
Computational Thinking
tools, digital tools, digital tools, digital ideas, and stories resources to solve
cameras, and cameras, and cameras, and in a step-by-step simple problems
drawing tools to drawing tools to drawing tools to manner
illustrate thoughts illustrate thoughts illustrate thoughts,
and ideas in a step- and ideas in a step- ideas, and stories
by-step manner by-step manner in a step-by-step
manner
• Understand how • Understand how • Understand how • Understand how • Understand how
Abstraction
to arrange (sort) to arrange (sort) to arrange (sort) to arrange (sort) to arrange (sort)
information into information into information into information into information into
useful order useful order useful order useful order useful order
• Formulate the problem • Use the basic steps in • Analyze the correctness of • Determine the complexity
mathematically. algorithmic problem- the developed algorithm. of the algorithm
Algorithmic Thinking
• Define an algorithm as a solving to design a solution • Describe the process of • Use basic searching
sequence of instructions • Develop a simple parallelization as it relates techniques
that can be processed by a understanding of an to problem solving • Act out searching and
computer algorithm • Use visual representations sorting algorithms
• Develop a simple of problem states,
understanding of an structures and data
algorithm. • Describe how various
types of data are stored in
a computer system
Computational Thinking
problem into smaller modularity for solving importance of reusability into sub - problems using
problems large problems in the decomposition divide and conquer
process
Generalization Abstraction
• Understand the concept of • Understand the concept of • Describe how a simulation • Interact with content-
abstraction simulation can be used to solve a specific models and
• State the benefits of using problem. simulations to support
simulation learning and research
82
Domain Strand Grade 10 Grade 11 Grade 12
Generalization
• Understand Algorithms Complexity • Classify problems in terms of • Explain the value of heuristic
• Design Algorithmic solutions difficulty algorithms to approximate solutions
• Explain the value of heuristic for intractable problems
algorithms to approximate solutions
for hard problems
• Design Algorithmic solutions
• Critically examine classical algorithms • Critically examine classical algorithms • Critically examine classical algorithms
Evaluation
• Compare and contrast simple data • Compare and contrast simple data
structures and their uses structures and their uses
• Use functions and parameters, classes • Explain how sequence, selection, • Explain how sequence, selection,
Decomposition
and methods to divide a complex iteration, and recursion are building iteration, and recursion are building
problem into simpler parts. blocks of algorithms. blocks of algorithms.
• Describe the concept of parallel • Describe the concept of parallel
processing as a strategy to solve large processing as a strategy to solve large
problems. problems.
• Use modeling and simulation to • Use modeling and simulation to • Use modeling and simulation to
represent and understand natural represent and understand natural represent and understand natural
Abstraction
• Describe how computation shares • Describe how computation shares • Describe how computation shares
features with art and music by features with art and music by features with art and music by
translating human intention into an translating human intention into an translating human intention into an
artifact artifact artifact
• Understand Algorithms Complexity • Classify problems in terms of • Explain the value of heuristic
• Design Algorithmic solutions difficulty algorithms to approximate solutions
• Explain the value of heuristic for intractable problems
algorithms to approximate solutions
for hard problems
• Design Algorithmic solutions
• Critically examine classical algorithms • Critically examine classical algorithms • Critically examine classical algorithms
Evaluation
• Evaluate algorithms by their and implement an original algorithm • Evaluate algorithms by their
efficiency, correctness, and clarity • Evaluate algorithms by their efficiency, correctness, and clarity
Computational Thinking
• Compare and contrast simple data efficiency, correctness, and clarity • Compare and contrast simple data
structures and their uses structures and their uses
• Use functions and parameters, classes • Explain how sequence, selection, • Explain how sequence, selection,
Decomposition
and methods to divide a complex iteration, and recursion are building iteration, and recursion are building
problem into simpler parts blocks of algorithms blocks of algorithms
• Describe the concept of parallel • Describe the concept of parallel • Describe the concept of parallel
processing as a strategy to solve large processing as a strategy to solve large processing as a strategy to solve large
problems problems problems
• Use modeling and simulation to • Use modeling and simulation to • Use modeling and simulation to
represent and understand natural represent and understand natural represent and understand natural
Abstraction
• Describe how computation shares • Describe how computation shares • Describe how computation shares
features with art and music by features with art and music by features with art and music by
translating human intention into an translating human intention into an translating human intention into an
artifact artifact artifact
83
Integration between CT domain and other domains
CT CCP DLC CCC
Decomposition • Coding
84
Scope and Sequence
Domains, Strands and Standards by Grade
85
86
Grade: KG1
(2.1.2) (KG1.2.1.2.1) 1
Utilize authoring tools, digital Illustrate steps needed to complete
cameras, and drawing tools to simple task using simple computer
2. illustrate thoughts and ideas in a graphics program
Computational step-by-step manner
Thinking
(KG1.2.1.2.2) 1
Describe story read by the teacher
using simple computer graphics
program
Grade: KG2
(2.1.2) (KG2.2.1.2.1) 1
Utilize authoring tools, digital Illustrate steps needed to complete
2. cameras, and drawing tools to simple task using simple computer
Computational illustrate thoughts and ideas in a graphics program
Thinking step-by-step manner
(KG2.2.1.2.2) 1
Describe story read by the teacher
using simple computer graphics
program
87
Grade: 1
(G1.2.1.1.2) 1
Play guessing games with classmate
to develop guessing strategy
2. (2.1.2) (G1.2.1.2.1) 1
Computational Utilize authoring tools, digital Illustrate steps needed to complete
Thinking cameras, and drawing tools to simple task using simple computer
illustrate thoughts and ideas in a graphics program
step-by-step manner
Grade: 2
(G2.2.1.1.2) 1
Give appropriate logical instructions
to solve simple problems using logical
thinking tools
(2.1.2) (G2.2.1.2.1) 2
Utilize authoring tools, digital Describe process to accomplish a
2. cameras, and drawing tools to simple task
Computational illustrate stories in a step-by-step
manner (G2.2.1.2.2) 2
Thinking Build animated stories using logical
thinking tools
(2.2.2) 1
Sort basketball team players from
shortest to tallest
88
Grade: 3
(G3.2.1.1.2) 2
Solve puzzle which involves
repetition and logical instructions
using logical thinking tools
(2.1.2) (G3.2.1.2.1) 2
2. Utilize authoring tools, digital Describe a step by step solution to
Computational cameras, and drawing tools to sum several numbers
Thinking illustrate thoughts, ideas, and
stories in a step-by-step manner (G3.2.1.2.2) 2
Illustrate the process of sorting
objects
Grade: 4
(G4.2.1.1.2) 3
Solve puzzle which involves
repetition
(2.1.2) (G4.2.1.2.1) 3
Illustrate thoughts, ideas, and Illustrate step by step instructions to
stories in a step-by-step manner perform multiplications and division
2. (G4.2.1.2.2) 3
Computational Illustrate the process of inserting
Thinking new object in an already sorted set
of objects
(G4.2.1.1.2) 3
Insert new item in an already sorted
set of item in an efficient way
(minimum number of steps)
89
Grade: 5
(G5.2.1.1.2) 3
Solve puzzles which involve
repetition and conditional
instructions
(2.1.2) (G5.2.1.2.1) 3
2. Illustrate thoughts, ideas, and Illustrate step by step instructions to
Computational stories in a step-by-step manner perform sorting
Thinking
(G5.2.1.2.2) 3
Illustrate step by step instructions to
perform inserting
90
Grade: 6
(2.1.2) (G6.2.1.2.1) 1
Define an algorithm as a Define an algorithm
sequence of instructions that can
be processed by a computer.
(G6.2.1.2.2) 2
Use the identified key elements to
systematically solve problems
(G6.2.1.2.3) 2
Discuss different algorithms that
solve the same problem
(2.1.3) (G6.2.1.3.1) 1
Develop a simple understanding Develop an algorithm using basic
of an algorithm. sequencing techniques
2.
Computational (G6.2.1.3.2) 1
Thinking Express an algorithm in simple form
(G6.2.1.3.3) 2
Use notation and diagrams to
describe the algorithm
(G6.2.2.1.2) 1
Decompose problem into subtasks
(G6.2.3.1.2) 2
Describe the notion of hierarchy and
abstraction in computing
91
Grade: 7
(G7.2.1.1.3) 3
Select an efficient and effective
solution
(2.1.1) (G7.2.1.1.1) 2
Develop a simple understanding Develop an algorithm by using
of an algorithm selection and iteration
(G7.2.1.1.2) 3
Adapt the algorithm to the context
of the problem
(G7.2.2.1.2) 2
2. Use graph as a tool for representing
Computational problem states and solutions to
Thinking complex problems
(G7.2.3.1.3) 2
Use modeling to represent and
understand natural phenomena
(2.3.2) (G7.2.3.2.1) 1
State the benefits of using List the benefits of simulation and
simulation areas of application
(G7.2.3.2.2) 2
Discuss the simulation results
92
Grade: 8
(G8.2.1.1.2) 3
Evaluates the effectiveness of the
algorithm (time and memory usage)
(G8.2.1.1.3) 3
Compare different solutions of a
problem
(2.1.2) (G8.2.1.2.1) 2
Describe the process of Describe the concept of parallel
parallelization as it relates to processing as a strategy to solve large
problem solving. problems
(2.1.1) (G8.2.1.1.1) 3
Use visual representations of Use different techniques to solve
problem states, structures and problems
data
(2.1.2) (G8.2.1.2.1) 2
Describe how various types of Represent data in various forms,
data are stored in a computer including text, sounds, pictures, and
system numbers
(G8.2.1.2.2) 2
Analyze the representations and
2. trade - offs among various forms of
Computational digital data
Thinking (2.2) (2.2.1) (G8.2.2.1.1) 2
Decomposition Demonstrate the importance of Discuss the usefulness of modules in
reusability in the decomposition terms of computational complexity
process
(G8.2.2.1.2) 1
Define the concept of reusability
93
Grade: 9
(G9.2.1.1.2) 3
Change difficult and ambiguous steps
by clear steps
(2.1.2) (G9.2.1.2.1) 2
Use basic searching techniques Search in a given problem looking for
the highest, the lowest, the largest, or
the smallest value
(2.1.3) (G9.2.1.3.1) 1
Act out searching and sorting Define what is sorting
algorithms
(G9.2.1.3.2) 2
Arrange the data/elements/objects in
ascending or descending order using
different types of sorting
(G9.2.1.3.3) 3
Compare search and sort algorithms
2.
Computational (2.2) (2.2.1) (G9.2.2.1.1) 2
Thinking Decomposition Decompose problem into sub Define the concept of divide and
- problems using divide and conquer algorithm to solve large
conquer problems
(G9.2.2.1.2) 2
Describe how some parts of
algorithm can be used many times
(G9.2.2.1.3) 3
Combine sub - solutions for sub -
problems to form a generic solution
(G9.2.4.1.2) 3
Give examples of interdisciplinary
applications of computational
thinking
94
Grade: 10
(2.1.2) (G10.2.1.2.1) 2
Design Algorithmic solutions Write instructions that if followed in
a given order (sequences) achieve a
desired effect
(G10.2.1.2.2) 2
Write instructions that choose
between different constituent
instructions (selection) to achieve a
desired effect
(G10.2.2.1.2) 1
Assess whether a solution meets the
specification (criteria)
(2.2.2) (G10.2.2.2.1) 1
Evaluate algorithms by their Assess that an algorithm is fit for
efficiency, correctness, and clarity purpose
(G10.2.2.2.2) 1
2. Assess whether an algorithm does the
Computational right thing (functional correctness)
Thinking
(2.2.1) (G10.2.2.1.1) 2
Compare and contrast simple Compare and contrast simple data
data structures and their uses structures and their uses
(2.4.2) (G10.2.4.2.1) 1
Discuss the value of abstraction Hide complexity in data, for example
to manage problem complexity by using data structures
95
Grade: 10A
96
Grade: 11
(2.1.2) (G11.2.1.2.1) 1
Explain the value of heuristic Understand the meaning of exact,
algorithms to approximate approximate, and heuristic solutions
solutions for hard problems
(2.1.1) (G11.2.1.1.1) 1
Designing Algorithmic solutions Step through algorithms/code step
by step to work out what they do
(dry run / tracing)
(G11.2.1.1.2) 1
Write instructions that repeat groups
of instructions (loops/ procedures,
iteration)
(G11.2.1.1.3) 1
Group a collection of instructions
that do a well-defined task to make
a new instruction (subroutines,
functions, methods)
(2.2) (2.2.1) (G11.2.2.1.1) 2
Evaluation Critically examine classical Use rigorous argument to justify that
algorithms an algorithm works (proof)
(G11.2.2.1.2) 2
Assess whether a system is easy for
people to use (usability)
2. (2.2.2) (G11.2.2.2.1) 2
Computational Evaluate algorithms by their Show an Understanding of the
Thinking efficiency, correctness, and clarity various bounds on number of steps
an algorithm takes
(2.3) (2.3.1) (G11.2.3.1.1) 1
Decomposition Explain how sequence, selection, Break down artefacts (whether
iteration, and recursion are objects, problems, processes,
building blocks of algorithms solutions, systems or abstractions)
into constituent parts to make them
easier to work with
(2.3.2) (G11.2.3.2.1) 1
Describe the concept of parallel Demonstrate concurrency by
processing as a strategy to solve separating processes into threads
large problems (G11.2.3.2.2) 1
Divide data into parallel streams
(2.4) (2.4.1) (G11.2.4.1.1) 1
Abstraction Use modeling and simulation to Analyze data to identify patterns
represent and understand natural through modeling and simulation
phenomena
(2.4.2) (G11.2.4.2.1) 2
Discuss the value of abstraction Show how abstraction can reduce
to manage problem complexity problem complexity
(2.4.3) (G11.2.4.3.1) 1
Use models and simulations to Use models and simulations to test
test scientific hypotheses scientific hypotheses
(2.5) (2.5.1) (G11.2.5.1.1) 1
Generalization Describe how computation Show the symmetry between real-life
shares features with art and problems and computer - related
music by translating human problems
intention into an artifact
97
Grade: 11A
(2.1.2) (G11A.2.1.2.1) 2
Explain the value of heuristic Understand the meaning of exact,
algorithms to approximate approximate, and heuristic solutions
solutions for hard problems
(2.1.3) (G11A.2.1.3.1) 2
Designing Algorithmic solutions Step through algorithms/code step
by step to work out what they do
(dry run / tracing)
(G11A.2.1.3.2) 2
Write instructions that repeat groups
of instructions (loops/ procedures,
iteration)
(G11A.2.1.3.3) 2
Group a collection of instructions
that do a well-defined task to make
a new instruction (subroutines,
functions, methods)
(2.2) (2.2.1) (G11A.2.2.1.1) 3
Evaluation Critically examine classical Use rigorous argument to justify that
algorithms and implement an an algorithm works (proof)
original algorithm
(G11A.2.2.1.2) 3
Assess whether a system is easy for
people to use (usability)
2. (2.2.2) (G11A.2.2.2.3) 3
Computational Evaluate algorithms by their Show an Understanding of the
Thinking efficiency, correctness, and clarity various bounds on number of steps
an algorithm takes
(2.3) (2.3.1) (2.3.1) 2
Decomposition Explain how sequence, selection, Break down artefacts (whether
iteration, and recursion are objects, problems, processes,
building blocks of algorithms solutions, systems or abstractions)
into constituent parts to make them
easier to work with
(2.3.2) (G11A.2.3.2.1) 2
Describe the concept of parallel Demonstrate concurrency by
processing as a strategy to solve separating processes into threads
large problems (G11A.2.3.2.2) 2
Divide data into parallel streams
(2.4) (2.4.1) (G11A.2.4.1.1) 2
Abstraction Use modeling and simulation to Analyze data to identify patterns
represent and understand natural through modeling and simulation
phenomena
(2.4.2) (G11A.2.4.2.1) 3
Discuss the value of abstraction Show how abstraction can reduce
to manage problem complexity problem complexity
(2.4.3) (G11A.2.4.3.1) 2
Use models and simulations to Use models and simulations to test
test scientific hypotheses scientific hypotheses
(2.5) (2.5.1) (G11A.2.5.1.1) 2
Generalization Describe how computation Show the symmetry between real-life
shares features with art and problems and computer - related
music by translating human problems
intention into an artifact
98
Grade: 12
(G12.2.2.1.2) 2
Inspect different algorithms to
determine the run-time complexity
of some algorithms (e.g., bubble sort)
(2.2.2) (G12.2.2.2.1) 2
Evaluate algorithms by their Assess whether a system is easy for
efficiency, correctness, and clarity people to use (usability)
(2.2.3) (G12.2.2.3.1) 2
Compare and contrast simple Introduce more complicated data
data structures and their uses structure
(2.4.1) (G12.2.4.1.1) 2
Use models and simulations to Use models and simulations to help
help formulate, refine, and test formulate, refine, and test scientific
scientific hypotheses hypotheses
(2.5) (2.5.1) (G12.2.5.1.1) 1
Generalization Describe how computation Transfers solutions from Computer
shares features with art and Science to real-life problems
music by translating human
intention into an artifact
99
Grade: 12A
(G12A.2.2.1.2) 3
Inspect different algorithms to
determine the run-time complexity
of some algorithms (e.g., bubble sort)
(2.2.2) (G12A.2.2.2.1) 3
Evaluate algorithms by their Assess whether a system is easy for
efficiency, correctness, and clarity people to use (usability)
(2.2.3) (G12A.2.2.3.1) 3
Compare and contrast simple Introduce more complicated data
data structures and their uses structure
100
Student Performance Criteria
101
102
KG1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• solve puzzle with help of • solve puzzle with some • solve puzzle without any • solve puzzle without any
Algorithmic Thinking teacher help of teacher help help in noticeably short
time
• sort objects with few • sort objects correctly with • sort objects correctly • sort objects correctly
Abstraction mistakes the help of teacher without any help without any help in
noticeably short time
KG2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• solve puzzle with help of • solve puzzle with some • solve puzzle without any • solve puzzle without any
Algorithmic Thinking teacher help of teacher help. help in noticeably short
time.
• sort objects with few • sort objects correctly with • sort objects correctly • sort objects correctly
Abstraction mistakes the help of teacher without any help. without any help in
noticeably short time.
Grade 1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• show some attempts to • solve maze with help of • solve simple maze • solve simple maze with
solve maze teacher • illustrate steps needed to easiness
Algorithmic Thinking • show some of the steps • show some of the steps complete task. • Illustrate steps to
needed to complete task needed to complete task complete task clearly and
correctly.
• sort students from • sort students from • sort students from • short students from
shortest to tallest with shortest to tallest with shortest to tallest without shortest to tallest without
Abstraction the help of teacher. some help from the any help. any difficulty.
teacher.
103
Grade 2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• sort small number of • sort large number of • sort large number of • sort large number of
Abstraction items from smallest to items from smallest to items. times efficiently by
biggest. biggest with the help of dividing them into smaller
teacher. groups.
Grade 3
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• attempt to solve logical • provide partial solution • solve logical thinking • solve puzzle which
Algorithmic Thinking problem, but being able for logical thinking problems. involves repetition and
to give solution. problem. logical instructions.
• describe general steps • describe the process • describe the process • describe the process
needed to sort items from of sorting items from of sorting items from of sorting items from
smallest to biggest. smallest to biggest with smallest to biggest. smallest to biggest and
Abstraction some missing steps. the process and inserting
new item in an already
sorted set of items.
Grade 4
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• sort given sets of objects • sort given sets of objects • sort given sets of objects • apply sorting and
from smallest to biggest. from smallest to biggest from smallest to biggest, insertion algorithms to
with the minimum and insert new item in real world problem in an
Abstraction number of steps. an already sorted set of efficient manner.
item with the minimum
number of steps.
104
Grade 5
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• roughly describing the • describe the process • describe the process • describe the process
process of sorting items of sorting items from of sorting items from of sorting items from
from smallest to biggest. smallest to biggest. smallest to biggest and smallest to biggest and
Abstraction the process of finding the process of finding
items in a sorted set of items in an unordered set
items. of items.
105
Grade 6
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• identify inputs and • identify inputs and • identify all of the inputs, • identify all the inputs,
outputs of the problem outputs of the problem outputs needed to solve all the outputs correctly
with reasonable accuracy. with frequent errors. the problems with few and any assumptions or
• define an algorithm with • define an algorithm with errors. limitations needed to
hesitation and unable to hesitation and difficulty • define an algorithm with solve the problems.
identify key elements for but able to list some accuracy and confidence • define an algorithm with
solving problem. of the identified key and list most of the accuracy and confidence
• develop an algorithm but elements. identified key elements. based on the identified
Algorithmic Thinking with many missing steps. • develop an algorithm • develop an algorithm key elements and use it to
with few missing steps with all required steps solve similar problems.
using simple technique using simple techniques • develop an algorithm
such as sequencing. such as sequencing with with all the required steps
only few errors. accurately and using
advanced techniques such
as sequencing, selection
and iteration and able to
describe it graphically.
