Learning Outcomes

Learning Outcomes are arranged by grade band and based off the National K-12 Computer Science Framework. For more information, please visit https://k12cs.org.

Learning Outcomes by the end of Grade 2

– Students will be able to explain the difference between hardware and software through the completion of a hands-on activity. 

– Students will be able to explain the major aspects of a computing system.

– Students will be able to describe the basic ideas of how information moves through a network. 

– Students will recall the definition of authentication and explain the necessity of strong passwords. 

– Students will complete a basic activity in cryptography (invisible ink) in order to establish a baseline for the necessity of encrypted information in a digital world. 

– Being online requires a sense of responsibility. Students will be able to explain ethics as the choice to do what is right over wrong and understand that cyberethics exist and that there are important guidelines to follow. 

– Students should verbalize and adhere to the following ethics: I will not use my computer to harm others. I will not use a device without the owner’s permission. I will be honest in my use of devices. I will give credit when using another person’s material.

– Students will be able to recall at least two types of  PII and practice safe online behaviors including reporting cyberbullying, invasions of privacy, and basic cell phone safety (if applicable). 

– Students will be able to comprehend the concept of a digital footprint.

N/A to age group

– Students will be able to identify potential careers in technology including cybersecurity.

Learning Outcomes by the end of Grade 5

– Students will be able to explain the difference between hardware and software and display basic troubleshooting solutions for hardware and software issues.

– Students will explain how data moves through a network by using the terms router, hub, switch, and packet.

– Students will explain the function of an IP address. 

– Students will understand the need to use antivirus software and run patches/updates in order to protect devices and networks. 

– Students will understand the necessity of backing up information on an external drive.

– Students will develop a basic understanding of the definitions of authentication and confidentiality. Confidentiality is the protection of information from unauthorized use or disclosure. Authentication is the ability to verify that a person or (entity) is who they say they are. 

– Students will display skills in password security and understand the need to keep information confidential both online and outside the digital realm.

– Being online requires a sense of responsibility. Students will be able to define ethics as the decision to do what’s right. Students will explain that cyberethics apply to the internet and use of devices.

– Students will begin to differentiate between ethical and unethical online behaviors. 

– Students will verbalize and understand the concept of intellectual property through completion of activities on piracy and basic copyright laws.

– Students will describe which information should remain private (address, birthdate, etc.) unless needed by emergency personnel. Students can identify and know to report harmful online behavior.

– Students will verbalize the safety standards of social media, online gaming/chats, and cell phones. Students will also verbalize the positive and negative uses of social media.

– Students will be able to describe social engineering tactics such as phishing and vishing in order to protect themselves and others. 

– Students will be able to identify potential careers in technology including cybersecurity.

– Students will understand that information specialists are responsible for protecting individual devices, networks, and all information that moves within.

Learning Outcomes by the end of Grade 8

– Students will be able to explain the difference between hardware and software and display basic troubleshooting.

– Students will develop a checklist for properly servicing personal hardware and software.

– Students will explain how the design of a computing system involves multiple considerations and trade-offs.

– Students will be able to describe the basic ideas of how a network operates and how data moves across the internet, including packet switching and protocols. Students can then associate the need for online safety behaviors due to the recognition of how data moves.

– Students will describe and apply basic principles of cybersecurity including the CIA triad and access control.

– Students will display knowledge of cryptography in both times of war and peace.

– Students will able to describe the need for ethics when interacting with computing devices.

– Students will begin to dissect difficult ethical scenarios in order to understand the complexity of cyberethics. 

– Students will be able to recognize and describe basic cyber threats in order to not be a victim.

– Students will practice the actions required for protecting online information and understand the steps to take if compromised. Students will be able to describe forms of PII and differentiate when PII can be shared versus when it should not.

– Students will practice safe behaviors in online gaming, cell phone usage, social media, forms, and web searches. Students will describe the impact of a positive digital footprint on future opportunities.

– Students will educate others on current social engineering tactics and ways to prevent being a victim.

– Students will complete activities on career awareness while being introduced to jobs in technology, including cybersecurity.

– Students will understand the concepts of human capital and opportunity costs while developing the skills for potential career paths.

Learning Outcomes by the end of Grade 12

– Students will understand the need to practice safe online behaviors in order to protect hardware and software on all devices.

– Students will have a basic understanding of software applications.

– Students will understand basic network topology, IP addresses, and how data moves through a network.

– Students will be able to recognize the threats that exist as data moves through a network.

– Students will describe and apply basic principles of cybersecurity including the CIA triad and access control.

– Students will complete a unit on cybersecurity in a computer science or technology course, if available. 

– Students will develop ethical awareness and understand the difficulties in applying ethical standards in a connected world in which countries retain sovereignty.

– Students will be able to describe basic cyber threats in order to not be a victim.

– Students will practice the actions required for protecting online information and understand the steps to take if compromised. Students will be able to describe forms of PII and differentiate when PII can be shared versus when it should not.

– Students will practice safe behaviors in online gaming, cell phone usage, social media, forms, and web searches. Students will describe the impact of a positive digital footprint on future opportunities.

– Students will understand current methods of social engineering and display awareness of prevention. 

 – Students will educate others on current social engineering tactics and ways to prevent being a victim.

– Students will complete activities on career awareness while being introduced to jobs in technology, including cybersecurity.

– If available, students will have opportunities to complete early college education courses in the field of cybersecurity.