• decompose problem into • decompose problem into • decompose problem into • decompose problem
smaller problems but with smaller problems but smaller problems with into smaller problems
Decomposition difficulty and uncertainly. with frequent errors and few errors. independently and
hesitation. identify the main
functions.
• list some connections • list some connections • list some connections • list some connections
between computational between computational between computational between computational
Generalization thinking with other thinking with other thinking with thinking with other
subjects with limited subjects with developing other subjects with subjects with high level
understanding. understanding. understanding. understanding.
106
Grade 7
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• use inappropriate logics • use few appropriate logics • use most of the • use appropriate logics
to describe the algorithm. with frequent errors to appropriate logics with accurately to describe the
• demonstrate limited describe the algorithm. few errors to describe the algorithm and search for
capability of designing • demonstrate some algorithm and its basic the most efficient and
algorithm. capability of designing element steps. effective solution.
algorithm with poor • demonstrate high • demonstrate excellent
Algorithmic Thinking organization methods. capability of designing capability of designing
algorithm with good algorithm and
organization methods. organization methods
and able to adapt the
algorithm to the context
of the problem.
• break down problem into • break down problem into • break down problem into • break down problem into
modules with a lot of modules with a frequent modules with few missing modules without missing
Decomposition missing information. missing information. information and explain information, identify the
their functionalities with main functionalities with
hesitation. confidence.
• define the concept • define the concept of • define the concept or • define the concept or
of simulation with simulation hesitation and simulation with good simulation accurately
struggle and limited frequent errors but know understanding and with high understanding
understanding and unable that simulation can be identify what kind of and explain how
to explain the benefit of used to represent some problems can be solved simulation is used
using simulation. problems. with simulation. to represent natural
Abstraction • list few simulation and • list different simulation • list many simulation phenomena.
modelling tools but and modelling tools but and modelling tools • list most of the simulation
unable to use them. unable to categorize and categorize them and modelling tools,
them. correctly based on their categorize them correctly
functionalities. and explain their
functionalities.
107
Grade 8
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• identify some mistakes in • identify few mistakes in • identify many mistakes • identify all the mistakes
the algorithm. the algorithm. in the algorithm as well in the algorithm and
• demonstrate limited • demonstrate the concept as correct these mistakes correct them in with high
ability of understanding of parallel processing with few errors. accuracy.
concept of parallel with hesitation and • demonstrate the • demonstrate the concept
processing. uncertainty. concept of parallel of parallel processing with
• use different techniques • use different techniques processing without errors accuracy and confidence
to solve a problem with to solve a problem with and recognize some and recognize many
Algorithmic Thinking many mistakes. repeated mistakes. advantages of it. advantages of it and able
• represent data in various • represent data in various • use different techniques to list some examples
forms but with many forms but with frequent to solve the problem with of it.
mistakes. mistakes and list them few mistakes. • use different techniques
with many errors. • represent data in various to solve a problem
forms but with few accurately.
mistakes and list them • represent data in various
with few errors. forms but without
mistakes and list them
accurately.
• describe how a simulation • describe how a simulation • describe how a simulation • describe how a simulation
can be used to solve a can be used to solve a can be used to solve a can be used to solve a
problem with reasonable problem with frequent problem with few errors problem accurately and
Abstraction accuracy. errors and list few and list and explain use simulation tools to do
simulation tools. different simulation tools simple experiments and
used to perform simple discuss the correctness of
experiments. the result.
108
Grade 9
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• define what is the • determine the complexity • determine the complexity • determine the complexity
complexity of the of the algorithm by of the algorithm by of the algorithm by
algorithm with struggle in counting the number of counting number of counting number of steps
the definition. steps with only few errors. steps with only few errors with no errors and replace
• search in a given problem • search in a given problem and remove duplicate or duplicate or ambiguous
looking for some value looking for specific value ambiguous steps. steps with more efficient
or items with frequent such as maximum or • search in a given problem steps.
errors. minimum value with looking for specific value • accurately apply different
Algorithmic Thinking • define sorting concept some errors. such as maximum or searching technique in a
with struggle and unable • define sorting concept minimum value with few given problem looking for
to list different sorting with some errors and errors. specified value.
techniques. apply one sorting • define sorting concept • define sorting concept
technique. with few errors and accurately and apply
apply multiple sorting multiple sorting
techniques. techniques, and
distinguish between
searching and sorting.
• describe the concept • describe the concept • describe the concept • describe the concept
of divide and conquer of divide and conquer of divide and conquer of divide and conquer
algorithm in theory with technique with little technique to solve large technique to solve large
Decomposition hesitation and struggle. hesitation. problem accurately and problem accurately and
describe the process of describe the process of
usability. usability in theory and
gives example of it.
109
Grade 10
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• calculate the number • calculate the number of • calculate the number • calculate the number
of steps in a simple steps required by simple of steps required by of steps required by
algorithm with plus or algorithms with rare complicated algorithm complicated algorithms
minus 1 mistake in the mistakes. with some mistakes. accurately.
count. • write algorithm • write algorithmic • write algorithmic
Computer Networks • write algorithm instructions from flow instructions and draw instructions and draw
instruction from flow charts containing control flow charts with control flow charts with control
charts with some statements with some statement with little statement with no
mistakes and with no mistakes. mistakes. mistakes.
control statements.
• assess what certain parts • determine the • determine the • assess the functional
of the algorithm do, but functionality of the functionality of the correctness and prove
Evaluation not grasp the whole algorithm algorithm and compare it that the algorithm works.
picture. against some criteria.
• show a basic ability to • show a basic ability to use • show a good ability to • clearly identify objects,
use functions with some functions but more can decompose an algorithm functions, and design the
Decomposition mistakes. be done to improve the into functions and flow of the algorithm.
structure. objects.
• remove some details but • remove details but keeps • remove unnecessary • remove unnecessary
keeps a lot of unnecessary some of the unnecessary details and is able to use details and uses the
Abstraction details or omits some details. some data structures. right data structures
necessary information. appropriately.
• find patterns in some • find patterns in most • find patterns with great • find patterns in data and
cases but misses a lot of cases with some mistakes. confidence but unable relates Computer Science
Generalization possible outcomes. to relate to real-life problems to real-life
problems. problems.
110
Grade 10A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• calculate the number • calculate the number of • calculate the number • calculate the number
of steps in a simple steps required by simple of steps required by of steps required by
algorithm with plus or algorithms with rare complicated algorithm complicated algorithms
minus 1 mistake in the mistakes. with some mistakes. accurately.
count. • write algorithm • write algorithmic • write algorithmic
Computer Networks • write algorithm instructions from flow instructions and draw instructions and draw
instruction from flow charts containing control flow charts with control flow charts with control
charts with some statements with some statement with little statement with no
mistakes and with no mistakes. mistakes. mistakes.
control statements.
• assess what certain parts • determine the • determine the • assess the functional
of the algorithm do, but functionality of the functionality of the correctness and prove
Evaluation not grasp the whole algorithm. algorithm and compare it that the algorithm works.
picture. against some criteria.
• show a basic ability to • show a basic ability to use • show a good ability to • clearly identify objects,
use functions with some functions but more can decompose an algorithm functions, and design the
Decomposition mistakes. be done to improve the into functions and objects flow of the algorithm.
structure.
• remove some details but • remove details but keeps • remove unnecessary • remove unnecessary
keeps a lot of unnecessary some of the unnecessary details and is able to use details and uses the
Abstraction details or omits some details. some data structures right data structures
necessary information. appropriately.
• find patterns in some • find patterns in most • find patterns with great • find patterns in data and
cases but misses a lot of cases with some mistakes. confidence but unable relates Computer Science
Generalization possible outcomes. to relate to real-life problems to real-life
problems. problems.
111
Grade 11
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• identify what parts of a • identify what parts of • identify what parts of a • identify what parts of a
program do with some a program but not the program do along with program do along with
mistakes but not the complete program. the complete program the complete program
complete program. • write iterative code with with some mistakes. with rare mistakes.
Computer Networks • write iterative code with little mistakes. • write iterative code and • write iterative code and
some mistakes. procedures with some procedures.
mistakes. • recognize hard and
complicated problems
from easy ones.
• prove simple facts about • prove correctness of • prove correctness of • prove correctness of
algorithms. algorithms with some algorithms to some algorithms.
Evaluation mistakes. extent. • prove bounds on the
number of steps required.
• show limited ability to • analyze problems and • analyze problems and • analyze problems and
analyze problems. divide into pieces but can divide into pieces with divide into pieces.
improve further. simple mistakes. • divide the required
• divide the required processing into
Decomposition processing into concurrent tasks with
concurrent tasks with some mistakes.
some mistakes. • divide the data into
parallel streams for
processing.
• identify some patterns • identify patterns with • identify patterns with • identify patterns with
with a large number of some mistakes. some mistakes. some mistakes.
mistakes. • perform some abstraction • perform some abstraction • perform some abstraction
to reduce problem to reduce problem to reduce problem
Abstraction complexity but keeps complexity but keeps complexity but keeps
some unnecessary details. some unnecessary details. some unnecessary details.
• Test scientific hypothesis • able to test scientific
with some mistakes. hypothesis using models
and simulation.
• map real-life problems to • map real-life problems to • map real-life problems • map real-life problems
Computer science with a Computer science with a to Computer science to Computer science
lot of mistakes. some mistakes. problems. problems.
Generalization • use Computer Science • use Computer Science
solutions to solve other solutions to solve other
problems with some problems.
mistakes.
112
Grade 11A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• identify what parts of a • identify what parts of • identify what parts of a • identify what parts of a
program do with some a program but not the program do along with program do along with
mistakes but not the complete program. the complete program the complete program
complete program. • write iterative code with with some mistakes. with rare mistakes.
Computer Networks • write iterative code with little mistakes. • write iterative code and • write iterative code and
some mistakes. procedures with some procedures.
mistakes. • recognize hard and
complicated problems
from easy ones.
• prove simple facts about • prove correctness of • prove correctness of • prove correctness of
algorithms. algorithms with some algorithms to some algorithms.
Evaluation mistakes. extent. • prove bounds on the
number of steps required.
• show limited ability to • analyze problems and • analyze problems and • analyze problems and
analyze problems. divide into pieces but can divide into pieces with divide into pieces.
improve further. simple mistakes. • divide the required
• divide the required processing into
Decomposition processing into concurrent tasks with
concurrent tasks with some mistakes.
some mistakes. • divide the data into
parallel streams for
processing.
• identify some patterns • identify patterns with • identify patterns with • identify patterns with
with a large number of some mistakes. some mistakes. some mistakes.
mistakes. • perform some abstraction • perform some abstraction • perform some abstraction
to reduce problem to reduce problem to reduce problem
Abstraction complexity but keeps complexity but keeps complexity but keeps
some unnecessary details. some unnecessary details. some unnecessary details.
• test scientific hypothesis • test scientific hypothesis
with some mistakes. using models and
simulation.
• map real-life problems to • map real-life problems to • map real-life problems • map real-life problems
Computer Science with a Computer Science with a to Computer Science to Computer Science
lot of mistakes. some mistakes. problems. problems.
Generalization • use Computer Science • use Computer Science
solutions to solve other solutions to solve other
problems with some problems.
mistakes.
113
Grade 12
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• create algorithms with • create algorithms with • create algorithms with • create algorithms with
major mistakes. some mistakes. very minor mistakes little or no mistakes
Computer Networks • address user abilities to • address user abilities to
some extent. some extent.
• decompose a problem • decomposes artifacts into • decomposes artifacts into • decomposes artifacts into
into smaller sub problems smaller sub problems with smaller sub problems with smaller sub problems.
with some mistakes. some mistakes. minor mistakes. • apply divide and conquer
• apply divide and conquer • apply divide and conquer approach to more
Decomposition approach to simple approach to simple complicated problems.
problems. problems. • apply recursive approach
• apply recursive approach to develop algorithms.
to develop algorithms
with teacher’s help.
• identify the Computer • identify the Computer • identify the Computer • identify the Computer
Science connection with Science connection with Science connection. Science connection.
Generalization major teacher’s help, but some help. • identify the solution with • identify the solution with
not the solution. • identify the solution with some of teacher’s help. some of teacher’s help.
major help.
114
Grade 12A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Computational
may be able to: is able to: is able to: is able to:
Thinking
• create algorithms with • create algorithms with • create algorithms with • create algorithms with
major mistakes. some mistakes. very minor mistakes. little or no mistakes.
Computer Networks • address user abilities to • address user abilities to
some extent. some extent.
• decompose a problem • decomposes artifacts into • decomposes artifacts into • decomposes artifacts into
into smaller sub problems smaller sub problems with smaller sub problems with smaller sub problems.
with some mistakes. some mistakes. minor mistakes. • apply divide and conquer
• apply divide and conquer • apply divide and conquer approach to more
Decomposition approach to simple approach to simple complicated problems.
problems. problems. • apply recursive approach
• apply recursive approach to develop algorithms.
to develop algorithms
with teacher’s help.
• identify the Computer • identify the Computer • identify the Computer • identify the Computer
Science connection with Science connection with Science connection. Science connection.
Generalization major teacher’s help, but some help. • identify the solution with • identify the solution with
not the solution. • identify the solution with some of teacher’s help. some of teacher’s help.
major help.
115
116
Sample Activities
117
118
Sample Activity (Grade 1):
By the end of Grade 1, the student will be able to:
Grade 1
• Solve simple • Give simple maze • Give students maze and ask them • Being able to solve maze in a given
maze following and ask student to to solve it. time.
step by step solve it.
solution pattern.
• Play guessing • Guessing the • Student given an online guessing • Being able to play the guess game
games with matching shape game and asked to solve it. in given time.
classmate between two
to develop different groups of
guessing shapes.
Algorithmic Thinking strategy.
• Illustrate • Steps needed to • Student asked to draw the steps • Students can be assessed based
steps needed come to school. needed to come to school. on the completed number of
to complete steps.
simple task
using simple
computer
graphics
program.
• Sort objects in a • Sort balls of • Given number of balls and ask • Assessment will be based if the
requested order. different sizes students to sort them from sorting was done correctly in the
Abstraction from smallest to smallest to biggest. given time.
biggest.
119
Sample Activity (Grade 4):
By the end of Grade 4, the student will be able to:
Grade 4
• Provide • Give instruction • Using code.org give instructions • If the program developed using
appropriate on how to draw to the character to draw a snow code.org correctly draws the snow
logical a snow flake by flake by repeating some activities. flake.
instructions to repeating some
solve logical activities.
problems.
• Illustrate step by • Given step by • Ask students to perform the • The multiplication result is correct
step instructions step instructions multiplications of 12 * 15 in a step and the presented steps are clear.
to perform on how to do the by step manner.
multiplications multiplications of
Algorithmic Thinking and division. the numbers 12
* 15.
• Illustrate the • Given a sorted • Given a sorted set of balls of • The student was able to list the
process of set of balls of different sizes, ask students to complete steps correctly in the
inserting new different sizes, illustrate the steps needed to right order.
object in an ask students to insert a new ball in the correct
already sorted illustrate the steps place.
set of objects. needed to insert
a new ball in the
correct place.
• Sort given sets • Given unsorted • Students are given unsorted set of • Students were able to sort the
of objects in set of balls balls with different sizes. Students objects with the minimum
an efficient with different are asked to sort them with number of steps.
way (minimum sizes. Students minimum number of steps.
number of are asked to
steps). sort them with
minimum number
of steps.
Abstraction • Insert new item • Given a sorted • Given a basketball team with • Students were able to give the
in an already set of balls of sorted member from shortest to correct steps with the minimum
sorted set of different sizes, tallest. Ask student to insert new number of steps.
items in an ask students to player in the correct place with
efficient way illustrate the steps minimum number of steps.
(minimum needed to insert
number of a new ball in the
steps). correct place with
minimum number
of steps.
120
Sample Activity (Grade 7):
By the end of Grade 7, the student will be able to:
Grade 7
• Student is able • Student is given • Given 5 grades: 20,78,49,80,77 • Given 10 grades, write an
to develop a problem where Design an algorithm to find and algorithm to find the average
a simple it contains display the average of students, of student grades, find the
understanding conditions and draw flowchat maximum and print the average
of an algorithm. repetitions and Hint: and the maximum value.
his/her task 1. Repeat 5 times
is to develop 2. Get student grade
algorithm/ 3. Add grade to sum
flowchart to 4. Compute average=Sum/5
achieve that task. 5. Display average
Algorithmic Thinking
• Student is able • Student is given a • Given a problem of designing a • Given the length (L) and width
to define the problem and his/ simple calculator student can (W) of a rectangle, write functions
concept of her task to divide design a pseudo code for addition, pseudo code to calculate and
modularity for the problem into subtraction, multiplication and display the perimeter and area of
solving large small problems division. the rectangle.
problems. using different e.g:
Decomposition modules. 1. Function Add(num1, num2) 1. Function Calc_Perim(L, W)
2. display num1+num2 2. return L*W;
3. End 3. End
121
Grade 7
• Student is able • Student is able • Definition: simulation as an • Define the concept of simulation
to understand to define the imitation of the operation of a and list some area of applications.
the concept of concept of real-world process or system over
simulation. simulation and list time
some application • area of Applications:
areas where Manufacturing Applications, Risk
simulation can be analysis, semiconductor, military
applied. application, transportation
modes and Traffic, business
Process Simulation, Health Care,
computer Simulation, Network
simulation
• Student is able • Student is able • Given a number 157 in Base 10, • Give a formative assessment of
to understand to develop an your task is to convert it to binary quiz at the end of the binary
the connections understanding of number. conversion exercise to prompt
Abstraction between the relationship • Hint: Divide the number by students on progress and show
Computer between the 2 every time and look for the changes required for success of
Science and binary number reminder conversion application.
other fields. system and • e.g. Convert binary code
computer logic. (10100101)
Also, student • to Decimal number.
learns how to • e.g. Convert Decimal number
convert Base 10 (176)
numbers into • to binary code.
binary and vice
versa.
• Student is able • Student is given a • Given a problem of designing a • Given the length (L) and width
to define the problem and his/ simple calculator student can (W) of a rectangle, write functions
concept of her task to divide design a pseudo code for addition, pseudo code to calculate and
modularity for the problem into subtraction, multiplication and display the perimeter and area of
solving large small problems division. the rectangle.
problems. using different e.g
Generalization modules. 1. Function Add(num1, num2) 1. Function Calc_Perim(L, W)
2. display num1+num2 2. return L*W;
3. End 3. End
122
Sample Activity (Grade 10):
By the end of Grade 10, the student will be able to:
Grade 10
• Calculate the • The student • The teacher can use the array • The assessment will be an ON/
number of is given an search problem as startup OFF assessment, partial credit can
steps required algorithm in example. Different search be given for + - 1 step mistakes.
to finish the pseudo code algorithms can be used.
algorithm steps and is asked to Alternatively, the teacher can use
calculate the sample program or pseudo code
number of steps it for the students to evaluate the
takes to find the number of steps required.
solution. Complex
problems should
typically take
more steps to
solve.
• Write • The student is • A simple activity would be to • The assessment need to measure
instructions given a number of take a daily process, like washing if the student understands that
that if followed simple processes hair, preparing a sandwich, or the steps need to be specified in
Algorithmic Thinking in a given order and is asked preparing to go to school. Then, a correct order and that certain
(sequences) to provide the the students are asked to write steps cannot be implied and has
achieve a steps required to down the steps involved in to be explicitly mentioned.
desired effect achieve the final sequence. Reenactment of the
output. process will help the students
learn the mistakes they made in
the description.
• Write • The student is • A simple activity like to choose • The assessment should measure
instructions that given a simple going left or right while driving, the correct implementation of
choose between problem to choosing more salt, choosing diet the condition statement and the
different choose between or normal coke, etc. actions taken based on whether
constituent two or more the condition is true or false.
instructions options, students
(selection) should write the
to achieve a instruction that
desired effect implement the
selection process.
123
Grade 10
• Verify that an • Given an • For example, given an algorithm • The assessment will need to
algorithm works algorithm the of linear search, the student consider all the elements of the
(proof) student is asked needs to be able to show that the solution and identify the role of
to describe algorithm will go over all element each element.
the working of and that the comparison is
the algorithm performed correctly.
(functionality)
• Assess whether • This part relates • Students should be asked to write • The assessment will be based
a solution meets to specific criteria a console program with menu on practical evaluation of the
the specification and whether items and they need to make sure developed methods for handling
(criteria) error checking, that the program performs the user behavior or incorrect inputs.
bounds, etc. are right check
performed. Also,
in case users make
mistakes, the
program should
behave graciously.
• Assess that an • Sometimes the • The student is given an algorithm • The assessment should be based
algorithm is fit algorithm will do and asked to describe what cases on whether the student gets the
for purpose more or less of handled by the algorithms and right number of steps for each
what is required. which are not. case. Partial credit for an off by 1
This part related mistake.
Evaluation to the exact
functionality of
the algorithm
• Assess whether • Given a problem • The student is given an algorithm • The assessment is based on how
an algorithm description and in pseudo code, for example close the student describe the
does the an algorithmic multiplication using shift and functionality of the algorithm in
right thing solution. The addition, and is asked about the exact terms.
(functional student needs functionality of the algorithm.
correctness) to verify that
the algorithm
functionality is
correct.
• Compare and • Different data • A great example would be to • The assessment will be based
contrast simple structures may compare and contrast arrays and on direction questioning of the
data structures perform similar linked lists. The student need advantages and disadvantages of
and their uses functionalities to identify the advantages and each data structure in comparison
but fits different disadvantages of each in terms to others.
purposes. The of speed, memory requirements,
student will learn ease of use, etc.
to appreciate that
various tradeoffs
in using different
structures.
• Group a • Some problems • The students may be asked to • The assessment should be based
collection of are too analyze a simple program, divide on the clear distinction of the
instructions complicated to it into; input handling subsystem, multiple components, how the
that do a well- be considered processing subsystem, and output data flows, and how the results
defined task as one whole. subsystem. It is essential to are integrated and merged
Instead separating identify how the data flows from together.
Decomposition the problem into one subsystem to another.
multiple parts can
help understand
it and develop
solutions with
ease.
124
Grade 10
• Reduce • Several processes • A good example would be the • The assessment should be based
complexity involves data process of student movement in on the ability of the student
by removing patterns that and out the school. The pattern to correct identify all or most
unnecessary maybe useful exhibited is that they mostly patterns in a problem.
detail. for some more arrive between 7:30 and 8 in the
advanced topics. morning, and leave between 3 and
The students 3:30 in the afternoon.
are required to
identify such data
patterns.
• Choose a way • Object and • A good example would be to • The assessment would be based
to represent process modeling consider a process (e.g., student on whether the student identifies
artefacts and the various registration) and then the all the elements correctly, does
(whether type of modeling students are asked to describe the not miss any processing elements,
objects, diagrams can be flow of data, the processing units, the flow of data is correct, the
problems, presented here. the start, the finish, the conditions conditions are correct, and the
Abstraction processes or that get checked along the way, processing is complete.
systems) to etc.
allow it to be
manipulated in
useful ways
• Hide complexity • A lot of data • An example of student records • The assessment should take
in data, for structure help can be given, the student under consideration the correct
example by in simplifying information can be grouped grouping of related data and
using data the complexity into one data object instead of any missed opportunities for
structures of the data. The many separate data entities. The grouping.
purpose of this students can be given a problem
outcome is to description and group the
identify how data data together into meaningful
are structured and structures.
the benefits of
this structuring.
• Identify • Several problems • Students can be given an example • The assessment is based on
patterns and masquerading of finding the phone number of whether the student is able to find
commonalities as unrelated a person from the phone book. the correct symmetry or not. The
in problems, Computer Science The numbers are the elements of student may need hints to come
processes, problems can be the array and finding the correct up with the solution. In this case,
Generalization solutions, or discussed then phone number is a typical search partial credit maybe considered.
data pointing out in array problem.
that they can be
considered as
Computer Science
ones.
125
126
Programming
Evolution
Human Computer
Interaction
Data Representation
Coding
Documentation and
Deployment
127
128
Domain 3: Computer Practice and
Programming (CPP)
Definition
In this domain students are taught the principles of information and computation, and how to put this knowledge to use through programming.
Computer programming is the process of writing computer programs. It is the process that starts from the understanding of a real word problem that
is formulated as a computer problem, followed by the development of an algorithm. Then, this algorithm is implemented in a programming language
and tested on several instances of the given problem for correctness, validity and efficiency1.
Upon completion of this domain, students are able to:
1. analyze the problem and identify the various requirements
2. understand algorithms, logic and data representation
3. translate algorithms into computer programs
4. test computer programs for correctness and validity
5. document computer programs properly
Generic Outcomes
KG - G5 (cycle 1)
By the end of cycle 1, students will be able to:
1. understand the basic fundamental principles and concepts of computer programming.
2. apply the fundamental principles and concepts of computer programming to solve age appropriate problems.
3. umplement problem solutions using age appropriate application like games, simulations, etc.
Student understands the basic fundamental principles and concepts of computer programming and uses them to solve age appropriate problems.
Then he/she implements these solutions using age appropriate computer tools.
G6 - G9 (cycle 2)
By the end of cycle 2, students will be able to:
1. analyze a given problem in order to generate a computer-based solution.
2. design, develop, test and deploy an application using appropriate software.
3. create digital story using appropriate programming tool.
Student demonstrates the ability to analyze a given problem and finds a computer based solution. Using an appropriate software tool, he/she designs,
develops, tests and deploys an application for the given problem. Also he/she creates digital story using appropriate programming tool.
1 http://csta.acm.org/java programming from analysis to program design (introduction to programming) by d.s. malik
129
G10 - G12 (cycle 3)
By the end of cycle 3, students will be able to:
1. demonstrate the use of a programming language to solve a variety of problems.
2. develop and deploy applications to solve real life problems.
3. implement and evaluate alternative solutions for the same problem.
Student demonstrates the ability to define the requirements of a variety of real life problems, design solutions for them and use a programming
language to implement the solutions. Student is able to test and validate these solutions. Also he/she has the capability to compare and evaluate
different solutions for the same problem.
Student demonstrates with professionalism the ability to define the requirements of a variety of real life problems, design solutions for them and use a
programming language to implement the solutions. Student is able to test and validate these solutions. The students will demonstrate high capability
to compare and evaluate different solutions for the same problem.
130
Strands Description and Technical Keywords
Refers to the methods used internally to represent information stored in a Variables, Primitive data types,
computer arithmetic expressions, Logical
2 Data Representation
expressions, array, store, Retrieve,
Operator precedence
Involves the study, planning, design and uses of the interfaces between people Objects, Elements, Visible, Non
Human Computer
3 (users) and computers. Visible, Graphical User Interface
Interaction (HCI)
(GUI ), Input, Output
Translating algorithms into a programming language Sequence, drag and drop, block
programming, loops, iteration,
selection, control, conditional,
visual programming, mobile
programming, logical operators,
4 Coding mathematical operators, built -
in function, function, modules,
event driven programming,
object oriented programming,
object, events, behavior,
property, game, array
Apply a series of test cases to a program to determine if it is working properly Run program, build, clean, trace,
Testing and locate errors, fix errors, debug,
5
Validation testing, input data, output data,
compile
Choose proper names for variables, indent the program properly and Comments - Explanation -
Deployment and comment the program to make it easy to understand Messages - documentation
6
Documentation standards, naming standards,
platform, framework
Data Representation
Coding
131
Student Learning Outcomes distribution Per Grade
Cycle 1 Cycle 2 Cycle 3 Cycle 3A
Domains Strand
KG1 KG2 G1 G2 G3 G4 G5 G6 G7 G8 G9 G10 G11 G12 G10A G11A G12A
Programming Evolution 0 0 0 0 0 0 0 0 0 0 2 2 4 4 2 2 8 4 2 2 8
Computer Practice and Programming
Data Representation 0 0 0 0 1 1 1 3 1 1 1 1 4 3 0 0 3 3 0 0 3
Human Computer
0 0 0 0 0 1 1 2 2 1 1 1 5 3 4 2 9 3 4 2 9
Interaction (HCI)
Coding 2 2 2 2 2 2 2 14 3 3 3 2 11 5 3 3 11 5 3 3 11
Cycle 1 Cycle 2
6% 10% 10%
6% 25% 10%
34%
12%
Data Representation Data Representation
DataProgramming Evolution (HCI)
Programmin Coding Testing and DataProgramming
Deployment Evolution (HCI)
Programmin 15% Coding Testing and Deployment
Representati
(HCI) g Evolution 44%
Validation and
Representati
(HCI) g Evolution Validation and
on Coding Documentati
on
on Coding
28% Documentati
on
Testing and Validation Testing and Validation
6 Deployment17and Documentation
20 24 13 20 6 Deployment
100 17and Documentation
20 24 13 20
Cycle 3 Cycle 3A
6% 6%
20% 20%
17% 17%
13% 13%
Data Representation Data Representation
Programming Evolution 20% Programming Evolution 20%
(HCI) (HCI)
Coding 24% Coding 24%
Testing and Validation Testing and Validation
Deployment and Documentation Deployment and Documentation
132
Percentage of outcomes as per level of difficulty and percentage wise
No of outcomes Outcomes Percentage
1 2 3 Sum 1 2 3
C1 C2 C3 C3A Total
CPP
4.65 7.75 27.9 32.6 73
133
Strands Evolution Per Grade
Domain Strand Grade 1 Grade 2 Grade 3 Grade 4 Grade 5
understanding of understanding of
the use of available the use of available
characters. characters.
Computer Practice and Programming
blocks to build code blocks to condition. solutions using a block based visual
programs using build programs block based visual programming
sequence and using sequence and programming language for
repetition. repetition. language for age appropriate
age appropriate problems.
problem.
134
Domain Strand Grade 6 Grade 7 Grade 8 Grade 9
• Student understands block • Student understands block • Student understands • Student understands
Programming
based programming tools. based programming tools. mobile programming different platforms.
Evolution
tools.
• Student is understand the • Student develops the • Student understand a UI • Student designs a UI
Interaction (HCI)
Computer Practice and Programming
concepts of event driven ability to create friendly appropriate for mobile appropriate for mobile
programming . user interface. device. devices.
• Student implements • Student is able to • Student is able to create • Student is able to create
solutions using a block implement solutions for mobile applications mobile applications
Coding
based programming tool. difficult problems using to address specific to address specific
a block based visual objectives using graphical objectives using graphical
programming tool. application development application development
environment. environment.
• Student understands how • Student is able to test • Student understands how • Student tests the
to test their programs for programs for correctness. to test the behavior of the suitability of the
Testing and
Validation
• Student is able to add • Student makes the • Students are able to create • Student is able to create
Deployment and
Documentation
explanation to their program easy to read and user friendly application. and deploy user friendly
programs. understand. application.
135
Domain Strand Grade 10 Grade 11 Grade 12
• Student develops understanding of • Student demonstrates knowledge of • Students understand the use of
Representation
using primitive data types using one dimension array multi-dimension arrays
• Student demonstrates capability to
Data
• Student finds out the required input/ • Student demonstrates the capability • Student is able to design and use
Interaction (HCI)
output data of a given a problem to format the input/output graphical user interface (GUI)
• Student manipulates input/output
files
• Student understands and use • Student demonstrates the knowledge • Student demonstrates the use of
assignment statement to solve problem that use selection pre-defined modules and designs and
Coding
• Student is able to test programs for • Student is able to test complex • Student understands the use of unit
correctness programs for correctness testing
Testing and
Validation
• Student writes programs easy to read • Student develops user friendly • Student is able to develop user
Deployment and
Documentation
136
Domain Strand Grade 10A Grade 11A Grade 12A
• Student develops understanding of • Student demonstrates knowledge of • Students understand the use of
Representation
using primitive data types using one dimension array multi-dimension arrays
• Student demonstrates capability to
Data
• Student finds out the required input/ • Student demonstrates the capability • Student is able to design and use
Interaction (HCI)
output data of a given a problem to format the input/output graphical user interface (GUI)
• Student demonstrates capability to
work with files
• Student understands and use • Student demonstrates the knowledge • Student demonstrates the use pre-
assignment statement to solve problem that use selection defined modules and designs and
Coding
• Student demonstrates the use and repetition uses modules including recursive
sequence and selection statements module
• Student is able to test and validate • Student is able to test complex • Student understands the use of unit
programs for correctness programs for correctness testing
Testing and
Validation
• Student writes programs easy to read • Student develops user friendly • Student is able to develop user
Deployment and
Documentation
137
Integration between CPP domain and other domains
CPP CT DLC CCC
Data Representation
138
Scope and Sequence
Domains, Strands and Standards by Grade
139
140
Grade: KG1
Grade: KG2
Grade: 1
141
Grade: 2
Grade: 3
142
Grade: 4
143
Grade: 5
144
Grade: 6
(G6.3.6.2.2) 1
Deploy the application on the chosen
platform.
145
Grade: 7
3. (G7.3.4.7.3) 3
Computer Create project to perform specific
Practice and tasks.
Programming
(3.5) (3.5.6) (G7.3.5.6.1) 1
Testing and Student tests programs for Test the project for correctness and
Validation. correctness. validity.
(G7.3.6.3.2) 1
Insert useful comments to the
program.
(G7.3.6.3.3) 1
Identify requirements to execute
applications.
146
Grade: 8
(G8.3.6.3.2) 2
Make mobile application easy to
understand.
(G8.3.6.3.3) 2
Choose appropriate devices and
platform for execution.
147
Grade: 9
(G9.3.5.7.2) 2
Evaluate results against initial
requirements.
(G9.3.6.4.2) 2
Deploy the application on the
appropriate mobile device.
148
Grade: 10
(G10.3.1.6.3) 1
Illustrate the use of a translator.
(3.2.3) (G10.3.2.3.1) 1
Student demonstrates capability Evaluate arithmetic expression.
to manipulate arithmetic and
logical expressions properly. (G10.3.2.3.2) 1
Evaluate logical expression.
(G10.3.3.5.3) 1
Demonstrate the capability to output
data to screen.
(G10.3.4.8.2) 2
Create programs which have
assignment statements.
(3.4.9) (G10.3.4.9.1) 2
Student demonstrates the Choose which type of selections to
use sequence and selection use.
statements.
(G10.3.4.9.2) 2
Create programs containing a set of
sequence statements.
(G10.3.4.9.3) 3
Create programs which make
decision.
149
Grade: 10
(G10.3.5.8.2) 2
Choose test data to cover all possible
cases.
3.
Computer (3.6) (3.6.5) (G10.3.6.5.1) 1
Practice and Deployment and Student writes programs easy to Name variables properly.
Programming Documentation read and understand.
(G10.3.6.5.2) 1
Insert comments to explain the
program.
(G10.3.6.5.3) 1
Indent the different statements
properly.
150
Grade: 10A
(G10A.3.1.6.3) 2
Illustrate the use of a translator.
(3.2.4) (G10A.3.2.4.1) 1
Student demonstrates Evaluate complex arithmetic
capability to manipulate expression.
complex arithmetic and logical
expressions properly. (G10A.3.2.4.2) 1
Evaluate complex logical expression.
(G10A.3.3.5.3) 1
Demonstrate the capability to output
data to screen.
(G10A.3.4.8.2) 2
Create programs which have
assignment statements.
(3.4.9) (G10A.3.4.9.1) 2
Student demonstrates the Choose which type of selections to
use sequence and selection use.
statements.
(G10A.3.4.9.2) 2
Create programs containing a set of
sequence statements.
(G10A.3.4.9.3) 3
Create programs which make multi-
way decision.
151
Grade: 10A
(G10A.3.6.5.3) 1
Indent the different statements
properly.
152
Grade: 11
(G11.3.2.2.2) 2
Identify problems solvable using
arrays.
(3.3.7) (G11.3.3.7.1) 2
Student manipulates input/ Demonstrate the ability to read data
output files. from files.
(G11.3.3.7.2) 2
Demonstrate the ability to display
data to files.
(G11.3.4.9.3) 3
Create complex program to solve real
life problems.
(G11.3.5.10.2) 2
Identify test data to test border cases.
(G11.3.6.6.3) 1
Indent the different statements
properly.
153
Grade: 11A
(G11A.3.2.2.2) 2
Identify problems solvable using
arrays.
(3.3.8) (G11A.3.3.8.1) 2
Student demonstrates capability Manipulate input data files.
to work with files.
(G11A.3.3.8.2) 2
Manipulate output data files.
(G11A.3.4.9.3) 3
Create efficient complex program to
solve real life problems.
(G11A.3.5.10.2) 2
Identify test data to test border cases.
(G11A.3.6.6.3) 1
Indent the different statements
properly.
154
Grade: 12
(G12.3.5.11.2) 2
Choose suitable data to test whole
program.
(G12.3.6.6.3) 2
Deploy the application on the
appropriate platform.
155
Grade: 12A
(G12A.3.5.11.2) 2
Choose appropriate data to test the
program.
(G12A.3.6.6.3) 2
Deploy the application on the
appropriate platform.
156
Student Performance Criteria
157
158
KG1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• understand how to sort • understand how to sort • understand how to sort • understand how to sort
Coding and arrange objects with and arrange objects with and arrange objects with and arrange objects
a lot of assistance. some assistance. little assistance. independently.
• confirm without • confirm that the set of • confirm that the set of • confirm with confidence
confidence that the set of items are sorted with items are sorted. that the set of items are
Testing and Validation items are sorted properly limited assistance. sorted properly.
with extensive assistance.
KG2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• understand how to sort • understand how to sort • understand how to sort • understand how sort
Coding and arrange objects with and arrange objects with and arrange objects with and arrange objects
a lot of assistance. some assistance. little assistance. independently.
• confirm without • confirm that the set of • confirm that the set of • confirm with confidence
confidence that the set of items are sorted with items are sorted. that the set of items are
Testing and Validation items are sorted properly limited assistance. sorted properly.
with extensive assistance.
Grade 1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• order a set of commands • order a set of commands • order a set of commands • order a set of commands
Coding in a dis - organized way. with some organization with most organization with organization and
and logic. and logic. logic.
• try to test the program • test the program and • test the program and • test the program and
Testing and Validation but unable to correct correct some errors (if correct most errors (if correct all errors (if any).
errors (if any). any). any).
159
Grade 2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• try to check the program • check the program and • check the program and • check the program
Testing and Validation but unable to correct correct some errors (if correct most errors (if completely and correct all
errors (if any). any). any). errors (if any).
Grade 3
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• use condition and logical • use condition and logical • use condition and logical • use condition and
Coding operations in wrong way. operations with some operations with very few logical operations with
errors. errors. confidence.
• test very few program • test program actions to • test most program • test all program actions
Testing and Validation actions but unable to some extend and correct actions and correct most and correct all errors (if
correct any errors (if any). some errors (if any). errors (if any). any).
160
Grade 4
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
Programming • list one programming • list few programming • list most programming • list all programming
paradigm or none. paradigms with some paradigms with few paradigms with
Evolution errors. errors. confidence.
• create inappropriate • create few appropriate • create inefficient but • create efficient and
Coding functions with many functions with some appropriate functions. appropriate functions.
errors. logical errors.
• test programs but unable • test programs, correct • test programs, correct • test programs, correct all
to correct most errors some errors and some most errors and most errors and all functions
Testing and Validation and all functions are functions can be functions can be are fully tested.
considered untested. considered as tested. considered as tested.
Documentation and • understand the benefit of • share undocumented • share documented stories • share well documented
sharing stories but unable stories with some with few difficulties. stories with no difficulties.
Deployment to do it. difficulties.
Grade 5
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list very few differences • list some differences • list most differences • list and discuss differences
Programming between programming between programming between programming between programming
Evolution paradigms with many paradigms. paradigms. paradigms.
errors.
• use sequences and loops • use sequences and loops • use sequences and loops • use sequences and loops
Coding with many errors. with some errors. with very few errors. with no errors.
• choose test data • choose test data to cover • choose test data to cover • choose efficient test data
randomly with no some cases, and correct most cases and correct to cover all cases and
Testing and Validation purpose and unable to some errors. most errors. correct all errors.
correct any errors.
• share fragmented and • share un - synthesized and • share synthesized and • share synthesized, well
Documentation and highly disorganized disorganized information organized information organized information so
information so the so the intended purpose inefficiently so the the intended purpose is
Deployment intended purpose is not is not fully achieved. intended purpose is fully achieved.
achieved. almost achieved.
161
Grade 6
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• identify one or two events • identify some events on • identify most of the • identify all the events
on which the code is which the code is based events on which the code on which the code is
HCI based. but unable to manipulate is based, differentiate based, differentiate
their attributes. between some them between their types
and manipulate their and manipulate their
attributes to some extend. attributes.
• identify few block based • identify few block based • identify most block based • identify block based
visual programming but visual programming and visual programming and visual programming and
Coding unable to use. use simple sequences use sequences, selections use sequences, selections
and selections with some and simple repetitions and simple repetitions
logical errors. with few errors. with no errors.
• test few events randomly • test some events in the • test most events in the • test all events in the
and unable to validate if program and unable program and validate program and validate
Testing and Validation any event is working as to validate if they are if they are working as if they are working as
intended. working as intended. intended. intended.
Documentation and • add very few and • add basic comments • add clear comments • add clear comments
confusing comments to including descriptions of including descriptions of including descriptions of
Deployment the program. some events. most events. all events.
162
Grade 7
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
Programming • list names of few blocks • list names of some blocks • list names of most blocks • list names of all blocks
with many errors. and describe their use and describe their use. and describe their use
Evolution with some errors. with confidence.
• try to make own artwork. • design interface using • design interface using • design interface using
readymade artwork with modified readymade own artwork in a creative
HCI no changes. artwork. way to support the
content.
• create projects that • create projects that • create projects that • create well-structured
match few aspects of match most aspects match most aspects projects that match all
Coding the storyboard and of the storyboard and of the storyboard and aspects of the storyboard
containing many errors. containing some errors. engage the users to some and engage the users.
extend.
• test the program but • test the program, correct • test the program, correct • test the program, correct
unable to correct any some errors (if any) and most errors and validate all errors and validate all
Testing and Validation error (if any) or validate validate some results. most results. results.
any result.
163
Grade 8
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list one or no mobile • list few mobile • list mobile programming • list mobile programming
Programming programming tools with programming tools with tools with some tools with knowledge of
Evolution many errors. limited knowledge of knowledge of their used. their use.
their user.
• list few data types, and • list some data types, • list some data types, and • list all data types, and use
Data Representation use with many mistakes. and use them with some use them properly with them properly.
mistakes. little help from teacher.
• test randomly few events • test few events and • test most of events and • test all events and correct
Testing and Validation and unable to correct any correct some of correct the erroneous the erroneous ones in a
of erroneous ones. erroneous ones. ones. systemic way.
• add very poor messages • add few messages to the • add enough messages • add meaningful messages
Documentation and or no message at all to the application and deploy it to the application and to the application
Deployment application. with assistance. deploy it with limited and deploy it with no
assistance. assistance.
164
Grade 9
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list few data types, and • list some data types, and • list some data types, and • list all data types, and use
Data Representation use them incorrectly. use them correctly with use them properly with them properly.
some mistakes. little help from teacher.
• create incomplete • create mobile application, • create mobile application, • create mobile application,
and incorrect mobile containing few objects containing many objects, containing many
Coding application containing with simple features, that matches most of objects, that matches all
one or two objects with that matches some requirements. requirements properly.
simple features. requirements.
• test the application • test the application to • test the application and • test the application
Testing and Validation without knowing if it some extend and correct correct most of the errors. and correct all errors in
works correctly. some errors. systematic way.
• include very few and • include few messages • include meaningful • include t meaningful
Documentation and poor messages in the in the application and messages in the messages in the
Deployment application. deploy it with some application and deploy it application and deploy it
assistance. with little assistance. with no assistance.
165
Grade 10
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list one or two examples • list few examples of • list many examples of • list and categorize
of programming programming languages programming languages, examples of programming
Programming languages but cannot without knowing the know the difference languages, use and
Evolution differentiate between difference between them between them and use a describe a compiler
them and unable to use a and use a compiler with compiler. properly.
compiler. difficulty.
• list few data types, use • list some data types, • list some data types, • list all data types, use
them incorrectly, and use them correctly, and use them properly, and them properly, and
Data Representation evaluate arithmetic and evaluate arithmetic and evaluate arithmetic and evaluate arithmetic and
logical expressions with logical expressions with logical expressions with logical expressions with
many errors. some errors. few errors. no errors.
• identify few of input/ • identify most of input/ • identify all input/output • identify all input/output
output but many output but most but few input prompts and all input prompts and
HCI input prompts and input prompts and and output descriptions output descriptions are
output descriptions are output descriptions are are inappropriate or appropriate.
inappropriate or missing. inappropriate or missing. missing.
• create programs that • create program that • create program that • create program that
contain syntax and logical produce incorrect results produce correct results produce correct results
Coding errors. for most input. for all input except for for all input.
special cases.
• choose test cases • choose test data to cover • choose test data to cover • choose test data to cover
Testing and Validation randomly to cover few some scenarios. most scenarios. all scenarios and validate
scenarios. all specification cases.
• name all variables very • name most variables • name most variables • name variables
Documentation and poorly, and produce very poorly, and produce badly properly, and produce properly, and produce
Deployment badly organized programs organized programs with organized programs with well organized and
with no comments. some comments. enough comments. documented programs.
166
Grade 10A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• list one or two examples • list few examples of • list many examples of • list and categorize
of programming programming languages programming languages, examples of programming
Programming languages but cannot without knowing the know the difference languages, use and
Evolution differentiate between difference between them between them and use a describe a compiler
them and unable to use a and use a compiler with compiler. properly.
compiler. difficulty.
• list few data types, use • list some data types, • list some data types, • list all data types, use
them incorrectly, and use them correctly, and use them properly, and them properly, and
Data Representation evaluate arithmetic and evaluate arithmetic and evaluate arithmetic and evaluate arithmetic and
logical expressions with logical expressions with logical expressions with logical expressions with
many errors. some errors. few errors. no errors.
• identify few of input/ • identify most of input/ • identify all input/output • identify all input/output
output but many output but most but few input prompts and all input prompts and
HCI input prompts and input prompts and and output descriptions output descriptions are
output descriptions are output descriptions are are inappropriate or appropriate.
inappropriate or missing. inappropriate or missing. missing.
• create programs that • create program that • create program that • create program that
contain syntax and logical produce incorrect results produce correct results produce correct results
Coding errors. for most input. for all input except for for all input.
special cases.
• choose test cases • choose test data to cover • choose test data to cover • choose test data to cover
Testing and Validation randomly to cover few some scenarios. most scenarios. all scenarios and validate
scenarios. all specification cases.
• name all variables very • name most variables • name most variables • name variables
Documentation and poorly, and produce very poorly, and produce badly properly, and produce properly, and produce
Deployment badly organized programs organized programs with organized programs with well organized and
with no comments. some comments. enough comments. documented programs.
167
Grade 11
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• define simple and • define most simple and • define all simple and • define and use all simple
Programming structured data types structured data types structured data types and structured data types
Evolution incorrectly and use them properly and use them properly and use them properly with no errors.
with many errors. with some errors. with few errors.
• create programs that • create programs with • create programs with • create programs with
contain many syntax and some logical errors that few logical errors that no errors that produce
HCI logical errors. produce correct results produce correct results correct results for all
for some input data. for most input data. input data.
• choose test cases • choose test data to • choose test data to • choose test data to cover
Coding randomly to cover few cover and validate some cover and validate most and validate all scenarios.
scenarios. scenarios. scenarios.
• name few arrays properly, • name some arrays • name most arrays • name all arrays
and produce very properly, and produce properly, and produce properly, and produce
Testing and Validation disorganized programs disorganized programs organized programs with well organized and
with no comments. with some comments. comments. documented programs.
• name all variables very • name most variables • name most variables • name variables
Documentation and poorly, and produce very poorly, and produce badly properly, and produce properly, and produce
Deployment badly organized programs organized programs with organized programs with well organized and
with no comments. some comments. enough comments. documented programs.
168
Grade 11A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• define simple and • define most simple and • define all simple and • define and use all simple
Programming structured data types structured data types structured data types and structured data types
Evolution incorrectly and use them properly and use them properly and use them properly with no errors.
with many errors. with some errors. with few errors.
• create programs that • create programs with • create programs with • create programs with
contain many syntax and some logical errors that few logical errors that no errors that produce
HCI logical errors. produce correct results produce correct results correct results for all
for some input data. for most input data. input data.
• choose test cases • choose test data to • choose test data to • choose test data to cover
Coding randomly to cover few cover and validate some cover and validate most and validate all scenarios.
scenarios. scenarios. scenarios.
• name few arrays properly, • name some arrays • name most arrays • name all arrays
and produce very properly, and produce properly, and produce properly, and produce
Testing and Validation disorganized programs disorganized programs organized programs with well organized and
with no comments. with some comments. comments. documented programs.
• name all variables very • name most variables • name most variables • name variables
Documentation and poorly, and produce very poorly, and produce badly properly, and produce properly, and produce
Deployment badly organized programs organized programs with organized programs with well organized and
with no comments. some comments. enough comments. documented programs.
169
Grade 12
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• define structured data • define structured data • define structured data • define and use structured
Data Representation types incorrectly and use types properly and use types properly and use data types properly.
them with many errors. them with some errors. them with few errors.
• design and implement • design and implement • design and implement • design and implement
very disorganized and disorganized GUI with organized GUI with few well organized friendly
HCI unfriendly GUI with many some logical errors. logical errors. GUI with no errors.
syntax and logical errors.
• create modular programs • create modular programs • create modular programs • create modular programs
that contain syntax and that produce incorrect that produce correct that produce correct
Coding logical errors. results for some input results for most input results for all input.
cases. cases.
• choose test cases • choose test data to • choose test data to cover • choose test data to cover
randomly to cover few cover most specification most specification cases all specification cases and
Testing and Validation specification cases but no cases but no use for unit and use unit testing to use unit testing properly.
use for unit testing. testing. some extent.
Documentation and • create very disorganized • create disorganized code • create organized code and • create well organized
code and very difficult to and difficult to follow. easy to follow to some code and easy to follow.
Deployment follow. extent.
170
Grade 12A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Digital Literacy and
may be able to: is able to: is able to: is able to:
Competence
• define structured data • define structured data • define structured data • define and use structured
Data Representation types incorrectly and use types properly and use types properly and use data types properly.
them with many errors. them with some errors. them with few errors.
• design and implement • design and implement • design and implement • design and implement
very disorganized and disorganized GUI with organized GUI with few well organized friendly
HCI unfriendly GUI with many some logical errors. logical errors. GUI with no errors.
syntax and logical errors.
• create modular programs • create modular programs • create modular programs • create modular programs
that contain syntax and that produce incorrect that produce correct that produce correct
Coding logical errors. results for some input results for most input results for all input.
cases. cases.
• choose test cases • choose test data to • choose test data to cover • choose test data to cover
randomly to cover few cover most specification most specification cases all specification cases and
Testing and Validation specification cases but no cases but no use for unit and use unit testing to use unit testing properly.
use for unit testing. testing. some extent.
Documentation and • create very disorganized • create disorganized code • create organized code and • create well organized
code and very difficult to and difficult to follow. easy to follow to some code and easy to follow.
Deployment follow. extent.
171
172
Sample Activities
173
174
Sample Activity (Grade 1):
By the end of Grade 1, the student will be able to:
Grade 1
• Arrange set of • Given a set • Use mouse to drag and drop • Drag and drop pieces of puzzle in
commands to of puzzle, puzzle pieces to connect together. the correct place.
perform tasks arrange them
to accomplish a
required task.
• Repeat a single • Count the • Give sequential command to a • Ask students to solve puzzles
Coding command number of times student and try to transform a using the smallest number of
an action should repeated command into a loop. blocks.
be executed and
represent it as a
single repeated
command.
• Run the • Run program with • Given a program for a particular • Students work through puzzles,
program for errors and show maze, check if the program solves find and correct bugs.
correctness how to find these the maze.
• Correct errors errors and correct
if any them.
Testing and Validation
175
Sample Activity (Grade 4):
By the end of Grade 4, the student will be able to:
Grade 4
Programming • List • Discuss different • Students describe a program in • List example of programming
programming programming their own language. paradigms.
Evolution paradigms paradigms.
• Create interface • Use different • Students animate multiple • Students apply a given set of
to a story characters to characters using events triggered instructions to design GUI.
using available create an interface by the arrow keys to tell a story.
characters to a story.
Human Computer
Interaction (HCI)
• Create function • Use a pre- • Students use sample functions to • Ask students to write functions
to accomplish determined draw images. on paper for simple shapes then
a task function to draw combine those functions to draw
an image. a picture.
Coding
• Test the • Debug each • Find and correct errors in • Run a program.
correctness of function in the functions.
Testing and Validation the function program.
• Test the whole
program
• Share link of a • Create a story and • Use function to draw a shape and • Draw a sample shape and share
story with other send the link to share the link with other students. the link with other students.
students other students.
Deployment and
Documentation
176
Sample Activity (Grade 7):
By the end of Grade 7, the student will be able to:
Grade 7
• Describe • Identity different • Students search about the • Ask student to compare different
categories types of blocks categories of blocks (motion and types of blocks.
of blocks in (motion and control) with the help of the tool
block based control blocks). used.
programming
tools
Programming
Evolution
• Design graphical • Discuss the use of • Use different types of objects to • Students apply a given set of
user interface different elements create a suitable interface for an instructions to design GUI.
for applications in an interface application
Human Computer
Interaction (HCI)
• Use different • Student should • Use sequence, loop, functions and • Ask students to create a project
types of be able to write conditions to create a program for for sun, moon and earth circle.
variables a program water cycle in life.
• Enhance the controlled by
layouts of some events.
applications
• Create project
Coding to perform
specific tasks
• Test the project • Track all • Divide students into groups to • Test program to check if it meets
for correctness sequential steps test each other’s application. the requirements.
Testing and Validation and validity of program for
correctness.
• Insert useful • Show programs • Given a program, discuss if it is • Add useful comments to the
Deployment and comments to that are easy well documented. program.
Documentation the program to read and
understand.
177
Sample Activity (Grade 10):
By the end of Grade 10, the student will be able to:
Grade 10
• Describe the • Discuss examples • Search the Inernet for different • list 4 or 5 programming languages
historical of programming programming languages (VB, C++ classify each one as high or low.
development of languages and Java). • Run a program.
programming (Scratch, • Compile and run a given program.
Programming languages GameSalad, VB
• List examples and java).
Evolution of computer • Compile and run
languages (low a program.
and high level)
• Illustrate the use
of a translator
• Define the • Give examples of • Give examples of data and find • Identify which type is suitable to
different data data and find the the suitable data type for each represent: (3, “3”, “:F”, ‘f’, 5.0/2).
types suitable data type (10, 3.5, ‘a’, “salem”). • Given x=3 and y=7 find (x+3.0)/2
• Select suitable for each. • Given a=5, b=2 find a<b, a/b, a/2 +y, x<>y, x+y/7).
simple data type • Evaluate different ==b, a+3*b, (a+3)*b.
Data Representation to store data arithmetic and
• Evaluate logical expression.
arithmetic
expression
• Evaluate logical
expression
• Identify the • Given a problem • Identify the input/output of few • Identify the input/output of few
problem’s input/ find out what are problems. problems.
output the input/output. • Read/write data from/to standard • Read/write data from/to standard
• Demonstrate • Input and output input/output devices. input/output devices.
Human Computer the capability to different data.
Interaction (HCI) input data
• Demonstrate
the capability to
output data to
screen
• Use assignment • Use examples • Write a program to convert • Write a program to find the area
to represent from math and temperature from Celsius to of a circle.
equation science courses Fahrenheit or Kelvin.
• Create programs taken by students. F = C˚ x 9/5 + 32
which have K = C˚ + 273.15
assignment • Write program to solve equation
statements of second degree ax2 + bx - c = 0.
• Choose
Coding which type of
selections to use
• Create programs
containing a
set of sequence
statements
• Create programs
which make
decision
178
Grade 10
• Choose suitable • Choose data • Assign different value to C get F • Test the program with different
data to test the according to the and K values for r
programs example. • Choose values for a, b, and c to
Testing and Validation • Choose test fully test the program (written in
data to cover all the coding section)
possible cases
• Name variables • Give a properly • Document the program (written • Document the program (written
properly documented in the coding section). in the coding section).
• Insert program.
comments to • Give an
Deployment and explain the unproperly
Documentation program documented
• Indent the program.
different
statements
properly
179
180
Responsible Use &
Cyber-Security
Impacts of Technology
Information Accuracy
& Reliability
Cyber Health
181
182
Domain 4: Cyber Security, Cyber Safety,
and Cyber Ethics (CCC)
Definition
Computers and networks are a diverse experience that affect society at all levels and goes beyond local borders. The ethical use of computers and
networks is a fundamental aspect of computer science at all levels and should be seen as an essential element of both learning and practice.
The domain will encompass four expanding circles: the personal circle, community circle, global circle & future circle. At each circle, the student will be
introduced with different concepts related to the strands listed below.
Computing, like all technologies, has a profound impact on any culture into which it is placed. The distribution of computing resources in a global
economy raises issues of equity, access, and power. Social and economic values influence the design and development of computing innovations.
Students should be prepared to evaluate the various positive and negative impacts of computers on society and to identify the extent to which issues
of access (who has access, who does not, and who makes the decisions about access) impact our lives.
Generic Outcomes
It is essential that K-12 students understand the impact of computers on international communication. They should learn the difference between
appropriate and inappropriate social networking behaviors. They should also appreciate the role of adaptive technology in the lives of people with
various disabilities.
KG - G5 (cycle 1)
By the end of cycle 1, students will be able to discuss the consequences of prolong use of computers, why it is important to refer to parents and
guardians when using new technology, proper and responsible use of technology and how to avoid improper use. They will also be able to discuss
reliable online sources, securing online accounts with strong passwords, and sharing personal information online. Students will be able to demonstrate
understanding about ergonomics basics, ethical behaviors when being online, fake websites, how to use public digital facilities responsibly, how
technology affect & support people with special needs, proper/improper social networking behaviors, how to protect against data loss, and content
theft.
G6 - G9 (cycle 2)
By the end of cycle 2, students will be able to discuss proper computer recycling, discuss identity theft, and evaluate information reliability on the
Inernet. They will be able to discuss topics related to cyber-crimes, email etiquette, intellectual property, technology impacts on human culture,
plagiarism, and cyber stalking.
183
As soon as students begin using the Internet, they should learn the norms for its ethical use. Principles of personal privacy, network security, software
licenses, and copyrights must be taught at an appropriate level in order to prepare students to become responsible citizens in the modern world.
Students should be able to make informed and ethical choices among various types of software such as proprietary and open source and understand
the importance of adhering to the licensing or use agreements. Students should also be able to evaluate the reliability and accuracy of information they
receive from the Internet.
The following learning outcomes will be shared in terms of coverage between this domain and the “Cyber
Security, Cyber Safety, and Cyber Ethics (CCC)“ domain as fit in domain strands:
• Apply proper manners when communicating via emails
• Discuss best practices to be adopted when sending and receiving emails
• Differentiate between using school email account and personal email account
• Perform basic security setup on a home Wi-Fi router to protect their home network against intruders
• Demonstrate responsible judgments regarding allowed/not allowed access to others Wi-Fi networks
• Define reliable online sources
• Differentiate between reliable and unreliable online sources
• Discuss reliability in specific contexts giving some examples
• Describe a variety of strategies for determining the reliability of information found on the Inernet
• Discuss common types of online sources used to get information
• Perform online search using multiple search engines and document the results
• Evaluate the results of different online sources from different search engines
184
Strands Description and Technical Keywords
Impacts of Technology
and Cyber Ethics
Cyber Health
Table 3: CCC Domain Strands Distribution across all grades
185
Student Learning Outcomes distribution Per Grade
Cycle 1 Cycle 2 Cycle 3 Cycle 3A
Domains Strand
KG1 KG2 G1 G2 G3 G4 G5 G6 G7 G8 G9 G10 G11 G12 G10A G11A G12A
1 1 2 3 3 3 3 16 2 2 1 2 7 8 5 3 16 8 5 3 16
Cyber-Security
Impacts of Technology 0 0 1 1 1 1 1 5 1 1 1 2 5 2 5 0 7 2 5 0 7
Cyber Ethics
Responsible Cyber
Impacts of Health
Information 1 Cyber
1 Ethics
1 1Cyber1Health
1 2 8 2
Responsible 1 Impacts
1 1of 5Information
0 0 0 Ethics
Cyber 0 0 Cyber
0 Health
0 0
Use & Cyber- Technology accuracy & & Laws Use & Cyber- Technology accuracy & & Laws
Security Total reliability Security
38 32reliability 36 36
42 13 8 16 21 100 22 16 12 34 16 100
Table 4: Quantitative Analysis of CCC domain SLOs per Grade
Responsible Use & Cyber-Security Cycle 2 Responsible Use & Cyber-Security Cycle 2
Impacts of Technology Impacts of Technology
Information accuracy & reliability Information accuracy & reliability
Cyber Ethics & Laws Cyber Ethics & Laws
Cyber Health Cyber Health
45 19 14 22 0 100 45 19 14 22 0 100
Responsible Use & Cyber-Security Cycle 3 Responsible Use & Cyber-Security Cycle 3A
Impacts of Technology Impacts of Technology
Information accuracy & reliability Information accuracy & reliability
Cyber Ethics & Laws Cyber Ethics & Laws
Cyber Health Cyber Health
22% 22%
45% 45%
14% 14%
19% 19%
186
Percentage of outcomes as per level of difficulty and percentage wise
No of outcomes Outcomes Percentage
1 2 3 Sum 1 2 3
C1 C2 C3 C3A Total
CCC
19.7 17.9 17.3 17.3 54.9
187
Strands Evolution Per Grade
Domain Strand Grade 1 Grade 2 Grade 3 Grade 4 Grade 5
• Students discuss • Students discuss • Students • Students • Students
Responsible Use & Cyber-Security
basic issues related basic issues related demonstrate understand how to demonstrate
to responsible to responsible understanding keep their personal understanding
use of technology use of technology about proper information private about proper
and information, and information, exchange and when being online, exchange and
consequences of consequences of sharing of exhibit awareness sharing of
inappropriate use, inappropriate use, information using about the different information using
and examples of and examples of digital systems and threats when using digital systems and
proper use in real proper use in real the importance of online websites, the importance of
life scenarios. life scenarios. having humility, and can make right having humility,
loyalty and respect decisions on what loyalty and respect
for others when to share, when to for others when
communicating. share, and with communicating.
whom.
• Students • Students discuss • Students discuss • Students discuss • Students discuss
demonstrate how technology how technology how technology how technology
Technology
Impacts of
188
Domain Strand Grade 6 Grade 7 Grade 8 Grade 9
Responsible Use & Cyber-
• Students understand how • Students understand how • Students apply knowledge • Students apply knowledge
to keep their personal to keep their personal about malware to protect about malware to protect
information private when information private when themselves against themselves against
being online, exhibit being online, exhibit different types of malicious different types of malicious
Security
awareness about the awareness about the software in particular and software in particular and
different threats when different threats when other possible cyber- other possible cyber-
using online websites, and using online websites, and attacks in general. attacks in general.
can make right decisions can make right decisions
on what to share, when to on what to share, when to
share, and with whom. share, and with whom.
• Students understand • Students understand • Students discuss how • Students discuss how
Technology
Impacts of
future technology changes. future technology changes. technology impacts technology impacts
humanity including how it humanity including how it
affects education, culture, affects education, culture,
the workplace, and the workplace, and
Cyber Security, Cyber Safety, and Cyber Ethics
business. business.
• Students evaluate the • Students realize the • Students realize the • Students evaluate the
accuracy, credibility, importance of academic importance of academic accuracy, credibility,
Information Accuracy & Reliability
integrity, relevance, integrity and demonstrate integrity and demonstrate integrity, relevance,
appropriateness, understanding understanding appropriateness,
comprehensiveness, and about plagiarism, its about plagiarism, its comprehensiveness, and
biases of the different consequences, how to consequences, how to biases of the different
electronic information reference or cite others reference or cite others electronic information
sources concerning work, and appreciate work, and appreciate sources concerning
real-world problems, originality and plagiarism originality and plagiarism real-world problems,
aid in evaluating Inernet prevention services and prevention services and aid in evaluating Inernet
resources, and exhibit tools. tools. resources, and exhibit
critical thinking skills critical thinking skills
to judge about what is to judge about what is
right/wrong when using right/wrong when using
information taken from information taken from
online sources. online sources.
• Students develop • Students understand the • Students understand the • Students understand the
understanding effects of heavy computer effects of heavy computer effects of heavy computer
Cyber Health
about physical and and cell phone use on the and cell phone use on the and cell phone use on the
psychological well-being sleep quality, stress levels, sleep quality, stress levels, sleep quality, stress levels,
in a digital world and the and general mental health and general mental health and general mental health
consequences of improper of young adults. of young adults. of young adults.
technology usage practices
and the best ways to avoid
them.
189
Domain Strand Grade 10 Grade 11 Grade 12
• Students apply knowledge about • Students apply knowledge about • Students apply cryptography basics
Responsible Use & Cyber-
malware to protect themselves malware to protect themselves and algorithms in attacks. Explain
against different types of malicious against different types of malicious encryption algorithms and public
software in particular and other software in particular and other key infrastructure (PKI) and offers
Security
• Students realize the importance of • Students realize the importance of • Students realize the importance of
academic integrity and demonstrate academic integrity and demonstrate academic integrity and demonstrate
Information
Accuracy &
its consequences, how to reference its consequences, how to reference its consequences, how to reference
or cite others work, and appreciate or cite others work, and appreciate or cite others work, and appreciate
originality and plagiarism prevention originality and plagiarism prevention originality and plagiarism prevention
services and tools. services and tools. services and tools.
about governing communication and about the privilege of using electronic about the privilege of using electronic
technology use. information as well as the right to information as well as the right to
having equal, secure and reliable having equal, secure and reliable
access. access.
190
Domain Strand Grade 10 Grade 11 Grade 12
• Students apply knowledge about • Students apply knowledge about • Students apply cryptography basics
Responsible Use & Cyber-
malware to protect themselves malware to protect themselves and algorithms in attacks. Explain
against different types of malicious against different types of malicious encryption algorithms and public
software in particular and other software in particular and other key infrastructure (PKI) and offers
Security
• Students realize the importance of • Students realize the importance of • Students realize the importance of
academic integrity and demonstrate academic integrity and demonstrate academic integrity and demonstrate
Information
Accuracy &
its consequences, how to reference its consequences, how to reference its consequences, how to reference
or cite others work, and appreciate or cite others work, and appreciate or cite others work, and appreciate
originality and plagiarism prevention originality and plagiarism prevention originality and plagiarism prevention
services and tools. services and tools. services and tools.
about governing communication and about the privilege of using electronic about the privilege of using electronic
technology use. information as well as the right to information as well as the right to
having equal, secure and reliable having equal, secure and reliable
access. access.
191
Integration between CCC domain and other domains
CCC DLC CT CPP
192
Scope and Sequence
Domains, Strands and Standards by Grade
193
194
Grade: KG1
Grade: KG2
195
Grade: 1
(G1.4.1.1.3) 1
List main consequences of improper
4.
use of technology and how to avoid
Cyber Security,
them
Cyber Safety, and
Cyber Ethics (4.2) (4.2.1) (G1.4.2.1.1) 1
Impacts of Students demonstrate knowledge List common technologies used in
Technology of technology in everyday life everyday life
Grade: 2
(G2.4.1.1.3) 1
Practice responsible digital
4. citizenship in the use of technology
Cyber Security, systems and software
Cyber Safety, and
(4.2) (4.2.2) (G2.4.2.2.1) 1
Cyber Ethics
Impacts of Students discuss how technology List ways in which people use
Technology impacts humanity including how computers at work and in their daily
it affects education, culture, the lives
workplace, and business
196
Grade: 3
(G3.4.1.2.3) 2
Create a good password to protect
personal data
197
Grade: 4
(G4.4.4.2.2) 2
Describe the role that adaptive
technology can play in the lives of
people with special needs
198
Grade: 5
(G5.4.1.2.3) 1
Discuss the consequences of misusing
information and technology
199
Grade: 6
(G6.4.4.3.2) 1
Discuss “Cyber Crimes” by defining
relevant terminologies
(G6.4.4.3.3) 2
Describe the consequences of “cyber-
crime” and how to protect oneself
against it
200
Grade: 7
(G7.4.4.3.2) 1
Discuss the social and economic
implications associated with software
piracy
(G7.4.4.3.2) 2
Identify laws and regulations that
impact the development and use of
software
201
Grade: 8
(G8.4.4.3.3) 2
Discuss “Cyber Bullying” including
attached implications
202
Grade: 9
(4.1.4) (G9.4.1.4.1) 2
Students apply knowledge about Explain how computer viruses spread
malware to protect themselves and best practices to protect against
against different types of them
malicious software in particular
and other possible cyber-attacks
in general
203
Grade: 10
(4.1.4) (G10.4.1.4.1) 2
Students apply knowledge about Discuss the different types of
malware to protect themselves malicious software including worms,
against different types of viruses and Trojan horses
malicious software in particular
and other possible cyber-attacks
in general
(4.1.5) (G10.4.1.5.1) 1
Students apply cryptography Define cryptography
basics and algorithms in attacks.
Explain encryption algorithms (G10.4.1.5.2) 2
and public key infrastructure Explain symmetric and asymmetric
(PKI) and offers examples of algorithms
4.
different attacks on crypto
Cyber Security, (G10.4.1.5.3) 1
systems
Cyber Safety, and Demonstrate digital signatures
Cyber Ethics
(G10.4.1.5.4) 1
Illustrate sensitive data encryption
(G10.4.1.5.5) 1
Demonstrate hashing algorithms
(4.2.3) (G10.4.2.3.1) 1
Students develop understanding Identify types of Internet transactions
about how business can be
conducted online using any
Internet - based application
and appropriate online buying
behaviors
204
Grade: 10
(G10.4.4.3.4) 2
Discuss security and privacy issues
that relate to computer networks
205
Grade: 10A
(4.1.4) (G10A.4.1.4.1) 2
Students apply knowledge about Discuss the different types of
malware to protect themselves malicious software including worms,
against different types of viruses and Trojan horses
malicious software in particular
and other possible cyber-attacks
in general
(4.1.5) (G10A.4.1.5.1) 1
Students apply cryptography Define cryptography
basics and algorithms in attacks.
Explain encryption algorithms (G10A.4.1.5.2) 2
and public key infrastructure Explain symmetric and asymmetric
(PKI) and offers examples of algorithms
4.
different attacks on crypto
Cyber Security, (G10A.4.1.5.3) 1
systems
Cyber Safety, and Demonstrate digital signatures
Cyber Ethics
(G10A.4.1.5.4) 1
Illustrate sensitive data encryption
(G10A.4.1.5.5) 1
Demonstrate hashing algorithms
(4.2.3) (G10A.4.2.3.1) 1
Students develop understanding Identify types of Internet transactions
about how business can be
conducted online using any
Internet - based application
and appropriate online buying
behaviors
206
Grade: 10A
(G10A.4.4.3.3) 2
Discuss “Digital theft” and it
implications on copyrights and
suggest some deterring methods
(G10A.4.4.3.4) 2
Discuss security and privacy issues
that relate to computer networks
207
Grade: 11
(4.1.5) (G11.4.1.5.1) 1
Students apply cryptography List components of public key
basics and algorithms in attacks. infrastructure
Explain encryption algorithms
and public key infrastructure (G11.4.1.5.2) 1
(PKI) and offers examples of Identify birthday attack
different attacks on crypto
systems (G11.4.1.5.3) 2
Illustrate mathematical attacks
(G11.4.1.5.4) 1
4. Define brute force attacks
Cyber Security,
Cyber Safety, and
(4.2) (4.2.2) (G11.4.2.2.1) 2
Cyber Ethics
Impacts of Students discuss how technology Analyze the beneficial and harmful
Technology impacts humanity including how effects of computing innovations
it affects education, culture, the
workplace, and business (G11.4.2.2.2) 2
Summarize how financial markets,
transactions, and predictions have
been transformed by automation
(G11.4.2.2.3) 3
Summarize how computation has
revolutionized the way people build
real and virtual organizations and
infrastructures
(4.2.3) (G11.4.2.3.1) 1
Students develop understanding Identify Issues when Conducting
about how business can be Transactions over the Internet
conducted online using any
Internet - based application (G11.4.2.3.2) 2
and appropriate online buying Demonstrate understanding of
behaviors “Impulse Buying”
208
Grade: 11
209
Grade: 11A
(4.1.5) (G11A.4.1.5.1) 1
Students apply cryptography List components of public key
basics and algorithms in attacks. infrastructure
Explain encryption algorithms
and public key infrastructure (G11A.4.1.5.2) 1
(PKI) and offers examples of Identify birthday attack
different attacks on crypto
systems (G11A.4.1.5.3) 2
Illustrate mathematical attacks
(G11A.4.1.5.4) 1
4. Define brute force attacks
Cyber Security,
Cyber Safety, and
(4.2) (4.2.2) (G11A.4.2.2.1) 2
Cyber Ethics
Impacts of Students discuss how technology Analyze the beneficial and harmful
Technology impacts humanity including how effects of computing innovations
it affects education, culture, the
workplace, and business (G11A.4.2.2.2) 2
Summarize how financial markets,
transactions, and predictions have
been transformed by automation
(G11A.4.2.2.3) 3
Summarize how computation has
revolutionized the way people build
real and virtual organizations and
infrastructures
(4.2.3) (G11A.4.2.3.1) 1
Students develop understanding Identify Issues when Conducting
about how business can be Transactions over the Internet
conducted online using any
Internet - based application (G11A.4.2.3.2) 2
and appropriate online buying Demonstrate understanding of
behaviors “Impulse Buying”
210
Grade: 11A
211
Grade: 12
212
Grade: 12A
213
214
Student Performance Criteria
215
216
KG1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• demonstrate lack of • somewhat discuss the • generally discuss the • provide important details
understanding about the importance of referring importance of referring and elaboration when
Responsible Use & importance of referring to parents and guardians to parent and guardians discussing the importance
Cyber-Security to parents and guardians when using new when using new of referring to parent and
when using new technology but without technology but fails to guardians when using
technology. comfort. elaborate. new technology.
KG2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• barely discuss the • somewhat discuss the • generally discuss the • provide important details
importance of referring importance of referring importance of referring and elaboration when
Responsible Use & to parents and guardians to parents and guardians to parent and guardians discussing the importance
Cyber-Security when using new when using new when using new of referring to parent and
technology. technology but without technology but fails to guardians when using
comfort. elaborate. new technology.
217
Grade 1
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss the importance • incompletely discuss the • discuss the importance • discuss the importance
of responsible use of importance of responsible of responsible use of responsible use of
technology but with lots use of technology and can of technology using technology using many
Responsible Use & of hesitation and/or lots list few consequences of adequate supporting supporting details
Cyber-Security of mistakes. improper use and ways to details and explain some and explain many of
avoid it. of the consequences of the consequences of
improper use and ways to improper use and ways to
avoid it. avoid it.
• list limited common • list some common • list most of the common • list common technologies
technologies used in technologies used in technologies used in used in everyday life.
Impacts of Technology everyday life with a lot of everyday life with some everyday life.
mistakes. mistakes.
• define “reliable online • give somewhat • give a sufficient definition • give an appropriate
Information Accuracy sources” with lots of incomplete definition about “reliable online definition about “reliable
hesitation and lots of about “reliable online sources” but does not online sources” where
& Reliability mistakes. sources”. elaborate or include many important details
details. are included.
• describe limited aspects • describe some aspects • explain how prolong use • explain flawlessly how
of how prolong use of of how prolong use of of computers can cause prolong use of computers
computers can cause computers can cause back pain and eyestrain can cause back pain and
Cyber Health back pain and eyestrain back pain and eyestrain and how to avoid it eyestrain and how to
with hesitation. and how to avoid it. with some incorrect avoid it.
terminology.
218
Grade 2
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss responsible digital • discuss responsible digital • discuss responsible digital • discuss responsible digital
citizenship in the use of citizenship in the use citizenship in the use of citizenship in the use of
technology systems and of technology systems technology systems and technology systems and
software but with lots and software using software using adequate software using many
Responsible Use & of hesitation and lots of incomplete details. supporting details. supporting details.
Cyber-Security mistakes. • discuss the purpose of • discuss the purpose of • discuss the purpose of
• discuss the purpose of using passwords with using passwords using using passwords with
using passwords but limited details but with adequate supporting elaboration and effective
with limited details and some confidence. details. use of real-life examples.
without confidence.
• recall with help ways • list some examples • list most of the ways • list perfectly ways
in which people use in which people use in which people use in which people use
Impacts of Technology computers at work and in computers at work computers at work and in computers at work and in
their daily lives. and in their daily lives their daily lives. their daily lives.
satisfactorily.
• Explain the difference • discuss the difference • discuss the difference • discuss the difference
between reliable and between reliable and between reliable and between reliable and
Information Accuracy unreliable online sources unreliable online sources unreliable online sources unreliable online sources
& Reliability with lots of hesitation and using incomplete details. using some details but with elaboration and
lots of mistakes. fails to elaborate. using many supporting
details.
• describe the concept of • describe the concept • describe the concept • describe perfectly the
“Ergonomics” with help. of “Ergonomics” and its of “Ergonomics”, its concept of “Ergonomics”,
Cyber Health importance with some importance with some its importance.
errors. incorrect terminology.
219
Grade 3
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss the basic ethical • discuss the basic ethical • discuss basic ethical and • discuss basic ethical and
and unethical behaviors and unethical behaviors unethical behaviors in unethical behaviors in
in the digital world but in the digital world and the digital world and how the digital world and how
with lots of hesitation and how to use modern to use modern digital to use modern digital
lots of mistakes. digital communication communication and communication and
• create a password to and collaboration tools collaboration tools and collaboration tools and
Responsible Use & protect personal data and devices appropriately devices appropriately devices appropriately and
Cyber-Security with a lot of help from and responsibly but, and responsibly using responsibly using many
the teacher. however, the used details adequate supporting important supporting
are incomplete. details. details.
• create an acceptable • create a good password • create a strong password
password to protect to protect personal data to protect personal data
personal data but with with little help from the with no help.
some difficulty. teacher.
• recall a technology that is • list some technologies • list most of the different • list faultlessly different
used in a profession in its that are used in different technologies that technologies that
Impacts of Technology typical work environment professions in their typical are used in different are used in different
with help. work environment. professions in their typical professions in their typical
work environment. work environment.
Information Accuracy • Identify fake websites • Identify few aspects of • Identify some aspects • Identify aspects of fake
with difficulty. fake websites with little of fake websites with websites accurately.
& Reliability accuracy. adequate accuracy.
• demonstrate • discuss different ways • discuss different ways • discuss different ways
unsatisfactory level of one can instill the right one can instill the right one can instill the right
understanding about the attitude when using the attitude when using the attitude when using the
different ways one can facilities made available facilities made available facilities made available
Cyber Ethics & Laws instill the right attitude by the public using little by the public using by the public clearly and
when using the facilities supporting details. adequate supporting with elaboration.
made available by the details.
public.
• recall a computer usage • describe how some • explain how computer • explain how computer
practice that can affect computer usage practices usage practices can affect usage practices can affect
Cyber Health physical health with can affect physical physical health and also physical health and the
assistance. health with incorrect some ways to protect best ways to protect
terminology. oneself from such harm. oneself from such harm.
220
Grade 4
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss matters related • discuss issues related to • discuss issues related to • discuss issues related to
to personal information personal information personal information personal information
Responsible Use & using limited details using little details and using adequate important using many important
and exhibit inaccurate exhibit inaccurate details and exhibit details and exhibit
Cyber-Security judgments when sharing judgments when sharing judgments when sharing judgments when sharing
personal information personal information. personal information personal information
online. online. online.
• explain how technology • explain how technology • explain how technology • explain how technology
helps people with special helps people with special helps people with special helps people with
needs in their lives and needs in their lives and needs in their lives and special needs in their
how they can improve how they can improve how they can improve lives and how they can
Cyber Ethics & Laws their access to technology their access to technology their access to technology improve their access to
in the future but with in the future but with in the future with technology in the future
lots of hesitation and some hesitation and some confidence and using with confidence and
difficulty. mistakes. adequate supporting using many important
details. supporting details.
• Recall a symptom of • list limited symptoms • discuss most symptoms • discuss perfectly
Internet addiction with of Internet addiction of Internet addiction. symptoms of Internet
Cyber Health assistance. with use of incorrect addiction.
terminology.
221
Grade 5
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss technology misuse • discuss technology misuse • discuss technology misuse • discuss technology misuse
and its consequences and its consequences by and its consequences by and its consequences by
with lots of hesitation and comparing appropriate comparing appropriate comparing appropriate
incorrect details. and inappropriate social and inappropriate social and inappropriate social
Responsible Use & networking behaviors networking behaviors networking behaviors and
Cyber-Security with some hesitation and and how to exhibit legal how to exhibit legal and
using few details. and ethical behaviors ethical behaviors when
when using information using information and
and technology using technology using many
adequate support details. supporting details.
• recall with assistance • list some applications • evaluate incorrectly • evaluate different
an application that can according to ease of use different applications applications according
provide ease of use for for specific type of user. according to ease of use to ease of use for specific
specific type of user. for specific type of user type of user and is able
and is able to setup the to design and setup the
Impacts of Technology workplace for proper workplace for proper
posture. posture, appropriate
distance from monitors
and having proper
lighting.
• discuss content theft • discuss content theft • discuss content theft • discuss content theft
Information Accuracy detection and best detection and best detection and best detection and best
methods for prevention methods for prevention methods for prevention methods for prevention
& Reliability with lots of hesitation and with some hesitation using adequate details. using many supporting
inaccurate details. using limited details. details.
• explain how technology • explain how technology • explain how technology • explain how technology
and added special and added special and added special and added special
features to software features to software features to software features to software
make it easier to engage make it easier to engage make it easier to engage make it easier to engage
Cyber Ethics & Laws students with physical students with physical students with physical students with physical
and learning disabilities and learning disabilities and learning disabilities and learning disabilities
but with lots of hesitation with some hesitation using adequate details. using many supporting
and incorrect details. using limited details. details.
• list an example of a social • list some examples • identify most social • identify perfectly social
problem associated with of social problems problems associated with problems associated with
Cyber Health Computer and Internet associated with Computer Computer and Internet Computer and Internet
use with inaccuracies. and Internet use with use. use.
errors.
222
Grade 6
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• describe identity theft • describe identity theft • describe identity theft • describe identity theft
with some hesitation. and common methods and discuss known and common methods
Responsible Use & used by unethical ways used by unethical used by unethical
Cyber-Security people to steal personal people to steal personal people to steal personal
information with some information using information using many
hesitation. adequate details. supporting details.
• perform online search • accomplish imperfectly • perform online search • perform perfectly online
using few search engines online search using using multiple search - search using multiple
with help. multiple search - engines engines and document search engines and
and is also able to the results and is also document the results and
Impacts of Technology recognize with help the able to evaluate with is also able to evaluate the
difference between the some errors the results of results of different online
results of different online different online sources sources from different
sources from different from different search search engines with no
search engines. engines. hesitation.
• discuss few strategies for • discuss few strategies for • discuss a variety of • discuss strategies for
determining the reliability determining the reliability strategies for determining determining the reliability
Information Accuracy of information found on of information found on the reliability of of information found on
& Reliability the Inernet with lots of the Inernet with some information found on the the Inernet using many
hesitation. hesitation. Inernet using adequate supporting details.
details.
• discuss “Cyber Crimes” • discuss “Cyber Crimes” • discuss “Cyber Crimes”, • discuss “Cyber Crimes”,
with lots of hesitation. and their consequences their consequences, and their consequences, and
with some hesitation. how to protect oneself how to protect oneself
Cyber Ethics & Laws against them using against them with
adequate supporting elaboration and using
details. many supporting details.
• List a proper Recycling • List some proper • explain proper Recycling • explain proper Recycling
and disposing of Recycling and and disposing of and disposing of
Computer equipment disposing of Computer Computer equipment Computer equipment,
with mistakes. equipment, and is able using few incorrect and is able to explain
to describe an example terminology, and is able what we should do to
Cyber Health of what we should do to explain what we should reduce the impact of
to reduce the impact of do to reduce the impact computer waste on our
computer waste on our of computer waste on our environment.
environment. environment with some
mistakes.
223
Grade 7
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• explain why it is • explain why it is • explain why it is important • explain why it is
important not to share important not to share not to share personal important not to share
personal information with personal information information with everyone personal information
everyone on the Inernet with everyone on the on the Inernet and list with everyone on the
with lots of hesitation and Inernet and list few some ways to protect Inernet and list many
incorrect details. ways to protect against against un-intentional ways to protect against
• discuss proper manners un-intentional reveal of reveal of personal un-intentional reveal of
Responsible Use & when communicating personal information. information using adequate personal information
via emails with lots of • discuss proper manners supporting details. using many supporting
Cyber-Security hesitation and incorrect when communicating • discuss proper manners details.
details. via emails and give some when communicating • discuss proper manners
examples of best practices via emails and give some when communicating
used when sending and examples of best practices via emails and give many
receiving emails with used when sending and examples of best practices
some hesitation and using receiving emails using used when sending and
limited details. adequate supporting receiving emails using
details. many supporting details.
• provide an example • list some predicted • predict imperfectly • predict future
of predicted future future technologies, future technologies, technologies, and
technologies with help. and is also able list and the consequences the consequences of
the jobs of computer of using them, and is using them, and is
scientists, engineers, and also able to list and also able to discuss
Impacts of Technology information technologist discuss with hesitation the jobs of computer
in our modern world and the jobs of computer scientists, engineers, and
the near future. scientists, engineers, and information technologist
information technologist in our modern world and
in our modern world and the near future.
the near future.
• discuss common types • discuss common types of • discuss common types • discuss common types
of online sources used to online sources used to get of online sources used of online sources used to
Information Accuracy get information with lots information with some to get information using get information and give
& Reliability of hesitation and using hesitation with some adequate supporting examples on each type
limited details. hesitation and using few details. using many supporting
details. details.
• discuss how legal rights • discuss how legal rights • discuss how legal rights • discuss how legal rights
and different kinds of and different kinds of and different kinds of and different kinds of
software licenses can be software licenses can be software licenses can be software licenses can be
used to share and protect used to share and protect used to share and protect used to share and protect
copyright and intellectual copyright and intellectual copyright and intellectual copyright and intellectual
property with lots of property and how laws property and how laws property and how laws
hesitation and using and regulations that and regulations that and regulations that
limited details. impact the development impact the development impact the development
Cyber Ethics & Laws • describe the social and and use of software with and use of software using and use of software using
economic implications some hesitation and using adequate supporting many supporting details.
associated with software few details. details. • demonstrate high level
piracy with lots of • discuss the social and • discuss the social and of understanding about
hesitation and using economic implications economic implications the social and economic
limited details. associated with software associated with software implications associated
piracy with hesitation piracy software using with software piracy using
with some hesitation and adequate supporting many supporting details.
using few details. details.
• list an example of the • list some examples of • explain hesitantly how • explain perfectly how
consequences of heavy the consequences of heavy use of computers heavy use of computers
use of computers or heavy use of computers and mobile phones can and mobile phones can
mobile phones with and mobile phones and result in an increase in result in an increase in
Cyber Health major errors. how it can result in an sleep disorders symptoms sleep disorders symptoms
increase in sleep disorders in young adults in young adults
symptoms in young
adults with mistakes.
224
Grade 8
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss the main threats • discuss the main threats • discuss the main threats • demonstrate high level
that can be received that can be received that can be received of understanding about
Responsible Use & through emails and how through emails and how through emails and how main threats that can
to deal with them with to deal with them with to deal with them using be received through
Cyber-Security lots of hesitation and some hesitation and using adequate supporting emails and how to deal
using limited details. few details. details. with them using many
supporting details.
• list an example of changes • list some examples of • describe with incorrect • describe changes in
in information over time changes in information terminology changes in information over time
with assistance and major over time and the effects information over time and the effects those
mistakes. those changes may and the effects those changes may have on
Impacts of Technology have on education, the changes may have on education, the workplace,
workplace, or society with education, the workplace, and society.
some errors. and society.
• discuss the impact of • discuss the impact of • discuss the impact of • discuss the impact of
government regulations government regulations government regulations government regulations
on privacy and security on privacy and security on privacy and security on privacy and security
with lots of hesitation and with some hesitation and using adequate using many supporting
using limited details. using few details. supporting details. details.
• describe open source, • demonstrate developing • differentiate among • demonstrate high level
freeware, and proprietary understanding about open source, freeware, of understanding about
licenses with lots of open source, freeware, and proprietary licenses open source, freeware,
Cyber Ethics & Laws hesitation and mistakes. and proprietary licenses and their applicability and proprietary licenses
• discuss “Cyber Bullying” and their applicability to to different types of and their applicability to
with lots of hesitation and different types of software software using adequate different types of software
using limited details. with some hesitation and supporting details. using many supporting
using few details. • discuss “Cyber Bullying” details.
• discuss “Cyber Bullying” and its implications using • discuss “Cyber Bullying”
and its implications with adequate details. and its implications using
some hesitation and using many supporting details.
few details.
• list an example of how • list some examples of • explain imperfectly • explain perfectly how
frequently using a how frequently using a how frequently using a frequently using a
computer without breaks computer without breaks computer without breaks computer without breaks
Cyber Health increases the health risk increases the health risk further increases the further increases the
with major mistakes. with few errors. risk of stress, sleeping risk of stress, sleeping
problems. problems.
225
Grade 9
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• explain how computer • explain how computer • explain how computer • demonstrate high level
viruses spread and best viruses spread and best viruses spread and best of understanding about
practices to protect practices to protect practices to protect computer viruses spread
against them with lots against them with some against them using and best practices to
of hesitation and using hesitation and using few adequate details. protect against them
Responsible Use & limited details. details. • discuss “Web Presence” using many supporting
• discuss “Web Presence” • discuss “Web Presence” and the importance of details.
Cyber-Security with lots of hesitation and and the importance of having proper self- • discuss “Web Presence”
using limited details. having proper self- representation on the and the importance of
representation on the Inernet using adequate having proper self-
Inernet with some details. representation on the
hesitation and using few Inernet using many
details. supporting details.
• list an example of positive • list some examples of • analyze hesitantly the • analyze perfectly the
or negative impact of positive and negative positive and negative positive and negative
technology on human impacts of technology impacts of technology impacts of technology
culture with assistance on human culture. The on human culture. The on human culture. The
Impacts of Technology and major errors. student is also able to student is also able student is also able
describe technology to discuss technology to evaluate perfectly
evolution with some evolution with some technology evolution
mistakes. incorrect terminology. from conventional devices
to multipurpose devices.
• define “plagiarism” with • define “plagiarism” and • define “plagiarism” and • define “plagiarism” and
Information Accuracy lots of hesitation and list common forms of list common forms of list common forms of
using limited details. student plagiarism with student plagiarism using student plagiarism with
& Reliability some hesitation and using adequate details. elaboration and using
few details. many supporting details.
• discuss “Cyber Stalking” • discuss “Cyber Stalking” • discuss “Cyber Stalking” • discuss “Cyber Stalking”
with lots of hesitation and and its implications with and its implications using and its implications using
using limited details. some hesitation and using adequate details. many supporting details.
• exhibit legal and few details. • exhibit legal and • exhibit legal and
Cyber Ethics & Laws ethical behaviors when • exhibit legal and ethical behaviors when ethical behaviors when
using information and ethical behaviors when using information and using information and
technology with lots of using information and technology with little technology with no help.
help from the teacher. technology with some help from the teacher.
help from the teacher.
• list a negative effect of • list few negative effects • discuss the negative • discuss & evaluate the
working in front of a of working in front of a effect of working in front negative effect of working
computer for many hours computer for many hours of a computer for many in front of a computer
a day with mistakes. a day. hours a day such as the for many hours a day
Cyber Health risk of mental illness like such as the risk of mental
depression and insomnia. illness like depression and
insomnia and is able to
devise best ways to avoid
them.
226
Grade 10
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss the different types • discuss the different types • discuss the different • discuss the different types
of malicious software of malicious software types of malicious of malicious software
with lots of hesitation and with some hesitation and software using adequate using many supporting
using limited details. using few details. supporting details. details.
• define “digital Footprint” • define “digital Footprint” • discuss “digital Footprint” • discuss “digital Footprint”
with lots of hesitation and and discuss its main and discuss its main and discuss its main
using limited details. categories with some categories using adequate categories using many
• recall the definition of hesitation and using few supporting details. supporting details.
cryptography with major details. • define cryptography, • define perfectly
Responsible Use & errors. • define cryptography, and explain symmetric cryptography, and
symmetric and and asymmetric explain symmetric and
Cyber-Security asymmetric algorithms algorithms using incorrect asymmetric algorithms
with few errors. terminology. with perfect terminology.
• demonstrate imperfectly • demonstrate the use
digital signatures. of digital signatures,
• illustrate sensitive data sensitive data encryption,
encryption with some and hashing algorithms.
errors.
• demonstrate hashing
algorithms with minor
assistance.
• list a type of Internet • list some types of Internet • identify imperfectly types • identify perfectly types
Transactions with Transactions and some of Internet Transactions of Internet Transactions
assistance. relevant impacts of and discuss the relevant and discuss the relevant
• compare a positive computer technology on impact of computer impact of computer
impact of technology business and commerce technology on business technology on business
on culture with major with some errors. and commerce. and commerce.
mistakes. • compare the positive • compare the positive • compare without
Impacts of Technology or negative impacts of and negative impacts of hesitation the positive
technology on culture, technology on culture, and negative impacts of
and recall with some help and describe with errors technology on culture,
the role that adaptive the role that adaptive and describe the role that
technology can play in technology can play in adaptive technology can
the lives of people with the lives of people with play in the lives of people
special needs. special needs. with special needs.
Information Accuracy • define “cited source” with • define “cited source” with • define “cited source” • define “cited source”
lots of hesitation and some hesitation and using using adequate using many supporting
& Reliability using limited details. few details. supporting details. details.
• discuss ethical use of • discuss ethical use of • discuss ethical use of • discuss ethical use of
modern communication modern communication modern communication modern communication
media and devices with media and devices, and media and devices, and media and devices, and
lots of hesitation and the consequences of the consequences of the consequences of
Cyber Ethics & Laws using limited details. misusing information misusing information misusing information
technology with some technology using technology using many
hesitation and using few adequate supporting supporting details.
details. details.
227
Grade 10A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss the different types • discuss the different types • discuss the different • discuss the different types
of malicious software of malicious software types of malicious of malicious software
with lots of hesitation and with some hesitation and software using adequate using many supporting
using limited details. using few details. supporting details. details.
• define “digital Footprint” • define “digital Footprint” • discuss “digital Footprint” • discuss “digital Footprint”
with lots of hesitation and and discuss its main and discuss its main and discuss its main
using limited details. categories with some categories using adequate categories using many
• recall the definition of hesitation and using few supporting details. supporting details.
cryptography with major details. • define cryptography, • define perfectly
Responsible Use & errors. • define cryptography, and explain symmetric cryptography, and
symmetric and and asymmetric explain symmetric and
Cyber-Security asymmetric algorithms algorithms using incorrect asymmetric algorithms
with few errors. terminology. with perfect terminology.
• demonstrate imperfectly • demonstrate the use
digital signatures. of digital signatures,
• illustrate sensitive data sensitive data encryption,
encryption with some and hashing algorithms.
errors.
• demonstrate hashing
algorithms with minor
assistance.
• list a type of Internet • list some types of Internet • identify imperfectly types • identify perfectly types
Transactions with Transactions and some of Internet Transactions of Internet Transactions
assistance. relevant impacts of and discuss the relevant and discuss the relevant
• compare a positive computer technology on impact of computer impact of computer
impact of technology business and commerce technology on business technology on business
on culture with major with some errors. and commerce. and commerce.
mistakes. • compare the positive • compare the positive • compare without
Impacts of Technology or negative impacts of and negative impacts of hesitation the positive
technology on culture, technology on culture, and negative impacts of
and recall with some help and describe with errors technology on culture,
the role that adaptive the role that adaptive and describe the role that
technology can play in technology can play in adaptive technology can
the lives of people with the lives of people with play in the lives of people
special needs. special needs. with special needs.
Information Accuracy • define “cited source” with • define “cited source” with • define “cited source” • define “cited source”
lots of hesitation and some hesitation and using using adequate using many supporting
& Reliability using limited details. few details. supporting details. details.
• discuss ethical use of • discuss ethical use of • discuss ethical use of • discuss ethical use of
modern communication modern communication modern communication modern communication
media and devices with media and devices, and media and devices, and media and devices, and
lots of hesitation and the consequences of the consequences of the consequences of
Cyber Ethics & Laws using limited details. misusing information misusing information misusing information
technology with some technology using technology using many
hesitation and using few adequate supporting supporting details.
details. details.
228
Grade 11
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss different tools and • discuss different tools and • discuss different tools and • discuss different tools and
software used to protect software used to protect software used to protect software used to protect
computer systems, computer systems, computer systems, computer systems,
stored data, and personal stored data, and personal stored data, and personal stored data, and personal
information with lots information with some information using information using many
Responsible Use & of hesitation and using hesitation and using adequate details. details.
limited details. limited details. • list most components of • list all components of
Cyber-Security • recall one component of • list some components of public key infrastructure, public key infrastructure,
public key infrastructure public key infrastructure, and identify and identify perfectly
with major assistance. and identify brute force mathematical attacks, mathematical attacks,
attacks with major birthday attack, and brute birthday attack, and brute
mistakes. force attacks with some force attacks.
errors.
• identify with assistance an • identify some Issues when • identify Issues when • identify perfectly Issues
Issue when Conducting Conducting Transactions Conducting Transactions when conducting
Transactions over the over the Internet with over the Internet like Transactions over the
Internet with major some errors. “Impulse Buying” Internet like “Impulse
mistakes. • list some examples of while using incorrect Buying”.
• list an example of beneficial and harmful terminology. • analyze perfectly the
beneficial effects of effects of computing • Analyze imperfectly the beneficial and harmful
computing innovations innovations with some beneficial and harmful effects of computing
with major assistance. errors. effects of computing innovations.
• list with assistance an • list some examples innovations. • summarize confidently
example of how financial of how financial • summarize how financial how financial markets,
Impacts of Technology markets, transformed by markets, transactions, markets, transactions, transactions, and
automation with major and predictions have and predictions have predictions have
errors. been transformed by been transformed by been transformed by
• list with major assistance automation with some automation using some automation.
one example of how errors. incorrect terminology. • summarize perfectly
computation has • list some examples of • summarize how how computation has
revolutionized the way how computation has computation has revolutionized the way
people builds real and revolutionized the way revolutionized the way people build real and
virtual organizations and people build real and people build real and virtual organizations and
infrastructures. virtual organizations and virtual organizations and infrastructures.
infrastructures with some infrastructures using
errors. incorrect terminology.
• discuss how to recognize • discuss how to recognize • discuss how to recognize • discuss how to recognize
Information Accuracy plagiarism with lots of plagiarism and its plagiarism and its plagiarism and its
hesitation and using consequences with some consequences using consequences using many
& Reliability limited details. hesitation and using adequate details. supporting details.
limited details.
229
Grade 11A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• discuss different tools and • discuss different tools and • discuss different tools and • discuss different tools and
software used to protect software used to protect software used to protect software used to protect
computer systems, computer systems, computer systems, computer systems,
stored data, and personal stored data, and personal stored data, and personal stored data, and personal
information with lots information with some information using information using many
Responsible Use & of hesitation and using hesitation and using adequate details. details.
limited details. limited details. • list most components of • list all components of
Cyber-Security • recall one component of • list some components of public key infrastructure, public key infrastructure,
public key infrastructure public key infrastructure, and identify and identify perfectly
with major assistance. and identify brute force mathematical attacks, mathematical attacks,
attacks with major birthday attack, and brute birthday attack, and brute
mistakes. force attacks with some force attacks.
errors.
• identify with assistance an • identify some Issues when • identify Issues when • identify perfectly Issues
Issue when Conducting Conducting Transactions Conducting Transactions when conducting
Transactions over the over the Internet with over the Internet like Transactions over the
Internet with major some errors. “Impulse Buying” Internet like “Impulse
mistakes. • list some examples of while using incorrect Buying”.
• list an example of beneficial and harmful terminology. • analyze perfectly the
beneficial effects of effects of computing • Analyze imperfectly the beneficial and harmful
computing innovations innovations with some beneficial and harmful effects of computing
with major assistance. errors. effects of computing innovations.
• list with assistance an • list some examples innovations. • summarize confidently
example of how financial of how financial • summarize how financial how financial markets,
Impacts of Technology markets, transformed by markets, transactions, markets, transactions, transactions, and
automation with major and predictions have and predictions have predictions have
errors. been transformed by been transformed by been transformed by
• list with major assistance automation with some automation using some automation.
one example of how errors. incorrect terminology. • summarize perfectly
computation has • list some examples of • summarize how how computation has
revolutionized the way how computation has computation has revolutionized the way
people builds real and revolutionized the way revolutionized the way people build real and
virtual organizations and people build real and people build real and virtual organizations and
infrastructures. virtual organizations and virtual organizations and infrastructures.
infrastructures with some infrastructures using
errors. incorrect terminology.
• discuss how to recognize • discuss how to recognize • discuss how to recognize • discuss how to recognize
Information Accuracy plagiarism with lots of plagiarism and its plagiarism and its plagiarism and its
hesitation and using consequences with some consequences using consequences using many
& Reliability limited details. hesitation and using adequate details. supporting details.
limited details.
230
Grade 12
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• perform basic security • perform basic security • perform basic security • perform basic security
setup on a home Wi-Fi setup on a home Wi-Fi setup on a home Wi-Fi setup on a home Wi-Fi
router to protect their router to protect their router to protect their router to protect their
home network against home network against home network against home network against
Responsible Use & intruders with a lot of intruders with some help intruders with little help intruders with no help.
Cyber-Security help from teacher. from teacher. from teacher. • define perfectly
• recall dictionary attacks • define dictionary attacks • define dictionary attacks, dictionary attacks, replay
with major assistance. and replay attack with replay attack, password attack, password cracking.
major mistakes. cracking with some
incorrect terminology.
• describe how to properly • describe how to properly • describe how to properly • describe how to properly
cite others work with lots cite others work with cite others work using cite others work using
of hesitation and using some hesitation and using adequate details. many details.
limited details. few details. • explain the impact of the • explain the impact of the
Cyber Ethics & Laws • explain the impact of the • explain the impact of the digital divide on access to digital divide on access to
digital divide on access digital divide on access to critical information using critical information using
to critical information critical information with adequate details. many supporting details.
with lots of hesitation and some hesitation and using
using limited details. few details.
231
Grade 12A
Student 1-Barely or not initiated 2-Under development 3-Satisfies expectations 4-Exceeds expectations
Domain
Cyber Security, Cyber A (Level 1) Student A (Level 2) Student A (Level 3) Student A (Level 4) Student
Safety, and Cyber may be able to: is able to: is able to: is able to:
Ethics
• perform basic security • perform basic security • perform basic security • perform basic security
setup on a home Wi-Fi setup on a home Wi-Fi setup on a home Wi-Fi setup on a home Wi-Fi
router to protect their router to protect their router to protect their router to protect their
home network against home network against home network against home network against
Responsible Use & intruders with a lot of intruders with some help intruders with little help intruders with no help.
Cyber-Security help from teacher. from teacher. from teacher. • define perfectly
• recall dictionary attacks • define dictionary attacks • define dictionary attacks, dictionary attacks, replay
with major assistance. and replay attack with replay attack, password attack, password cracking.
major mistakes. cracking with some
incorrect terminology.
• describe how to properly • describe how to properly • describe how to properly • describe how to properly
cite others work with lots cite others work with cite others work using cite others work using
of hesitation and using some hesitation and using adequate details. many details.
limited details. few details. • explain the impact of the • explain the impact of the
Cyber Ethics & Laws • explain the impact of the • explain the impact of the digital divide on access to digital divide on access to
digital divide on access digital divide on access to critical information using critical information using
to critical information critical information with adequate details. many supporting details.
with lots of hesitation and some hesitation and using
using limited details. few details.
232
Sample Activities
233
234
Sample Activity (Grade 1):
By the end of Grade 1, the student will be able to:
Grade 1
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Discuss why it • The teacher will read few of the • One of the school’s rules will be • The teacher
is important to school rules for safe and ethical about switching off the computer will remind
be responsible Internet use and will ask the after completing the class. The the students at
when using students to follow one during the students will be reminded to the start of the
technology class-time. switch off the computers by the class that the
• List main • The teacher will introduce end of each class. computer need
consequences of different consequences related • The teacher will introduce to be switched off
improper use of to health, safety, copyright different scenarios and ask the by the end of the
technology and infringement, & identity theft. students of the best actions, one class. Students
how to avoid example is below: who will do will be
them a) A Senior High School awarded.
Internet policy emphasizes • The students will
be asked to list
that students must never some possible
download video and audio consequences
Responsible Use & of educational materials for different
Cyber-Security larger than 5MB. What is the technology use
best reason for the school to scenarios.
have such a policy?
• To eliminate the risk of
harming the school’s network
infrastructure
• To prevent students from
overwhelming the Internet
bandwidth
• To restrict students from
downloading educational videos
and music
• To stop students from
downloading irrelevant materials
to the school network
• Explain how • The screen brightness level can • The teacher will ask the students • The students will
prolong use of be used to notice that high to increase the screen brightness be asked how
computers can brightness can cause clear eye to the maximum and then good practices
cause back pain pain. lower them and discuss with of taking breaks
and eyestrain • Improper chair sitting can be used them which level feels more while using
and how to to demonstrate the pain that can comfortable. The teacher then computers can
avoid it be caused on the back and neck if can highlight the importance of help to avoid
prolonged. proper use over the long term. effects on one’s
health.
235
Sample Activity (Grade 4):
By the end of Grade 4, the student will be able to:
Grade 4
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Identify personal • The students will recognize that • The teachers will ask the • The students
information their names, ages, birthdates, students to write some personal recognize personal
family relations and other information using word information items.
identifying information are processing tool and then discuss
important and should be shared with them how to share the
Responsible Use & responsibly. information with others.
Cyber-Security • Exhibit right • The students will recognize that • The teachers will ask the • The students
judgments when their names, ages, birthdates, students to write some personal recognize personal
sharing personal family relations and other information using word information items.
information identifying information are processing tool and then discuss
important and should be shared with them how to share the
responsibly. information with others.
• Demonstrate • Science and technology on fast • After examining the accelerating • Mention 3
understating of forward: change in technological technologies and
technological http://undsci.berkeley. innovation and the single scientific advances
innovation and edu/article/0_0_0/ technology advance on that make-up the
how technology whathassciencedone_03 multiple different scientific and smartphones we
is changing fast • Accelerating change: technological advances like the use today.
in our modern http://en.wikipedia.org/wiki/ Cathode Ray tube. The students
world Accelerating_change will visit the following link:
Impacts of Technology http://undsci.berkeley.edu/article/
cellphone
• To explore how many advances in
diverse technologies and science
can combine and converge
to create a single innovate
technological product like the
smartphone.
• Discuss why • In this lesson, teachers first lead • The teacher can use a fictitious • The students
information students in a discussion around website to demonstrate accurate can check 4
should be the guiding question: What and inaccurate information about age-appropriate
checked for kinds of sources should you use? the human body. For example science facts as
Information Accuracy accuracy on a Next, teachers help students he will list that a human has two true or untrue
& Reliability web page to understand that no matter hands (true) and 4 eyes (untrue). after reading
their task - be it informational • Useful examples: them.
report writing or argument - their http://eduscapes.com/tap/
information should be fact-based topic32.htm
and the sources reliable.
236
Grade 4
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Explain how • The teacher will watch the • A group discussion will be based • The student
technology following video with the students on an online video on assistive can explain
helps people about assistive technology: technologies. how he/she can
with physical http://youtu.be/rXxdxck8Gic • See the following useful link: help physically
challenges • And then discuss with them how http://www.edutopia.org/ challenged person
and how they assistive technology can enrich assistive-technology-class-school- using technology
can improve life’s of people with physical participation available or
their access to challenges in the present and the developed in the
technology in future. future.
the future
Cyber Ethics and Laws
• Describe • The teacher will watch the • A group discussion will be based • List 3 assistive
the role that following video with the students on an online video on assistive technologies
adaptive about assistive technology: technologies. available
technology can http://youtu.be/rXxdxck8Gic • See the following useful link: nowadays.
play in the lives And then discuss with them how http://www.edutopia.org/
of people with assistive technology can enrich assistive-technology-class-school-
special needs life’s of people with physical participation
challenges in the present and the
future.
• Discuss • The students will watch the • A group discussion about Internet • List 3 effects
symptoms following video about Internet addictions based upon a video. of Internet
of Internet addictions symptoms and effects: The students then will be asked to addictions.
addiction http://youtu.be/iOUsiXgtHGQ reflect back on their own.
• Then they will have a group
discussion.
237
Sample Activity (Grade 7):
By the end of Grade 7, the student will be able to:
Grade 7
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Explain why it • Give two examples where • 1) Read about a real case story • Describe two
is important personal information should not and discuss it in the classroom. scenarios
not to share be shared 2) Visit some selected websites where it is
personal (e.g. someone call and ask for it, and explore the different forms recommended not
information filling a form in non - popular they have to discuss the kind of to share personal
with everyone website, etc). information required to be filled. information.
Responsible Use & on the Inernet • List two ways to protect against • Use the Internet to do a research • Analyze a
Cyber-Security • List main ways un-intentional reveal of personal about revealing personal given scenario
to protect information. information via social media such to identify a
against un- as FaceBook, Instagram, twitter, threat caused by
intentional and others. sharing personal
reveal of information.
personal
information
• Demonstrate • 10 Future Technologies That Will • Watch the video in the link • Discuss three
ability to come Change The World https://www.youtube.com/ examples of future
up with future https://www.youtube.com/ watch?v=lMymFYJWW5M technologies, and
technologies, watch?v=lMymFYJWW5M • and summarize the 10 examples the consequences
and the • Top 10 IT Jobs In Demand for mentioned in the video discussing of using them.
consequences of 2013 | Hottest Tech Skills the futuristic consequences of • List top five IT
using them https://www.youtube.com/ using them. jobs currently in
• Discuss the jobs watch?v=4-0yxQO2ozM • Watch the video in the link demand.
Impacts of Technology
of computer https://www.youtube.com/
scientists, watch?v=lMymFYJWW5M
engineers, and • and write an essay about the
information example jobs mentioned in the
technologist video.
in our modern
world and the
near future
• Discuss • Google search results, Wikipedia, • Provide links to web sources • Evaluate a search
common types Google scholar, Google images, about certain math topic. The task on the
Information Accuracy of online sources YouTube, Khan Academy. links should include video Inernet.
used to get tutorials on YouTube, video
& Reliability information tutorials from Khan Academy, and
general tutorials from different
websites.
238
Grade 7
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Describe how • Cover topics like public domain, • List three free software and • Compare between
legal rights and software piracy, freeware, three similar shareware software. freeware and
different kinds shareware, accountability. Discuss them in terms of use. shareware giving
of software • Explain that reducing software • Write a short essay about software some examples/
licenses can be piracy not only increases software piracy in the US (has lowest piracy Define public
used to share companies’ revenue, but it can rates) and Vietnam (has highest domain and give
and protect also stimulate the economy. It piracy rates in the world). an example URL/
copyright and also would contribute to creating • Divide the students into groups Define Copyright
intellectual new IT jobs. Also, explain that and ask each group to use the Infringement.
property increased revenues can be used to Inernet and come up with three • List five social
• Discuss the support essential social services. laws of software development and economic
Cyber Ethics & Laws social and • Cover topics related to commonly used worldwide. implications
economic Acceptable Use Policy (AUP), UAE associated with
implications Cyber Laws/Rules, and Intellectual software piracy.
associated with property. • Define Intellectual
software piracy property/
• Identify laws Discuss the main
and regulations elements of an
that impact the AUP/ List three
development laws of software
and use of development
software commonly used
worldwide.
• Explain how • Using computers for long hours, • Conduct an Inernet research • Evaluate an
heavy use of using computing devices before about how does long use of essay assignment
computers and bed time. computers and Inernet can cause discussing how
mobile phones sleep disorders. does long use of
Cyber Health can result in computers and
an increase in Inernet can cause
sleep disorders sleep disorders.
symptoms in
young adults
239
Sample Activity (Grade 10):
By the end of Grade 10, the student will be able to:
Grade 10
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Discuss the • A table that compare between the • Ask students to use the Inernet • A quiz.
different types three types of malware. and give three examples of each • Devise a rubric to
of malicious • Definition, real examples. type, which caused big damage in assess students
software • Define cryptography. the past. understanding
including • Explain symmetric and • List two categories of “Digital based on the
worms, viruses asymmetric algorithms. Footprint”. suggested
and Trojan • Demonstrate digital signatures. • Ask students to refer to any activities.
horses • Illustrate sensitive data encryption demo website
• Define “Digital encryption. (example: http://www.
Footprint” • Demonstrate hashing algorithms. vincentcheung.ca/ jsencryption/)
• List two and let them exchange secret
categories messages. Only those who will get
for “Digital the key can decrypt the message
Responsible Use & Footprint” and reveal the message. Let
Cyber-Security • Define students visit the website
cryptography http://caligatio.github.io/jsSHA/
• Explain • they should realize that hashing is
symmetric and not reversible (one way) and does
asymmetric not require a key.
algorithms
• Demonstrate
digital signatures
• Illustrate
sensitive data
encryption
• Demonstrate
hashing
algorithms
240
Grade 10
Suggested
Strand Learning outcome Example Sample Activity
Assessment
• Identify ypes • Online banking, wire transfers, • Ask the students to use the • Devise a rubric to
of Internet online bill payment, and credit Inernet and visit different UAE assess students
transactions card transaction. bank websites and record the understanding
• Compare • Influence of social media, reduced types of online transaction they based on the
the positive face-to-face interactions, working can offer: suggested
and negative from home, less TV use, etc. 1. EmiratesNBD: http://www. activities.
impacts of • On small business: mobility, emiratesnbd.com/en /index.
technology on productivity, need for training,
culture employee flexibility, increased cfm/personal - banking/ways -
• Discuss the stress, distraction. e-commerce, of - banking/online - banking/
impact of banner ADs, Google AdSense 2. NBAD: http://www.nbad.com/
computer https://www.apple.com/ en - ae/personal - banking.
technology on education/special-education html
business and • Assisstive word processing, text to
commerce speech technology, What types of 3. ADCB: http://www.adcb.com/
• Describe learning problems does assistive waystobank /about - inet -
the role that technology address? See banking/adcbactive - Inernet
adaptive http://www.readingrockets.org/ - banking.asp
technology can article/assistive-technology-kids - • Refer students to the online article
play in the lives learning-disabilities-overview. “The Impact of Social Media on
of people with • Assess in variety of fields: UAE Society”on the link:
Impacts of Technology special needs 1. autism spectrum disorders http://www.ecssr.ac.ae/ECSSR/
2. blindness and low vision print/ ft.jsp?lang=en&ftId=/
3. deafness and hard of hearing FeatureTopic/Fatma - AlSayegh/
FeatureTopic_1698.xml
4. communication disorders and ask them to identify five
5. mobility impairment effects of technology on UAE
6. learning disabilities society.
7. cognitive disabilities • Ask the students to use the
Inernet and research about
e-commerce in the UAE. Students
should identify real example
on how commerce changed by
adopting e-commerce in UAE
market.
• Ask students to discuss three
examples on how adaptive
technology can play in the lives
of people with special needs/Ask
students to identify two features
in windows that support people
with special needs.
• Define a cited • How to cite a source. • Ask students to use the Inernet • Devise a rubric to
source • How to identify a published work. and show examples of cited assess students
Information Accuracy • Define sources and published work. understanding
& Reliability published work based on the
suggested
activities.
241
242
Sample Activities with different format
243
244
Sample Activity (Grade 1):
Activity: Prolong use of computers can cause back pain and eyestrain
Time: 30 minutes
The teacher will ask the students to increase the screen brightness to the maximum and then lower them and
Description: discuss with them which level feels more comfortable. The teacher then can highlight the importance of proper
use over the long term.
Level: 1
Topics: Explain how prolong use of computers can cause back pain and eyestrain and how to avoid it
• Students will need time to familiarize themselves with the Monitor settings and how they can change them.
Planning Notes: • The teacher needs to check beforehand that the screens can provide the brightness level feature.
Teaching/Learning Strategies: The setting is a computer lab with suitable computer monitors; no special setup is needed beyond that.
The students will be asked how good practices of taking breaks while using computers can help to avoid effects
Assessment and Evaluation:
on one’s health.
Students need to preferably use the computer monitors individually. If this is not possible then they can exchange
Accommodations:
places and repeat the activity steps individually.
Time: 45 minutes
The students will watch a video guided by the teacher about assistive technology, then have a group discussion
Description:
how assistive technology can enrich life’s of people with physical challenges in the present and future.
Level: 2
Explain how technology helps people with physical challenges and how they can improve their access to
Topics:
technology in the future.
• Students discuss types of assistive technology available. They can first repeat the one mentioned in the video
and then think about other technologies.
Assessment and Evaluation: • Each student/group explain an one type of assistive technology (assigned by the teacher).
• Each student/group do a quiz about new future types of assistive technologies. The student/group can use
search engines to accomplish this task.
Accommodations: Students use the Internet individually or by groups on the lab computers.
245
Sample Activity (Grade 7):
Activity: 10 Future Technologies That Will Change the World
Time: 45 minutes
Level: 2
Topics: Demonstrate ability to come up with future technologies, and the consequences of using them.
• Students will need time to watch the video and discuss its content with their colleagues.
• The video is to be viewed online and hence, Inernet access is required and YouTube website is not blocked by
Planning Notes: school. However, the video can be viewed offline if the teacher is able to download it.
• The video will play for about 11 minutes.
• Students discuss future technologies and the futuristic consequences of using them in groups.
Assessment and Evaluation: • Each student/group explains the selection of his/her favorite technology.
• Each student/group submits homework about the future technology he/she/they selected.
Students watch the movie on a projector connected to the teacher computer or they watch it individually or by
Accommodations:
groups on the lab computers.
Time: 45 minutes
Students use the Inernet and visit different UAE bank websites. They record the types of online transaction that
Description:
those banks can offer.
Level: 2
Accommodations: Students use the Inernet individually or by groups on the lab computers.
246
CST standards Sample Implementation
Scenario
247
248
The implementation of the standards document and building curricula based on it is a key issue that worth discussions and agreement. The authors of
this document believe that the evolution of the different domains over the three cycles should be in an essence that is conferment with the grade span
description outlined in section 3. As it currently stand, the committee suggest the following percentage of various domains per cycle:
Planned %
C1 C2 C3 C3A
DLC 60 40 15 15
CT 15 20 25 35
CPP 15 25 45 35
CCC 10 15 15 15
C1 C2 C3 C3A Total
217
The above calculation was made based on the assumptions of the following number of weeks per term (Term 1(T1): 11 weeks, Term 1(T2): 10 weeks,
and Term 1(T3): 10 weeks) and assuming that 1 hour (Period) will be allocated to classes of cycle 1 (C1) and cycl2 (C2), 2 periods for cycle 3 (C3), and 3
hours for advanced cycle 3 (C3A) as shown below.
# of Weeks C1 C2 C3 C3A
T1 11 11 11 22 33
T2 10 10 10 20 30
T3 10 10 10 20 30
31 31 62 93 217
Weekly
Contact HRs
C1 1
C2 1
C3 2
C3A 3
249
The below charts summarize the quantitative analysis of number of periods per domain per cycle along with percentages.
250
Domains Scaffolds
251
252
DLC Scaffolding Chart
Cycle 3/3A
Produce different
multimedia products
using different types
of tools like animation Explain different
Select the most effective
tools, web authoring hardware, functions,
tools to collaborate
tools and video and software and utilities of
successfully with peers
audio editing tools network systems
Practice collaboration
Cycle 2
activities using age
Explain the computer appropriate tools and
organization and Create animated stories Perform effective search sites and Exhibit abilities
compare computer using multimedia tools methods on the web in technical writing and
performances enhanced computer skills.
Introduce basic
keyboarding skills
Internet Surfing
Computer Productivity Collaboration Computer
& Information
Operation Tools tools Network
Retrieval
253
CT Scaffolding Chart
Cycle 3/3A
Demonstrate the ability Use various Analyze data and
Organize algorithmic
to evaluate algorithm decomposition identify patterns
solution into logical
working, complexity and parallelization through models and
modules
and structure techniques simulation
Express problem
solutions as a sequence
Cycle 2
of steps
Algorithmic
Evaluation Decomposition Abstraction Generalization
Thinking
254
CPP Scaffolding Chart
Cycle 3/3A
Demonstrate the use Implement and
Develop and deploy
of a programming evaluate alternative
applications to solve
language to solve a solutions for the
real life problems
variety of problems same problem
Analyze a given
Cycle 2
Design, develop,
problem in order Create digital story
test and deploy an
to generate a using appropriate
application using
computer-based programming tool
appropriate software
solution
255
CCC Scaffolding Chart
Cycle 3/3A
explain encryption algorithms everyday life of academic integrity and
demonstrate understanding right to having equal,
Discuss the different types Understand online about plagiarism, its secure and reliable access
of malicious software and buying behaviors consequences, how to
different protection
information reference or cite others work, Discuss security and
Discuss Web Presence and and appreciate originality privacy issues related to use
the importance of having
Discuss the impact of and plagiarism prevention of modern communication
proper self-representation on computer technology on services and tools media and devices
the Internet business and commerce
Explain how computer Evaluate the accuracy, Exhibit legal and ethical
credibility, integrity, behaviors when using
viruses spread and best Discuss how technology relevance, appropriateness, information and technology
practices to protect affects education, comprehensiveness, and
Cycle 2
against them culture, the workplace, biases of the different
Understand the effects
and business electronic information Develop understanding about of technology on the
governing communication sleep quality, stress
Exhibit awareness about sources concerning real-
and technology use
the different threats when world problems levels, and general
using online websites by Understand future mental health
making right decisions on Define plagiarism and list Discuss ideas implemented
technology changes in technology that support
what to share, when to common forms of student
share, and with whom plagiarism people with special needs
Information
Responsible Use Impacts of Cyber Ethics &
Accuracy & Cyber Health
& Cyber-Security Technology Laws
Reliability
256
Computer Science and Technology
Integration into other Curricula
257
258
Gaining Technology Skills While Learning the Content of the Core Curriculum
Anyone who has taken a training course in the use of a spreadsheet, for example, knows how quickly we forget the skills unless we can apply them
in our work on a regular basis. Whether technology instruction takes place in the classroom or in the computer lab, it is important that students be
able to apply their newly acquired skills to subject matter learning. For example, a student who has gathered data for a science project and needs to
organize the data in a database will see a reason for learning about the features and function of a database. This is context - sensitive learning in which
technology skills instruction is centered on the curriculum.
Initial technology skills instruction needs to be provided by someone who is proficient in the use of that technology tool. Although some teachers
are skilled enough with technology to teach their students to use the tools within the context of the curriculum content, other teachers may not be
prepared to do this. A possible solution is for a staff person with technology expertise (such as an instructional technology specialist, library teacher, or
another classroom teacher acting as a mentor) to provide mentoring or to co - teach alongside the teacher.
As technology tools become an integral part of the learning environment, and as students gain the knowledge and skills to use them appropriately,
new opportunities for learning open up. Dynamic geometric applets, for example, can help students visualize and understand complex mathematics
concepts. Simulation software enables students to investigate models of real - world problems such as climate change and population growth. Basic
tools such as spreadsheet and database applications can be applied across the curriculum to analyze and solve problems. Even basic word processing
software can encourage students to organize their thoughts and revise their work.
The following scenarios show how technology can be applied in the classroom so that students acquire these skills while addressing the standards
of the curriculum frameworks. These scenarios can be conducted by the UAE MOE schools using a tailor made technology toolkit. To evaluate
the progress in the technology integration into various subjects, schools can participate in a dedicated project where certain schools can receive
instructional technology grants from the Ministry, and some excellent teachers can be nominated and receive awards for taking part of this project.
Each scenario features a lesson unit on a specific curriculum topic. Several criteria were used to select these lesson units.
a) The lesson needed to have a clear curriculum focus that was aligned with the Ministry’s Curriculum Frameworks.
b) The lesson had to integrate learning technology skills with learning the curriculum content.
c) The lesson also had to address the fact that students have varying abilities, backgrounds, and interests.
d) The lesson needed to have a way to evaluate/assess how much students had learned.
e)
First, The authors of this document demonstrate below an example of how the CST standards document is lined with recently developed MoE Math
Standards Framework (Grades 1 - 9) followed by Examples of Integrated Learning Scenarios for CST standards:
259
Intersections between this document and Math Document
In the following tables, the intersection between recent MoE Mathematics Standard document and Computer Science and Technology document for
various strands per grade are shown.
Grade 1
CST
DLC CT CPP CCC
Math
Counting
Place Value
Patterns
Location
Measurement
Grade 2
CST
DLC CT CPP CCC
Math
Counting
Place Value
Patterns
Measurement
260
Grade 3
CST
DLC CT CPP CCC
Math
Place Value
Fractions
Patterns
Measurement
Grade 4
CST
DLC CT CPP CCC
Math
Place Value
Fractions
Decimals
Measurement
261
Grade 5
CST
DLC CT CPP CCC
Math
Place Value
Fractions
Decimals
Measurement
Polygons
Grade 6
CST
DLC CT CPP CCC
Math
Fractions
Decimals
Integers
Polygons
Transformations
Circles
262
Grade 7
CST
DLC CT CPP CCC
Math
Integers
Rational Numbers
Functions
Polygons
Transformations
Circles
Congruence
Grade 8
CST
DLC CT CPP CCC
Math
Integers
Rational Numbers
Functions
Polygons
Transformations
Circles
Congruence
263
Grade 9
CST
DLC CT CPP CCC
Math
Integers
Rational Numbers
Functions
Polygons
Transformations
Circles
Congruence
264
Examples of Integrated Learning Scenarios for CST standards
Integrated Learning Scenario #1
Reciprocating Art
Grades 1 - 4 Art
Instructional objective: The student will be able to use the principles and elements of design to create artwork collaboratively with students in
another country.
Project description: In this art project the teacher can work with a school at another country, e.g., Japan so that Emiratis and Japanese
students could collaborate to create unique artwork. A translator helped the teacher use e - mail and language
translation software to communicate with the Japanese principal and determine the exchange process. A group of
Japanese students and a group of Emirati students each created a background for a painting. They then exchanged
artwork through collaboration tools (e.g. regular mail) and finished each other’s paintings. The Emirati students used
technology to communicate with the Japanese students, creating a video to send messages in English and Japanese. The
teachers communicated through e - mail. The completed artwork was sent back to the original schools through regular
mail or any other file sharing facility.
Evaluation: To evaluate the students’ work, the teacher used peer review, artwork critique, and evaluation of the finished products.
Evidence of effectiveness: The students were deeply involved in the process of critiquing, comparing, and contrasting the artwork. Their families
also valued the students’ participation in the project. Many Emirati families framed their child’s work from this art
exchange project. In fact, some have framed the correspondence from this project as well as the artwork and have
placed them next to each other. Of course, all of the vocabulary had to be translated. The Japanese writing next to the
Emirati writing is a piece of art onto itself. Many families thought so as well. The idea of accepting cultural differences
and knowing that one culture is not better than the next but can be learned from is important for the students to
understand. This was accomplished through discussion and student activities.
Related Standard:
Use a variety of age-ppropriate technologies (e.g., drawing program, presentation software, etc.) to communicate and exchange ideas.
265
Integrated Learning Scenario #2
Becoming Scientists
Cycle 1: Science and Technology/Engineering
Instructional objective: At the conclusion of this unit, students will be able to demonstrate their understanding of the properties of light and
sound through classroom instruction and authentic data collection activities.
Project description: This project involved the development of simulation program that address the curriculum standards for the study of
light and sound. Each unit followed the same format, integrating the use of science probes with the teaching unit. To
ensure that students were highly motivated to conduct the investigations, the students were given fictitious scenarios
presenting problems that could only be solved after sound and light data had been collected and analyzed. The result of
integrating technology in this way was that students became deeply engaged in this authentic learning experience.
Evaluation: Student learning of the science content standards was evaluated using classroom quizzes and rubric scoring of their
works. The technology benchmarks were evaluated by observation of student use of Tablets (e.g. iPads) and sensor use,
the accuracy and organization of graphed information, and the use of word processing tools.
Evidence of effectiveness: The integration of data collection into the study of physics brings authenticity to the learning experience. The teachers
and students will express overwhelming enthusiasm for these learning activities. At the conclusion of both units will
become clear to the teaching staff that when learning becomes authentic, deeper understanding of the content is
achieved.
Related Standards:
a) Use content - specific technology tools (e.g., environmental probes, sensors, measuring devices, simulations) to gather and analyze data.
b) Use spreadsheets and other applications to make predictions, solve problems, and draw conclusions.
c) Create projects that use text and various forms of graphics, audio, and video (with proper citations) to communicate ideas.
266
Integrated Learning Scenario #3
SELECT Math
Grade 7 Mathematics
Instructional objective: Students will be able to identify and distinguish between part-to-part and part - to - whole ratios and recognize
situations in which ratios are a useful form of comparison.
Project description: This investigation focused on the part-to-part and part - to - whole meaning of fractions. Students informally explored
rates and ratios using proportional reasoning to determine how to combine orange juice concentrate and water to
make enough orange juice for a given number of people. The students used virtual manipulative, such as online fraction
circles and visual models, to help them solve problems and check their solutions.
Evaluation: To evaluate students’ progress in meeting the mathematics standards, the teacher assessed the students’ ability to
represent a ratio graphically and to write part-to-part and part - to - whole ratios from a graphical representation. To
evaluate the students’ progress in meeting the CST technology standards, the teacher will check whether the students
are able to independently access the Web site, use the mouse, and enter the data. The teacher will also evaluate how
efficiently the students are able to use Microsoft Word’s drawing tools to represent each given mixture.
Evidence of effectiveness: The students should be excited about using the technology, and they are to be focused on how they could use the
technology to evaluate the orange juice recipes. In their minds the technology is doing the work for them. The teacher
will make references throughout the year to the orange juice problems because the strategies students used truly stayed
with them. Every student will feel successful solving these problems when they used the technology.
Related Standards:
Use a variety of computing devices (e.g., probeware, handheld computers, digital cameras, scanners) to collect, analyze, and present information for
curriculum assignments.
267
Integrated Learning Scenario #4
Instructional objective: The students will be able to determine, through research and comparison, which African countries are developed and
which are developing.
Project description: This Africa unit integrated research, technology, art, and music to reach its goals. After studying the continent of Africa,
each student chose a country to study in depth. Students researched their countries and entered their data into a
shared spreadsheet, which the class used to sort and rank the countries by various attributes. The students used what
they learned to create PowerPoint projects, which were shared using SMART Board technology. During the time that
students were researching Africa, the art and music teachers provided activities to help make students more aware
of African customs. In art class, students discussed and constructed African masks, while in music class they explored
African drumming.
Evaluation: The PowerPoint presentations and spreadsheets are graded as rough copy outlines and later as finished products. The
teacher informally assess each student’s ability to judge which stage of development a country was in and used data to
argue the case for the country he or she studied. The teachers also evaluate each student’s ability to collect data on a
specific country, add the data to a spreadsheet, and sort the data across several fields.
Evidence of effectiveness: The use of technology for this unit allowed students to produce higher quality work in a shorter period of time. Having
computers available at virtually any time allowed the students to work on their projects during periods of down time.
The fact that the projects would be presented to the class will motivate the students to do their most careful work.
Some of the PowerPoint presentations will be shared with parents as well. Having the ability to burn CDs or USB flash
drives and take digital pictures allowed teachers to share the students’ works with their parents.
Related Standards:
a) Collect, organize, and analyze digital information from a variety of sources, citing sources.
b) Use and modify databases and spreadsheets to analyze data and propose solutions.
c) Plan, design, and develop a multimedia product to effectively present research findings and creative ideas, citing sources.
268
Integrated Learning Scenario #5
Instructional objective: Students will use the Web to research the historical and cultural contexts for the literature they are studying and then
write a travelogue or travel brochure presenting their findings.
Project description: In this online lesson, students are asked to take an imaginary bus trip to the time and place in which a story, poem,
or play they are studying is written. When the students read a play, for example, they ventured back to seventeenth -
century Japan. Students are first asked to find as much information online as they could on their own; however, search
sites were provided for students who were having trouble finding the information. Students can be asked to look for
historical events, cultural events, and movements, and to pay attention to the food and fashions of the time. The
students can be also asked to write a travel program or travel brochure to present their findings and make a connection
to the work of literature the class is reading. The unit also can include a short lesson on assessing the validity of Web
sites and online information.
Evidence of effectiveness: Students can comment on this assignment and how it can help them understand the literature a bit more deeply and
that it can add to their appreciation of the text. In their written analysis of the literature, the teacher found references
to details learned in this assignment and an appreciation for nuances in the text that required an understanding of the
historical and cultural contexts.
Related Standards:
a) Write correct in - text citations and reference lists for text and images gathered from electronic sources.
b) Evaluate the authenticity, accuracy, appropriateness, and bias of electronic resources, including Web sites.
c) Devise and demonstrate strategies for efficiently collecting and organizing information from electronic sources.
d) Select the most appropriate search engines and directories for specific research tasks.
e) Use a variety of media to present information for specific purposes (e.g., reports, research papers, presentations, newsletters, Web sites,
podcasts, blogs), citing sources.
269
Integrated Learning Scenario #6
Instructional objective: Students will use algorithms and coding to write a small simulator for an airport flight arrival and departure to help
people to get information about the air traffic status.
Project description: In this lesson, students are asked to write an algorithms and code to simulate the arrival and departure of airplanes to
Abu Dhabi Airport and find out if a trip will be delayed or not given the current traffic status. Students should enter
information about air traffic status regularly like (departure location, time of departure, time of arrival…etc), then the
simulator will help users to get useful and valuable information about airplanes departure and arrival times for any
journey in Abu Dhabi airport. Users can start their inquiries based on any related information about journeys (no. of
journey, departure location, destination …etc) to get useful information. Users have option to use local or GMT time.
Daily reports about percentage of delays journeys should be shown with simple analyzing.
Evidence of effectiveness: Students can deliver a documented simulator to present services and features about the simulator. Students can
deliver electronic user manual for the simulator. Students can show reports of feedbacks, complaints, evaluation and
suggestions from users. Students can show how they can collect information about airplanes traffic status and responds
from users.
Related Standards:
a) Evaluate the authenticity, accuracy, appropriateness, and bias of electronic resources, including Web sites.
b) Demonstrate writing a code in a suitable programming language derived from an algorithm.
c) Devise and demonstrate strategies for efficiently collecting and organizing information from different sources.
d) Select the most appropriate programming language specific to a research task.
e) Use a variety of media to present information for specific purposes (e.g., open source code, reports, presentations, Web sites), citing sources.
f)
270
List of Software Requirements:
• Scratch • Scratch
• GameSalad (Paid) • GameSalad
Cycle 2: G6 - G9 • App Inventor • App Inventor
• Internet Access
• Java • Java
Cycle 3: G10 - G12 • C++ • C++
• Python • Python
271
Guidelines for book Authors (DLC Domain)
1. Unify all scientific terminologies across all grades and present it in both English and Arabic languages.
2. Ensure the use of most recent versions of the application introduced in each grade.
3. Design DLC domain’s examples and activities based on an English applications’ interface.
4. It is strongly recommended to link DLC domain with CCC domain whenever appropriate.
5. It is strongly recommended Design units that gradually increase difficulty while moving up in grades.
6. It is strongly recommended to provide different examples and assignments to solve real life problem or situation to produce well - designed
presentations.
7. It is strongly recommended design activities to provide for different students levels and needs.
8. It is strongly recommended to provide examples of challenge activities and assignments.
9. It is strongly recommended create link in each unit with other subjects specially math, science and languages.
10. It is strongly recommended to present materials in an attractive way that provide interactive learning.
11. It is strongly recommended to provide well structure assessment using different question types and tools.
12. It is strongly recommended to Create suitable links with 21 century skills, STEM, Math, finance, innovation and humanity.
13. It is strongly recommended to Use Learning outcomes to develop unit contents.
14. It is strongly recommended that each unit should reflect some links with UAE identity and culture through different contexts and levels.
272
Guidelines for Book Authors (CPP Domain)
1. Emphasize the importance of writing codes properly.
2. Focus on the software development cycle.
3. For cycle 3 an object oriented programing language (e.g. JAVA) must be used.
4. Focus on Practical activities in ascending order of difficulty.
5. Include example of group projects.
6. Use real examples from math, science subjects and students life.
7. CT and CPP should be directly connected (before coding an algorithm must be developed)
8. Give 3 to 4 type of questions from the following:
• MCQ, true/false questions
• Simple programming questions
• Tracing and correction given erroneous programs/piece of code.
• Difficult programming questions
273
274
References
275
276
Books and Articles:
1. Deborah Seehorn, Stephen Carey, Brian Fuschetto, Irene Lee, Daniel Moix, Dianne O’Grady-Cunniff, Barbara Boucher Owens, Chris Stephenson, and
Anita Verno. 2011. CSTA K-12 Computer Science Standards: Revised 2011. Technical Report. ACM, New York, NY, USA.
2. Knowledge Point Educational Consultant, LLC 2012. Cyber C3 Student Quick Reference. Abu Dhabi, UAE.
3. Java Programming from Problem Analysis to Program Design (Introduction to Programming) by D.S. Malik
4. David Weintrop, Elham Beheshti, Michael Horn, Kai Orton, Kemi Jona, Laura Trouille, Uri Wilensky, “Defining Computational Thinking for Science,
Technology, Engineering, and Math”, American Educational Research Association, 2014.
5. International Society for Technology in Education Standards.
6. The International Society for Technology in Education (ISTE) Operational Definition of Computational Thinking for K-12 Education
7. The CSTA Standards Task Force, K-12 Computer Science Standards Revised 2011.
8. ISTE and CSTA Computational Thinking Leadership Toolkit, first edition.
9. ISTE and CSTA Computational Thinking Teacher Resources, second edition.
10. P Curzon, M Dorling, T Ng, C Selby, J Woollard, Developing computational thinking in the classroom: a framework, Computing At School 2014.
11. Exploring Computer Science: Curriculum Mapping to Learning Standards State Standards Edition, Center for Technology in Learning at SRI
International.
12. Exploring Computer Science: Curriculum Mapping to Learning Standards CSTA Edition, Center for Technology in Learning at SRI International. ISTE/
NETS Edition
13. Exploring Computer Science: Curriculum Mapping to Learning Standards ISTE/NETS Edition, Center for Technology in Learning at SRI International.
14. Exploring Computer Science: Curriculum Mapping to Learning Standards CA CTE Edition, Center for Technology in Learning at SRI International.
15. CT Vocabulary and Progression Chart, Computer Science Teachers Association (CSTA) and the International Society for Technology in Education
(ISTE).
Useful Sites
1. Teen Internet Safety Tips: http://teens.webmd.com/features/teen-Internet-safety-tips
2. McAfee Security Advice Center: http://home.mcafee.com/advicecenter/
3. McAfee 10-Step Internet Safety Plan for Your Family: http://promos.mcafee.com/en-US/PDF/McAfeeInternetSafetyPlan.pdf
4. McAfee Do’s and Don’ts of Online Shopping: http://promos.mcafee.com/en-US/PDF/shopping_eBook.pdf
5. McAfee A Parent’s Guide to Social Networking: http://promos.mcafee.com/en-US/PDF/SocialNetworkinge-guide.pdf
6. Microsoft Computer and Internet Security: http://www.microsoft.com/security/default.aspx
7. Microsoft “Security Tips and Talk” Consumer Blog: http://blogs.microsoft.com/cybertrust/category/tips-talk/
8. Microsoft Security Intelligence Report: http://www.microsoft.com/security/sir/default.aspx
9. PayPal What You Need to Know to Stay Protected and Secure: https://cms.paypal.com/us/cgi-bin/marketingweb?cmd=_render-content&content_
ID=security/online_security_center
10. Symantec Family Resources: http://www.symantec.com/norton/familyresources/index.jsp
11. Symantec Family Safety Blog: Ask Marian: http://community.norton.com/t5/Ask-Marian/bg-p/askmarian
12. Symantec OnlineFamily.Norton: https://onlinefamily.norton.com/familysafety/loginStart.fs
13. Trend Micro: http://www.trendmicro.com/us/about-us/index.html
14. Anti-Phishing Phil game: http://cups.cs.cmu.edu/antiphishing_phil/
15. Anti-Phishing Working Group (APWG): http://www.antiphishing.org/
16. Center for Safe and Responsible Internet Use: http://csriu.org/
17. CyberSmart! Curriculum: https://www.commonsensemedia.org/educators/curriculum
18. Enough is Enough: http://www.enough.org/
19. ESET Securing Our eCity Resources: http://www.securingourecity.org/resources.php
20. Federal Communications Commission (FCC)-Privacy and Online Security: http://reboot.fcc.gov/privacy-and-online-security
21. Federal Communications Commission (FCC)-OnGuard Online (Safety Tips from the Government): http://www.onguardonline.gov/
22. Federal Communications Commission (FCC)-YouAreHere (Resources for Kids, Parents, and Teachers): http://www.ftc.gov/youarehere
23. Generation YES: http://www.genyes.com/
24. GetNetWise: http://getnetwise.org/
25. Identity Theft Resource Center: http://www.idtheftcenter.org/
26. ICSA Labs (division of Verizon Business): http://www.icsalabs.com/icsa/icsahome.php
27. Identity Theft Resource Center: http://www.idtheftcenter.org/
28. iKeepSafe Internet Safety Coalition: http://www.ikeepsafe.org/
29. International Cyber Security Campaign-Japan: http://www.nisc.go.jp/security-site/eng/index.html
30. JustAskGemalto: http://www.justaskgemalto.com/
31. Multi-State Information Sharing and Analysis Center-Cyber Security Awareness resources: http://www.msisac.org/awareness/
277
32. MySecureCyberspace: https://www.mysecurecyberspace.com/
33. NASCIO: http://nascio.org/
34. National Center for Victims of Crime: http://www.ncvc.org/
35. National Crime Prevention Council: http://www.ncpc.org/
36. National Institute of Standards and Technology (NIST): http://www.nist.gov/information-technology-portal.cfm
37. National Initiative for Cybersecurity Education (NICE): http://csrc.nist.gov/nice/
38. NetSmartz: http://www.netsmartz.org/index.aspx
39. NYS Division of Homeland Security and Emergency Services’ Office of Cyber Security: http://www.dhses.ny.gov/ocs
40. PointSmartClickSafe: http://www.pointsmartclicksafe.org/
41. Savvy Cyber Kids: http://savvycyberkids.org/
42. WiredSafety.org: http://www.stopcyberbullying.org/
43. Yahoo!: Teaching Children About Online Risks: http://elearnmap.ipgkti.edu.my/resource/edu3053/artikel/Teaching+Children+About+Online+Risks.
htm
44. Google for Education:https://www.google.com/edu/programs/exploring-computational-thinking/index.html#!lessons-and-examples
45. http://www.brighthub.com/computing/windows-platform/articles/6469.aspx
46. http://www.palmbeachschools.org/multicultural/documents/Chapter2ProgramModels.pdf
47. http://www.iste.org/
48. http://ritter.tea.state.tx.us/rules/tac/ch126.html
49. http://csta.acm.org/
50. http://www.cs4hs.com/
51. http://code.org/
52. http://hourofcode.com/us
53. http://scratch.mit.edu/
54. https://css-cs4hs.appspot.com/CS4HS2013/course
55. https://creative-computing.appspot.com/preview
56. http://www.cs4hs.com/resources/cscs.html
57. http://www.csprinciples.org/
58. http://csedweek.org/
59. http://www.exploringcs.org/
60. http://www.appinventor.org/
61. http://gamesalad.com/
62. http://code.google.com/p/blockly/
63. http://www.scratchjr.org/
64. http://csunplugged.org/
278
Acknowledgments
This document was developed with the support of many experts.
MoE CST Standards Update Expert List
279
280