{"id":1759,"date":"2017-06-15T14:45:39","date_gmt":"2017-06-15T14:45:39","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/?page_id=1759"},"modified":"2018-06-04T11:38:19","modified_gmt":"2018-06-04T10:38:19","slug":"benchmarks-third-level-technologies","status":"publish","type":"page","link":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/broad-general-education\/benchmarks-third-level-technologies\/","title":{"rendered":"Benchmarks \u2013 Third Level"},"content":{"rendered":"<h1>Benchmarks \u2013 Third Level<\/h1>\n<h2><b>Digital Literacy<\/b><\/h2>\n<h3><b>Using digital products and services in a variety of contexts to achieve a purposeful outcome<\/b><\/h3>\n<p><i>I can explore and use the features of a range of digital technologies, integrated software and online resources to determine the most appropriate to solve problems. TCH 3-01a<\/i><\/p>\n<ul>\n<li>Uses the most appropriate applications and software tools to capture, create and modify text, images, sound, and video to present and collaborate.<\/li>\n<li>Demonstrates an understanding of file handling for example, uploading, downloading, sharing and permission setting, for example within Glow or other platforms.<\/li>\n<\/ul>\n<h3><b>Searching, processing and managing information responsibly<\/b><\/h3>\n<p><i>Having used digital technologies to search, access and retrieve information I can justify my selection in terms of validity, reliability and have an awareness of plagiarism. TCH 3-02a<\/i><\/p>\n<ul>\n<li>Gathers and combines data and information from a range of sources to create a publication, presentation or information resource.<\/li>\n<li>Uses applications to analyse data and identify trends\/make predictions based on source data.<\/li>\n<li>Demonstrates efficient searching techniques for example using \u2018and\u2019, \u2018or\u2019, \u2019not\u2019<\/li>\n<\/ul>\n<h3><b>Cyber resilience and internet safety<\/b><\/h3>\n<p><i>I can keep myself safe and secure in online environments and I am aware of the importance and consequences of doing this for myself and others. TCH 3-03a<\/i><\/p>\n<ul>\n<li>Demonstrates an understanding of the legal implications and importance of protecting their own and others\u2019 privacy when communicating online.<\/li>\n<li>Evaluates online presence and identifies safe guards.<\/li>\n<li>Present relevant ideas and information to explain risks to safety and security of their personal devices and networks including encryption.<\/li>\n<li>Applies appropriate online safety features when becoming involved with online communities such as online gaming, chat rooms, forums and social media.<\/li>\n<li>Demonstrate an understanding of different cyber threats, for example, viruses, phishing, identity theft, extortion and sextortion.<\/li>\n<li>Demonstrates understanding of device security including personal and domestic devices.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>Technological Developments in Society and Business<\/b><\/h2>\n<h3><b>Awareness of technological developments (Past, Present and Future), including how they work.<\/b><\/h3>\n<p><i>I understand how scientific and technological developments have contributed to changes in everyday products. TCH 3-05a<\/i><\/p>\n<ul>\n<li>Discusses advantages and disadvantages of using technologies in our everyday life.<\/li>\n<\/ul>\n<h3><b>Impact, contribution, and relationship of technologies on business, the economy, politics, and the environment.<\/b><\/h3>\n<p><i>I can evaluate the implications for individuals and societies of the ethical issues arising from technological developments. TCH 3-06a<\/i><\/p>\n<ul>\n<li>Demonstrate an awareness of ethical issues around product development<\/li>\n<\/ul>\n<p><i>I can identify the costs and benefits of using technologies to reduce the impact of our activities on the environment and business. TCH 3-07a<\/i><\/p>\n<ul>\n<li>Demonstrates an understanding of the impact of technologies on the environment and business<\/li>\n<\/ul>\n<p><i>I can explore the impact, contribution and use of various software applications and emerging hardware in business. TCH 3-08a<\/i><\/p>\n<ul>\n<li>Searches, edits and manipulates text and numbers using appropriate hardware and software<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>Computing Science<\/b><\/h2>\n<h3><b>Understanding the world through computational thinking<\/b><\/h3>\n<p><i>I can describe different fundamental information processes and how they communicate and can identify their use in solving different problems TCH 3-13a<\/i><br \/>\n<i>I am developing my understanding of information and can use an information model to describe particular aspects of a real world system TCH 3-13b<\/i><\/p>\n<ul>\n<li>Recognises and describes information systems with communicating processes which occur in the world around me<\/li>\n<li>Explains the difference between parallel processes and those that communicate with each other<\/li>\n<li>Demonstrates an understanding of the basic principles of compression and encryption of information<\/li>\n<li>Identifies a set of characteristics describing a collection of related items that enable each item to be individually identified<\/li>\n<li>Identifies the use of common algorithms such as sorting and searching as part of larger processes.<\/li>\n<\/ul>\n<h3><b>Understanding and analysing computing technology<\/b><\/h3>\n<p><i>I understand language constructs for representing structured information TCH 3-14a<\/i><br \/>\n<i>I can describe the structure and operation of computing systems which have multiple software and hardware levels that interact with each other. TCH 3-14b<\/i><\/p>\n<ul>\n<li>Understands that the same information could be represented in more than one representational system<\/li>\n<li>Understands that different information could be represented in exactly the same representation<\/li>\n<li>Demonstrates an understanding of structured information in programs, databases or webpages<\/li>\n<li>Describes the effect of mark-up language on the appearance of a webpage, and understand that this may be different on different devices<\/li>\n<li>Demonstrates an understanding of the von Neumann architecture and how machine code instructions are stored and executed within a computer system<\/li>\n<li>Reads and explains code extracts including those with variables and data structures<\/li>\n<li>Demonstrate an understanding of how computers communicate and share information over networks including the concepts of sender, receiver, address and packets.<\/li>\n<li>Understands simple compression and encryption techniques used in computing technology<\/li>\n<\/ul>\n<h3><b>Designing, building and testing computing solutions<\/b><\/h3>\n<p><i>I can select appropriate development tools to design, build, evaluate and refine computing solutions based on requirements TCH 3-15a<\/i><\/p>\n<ul>\n<li>Designs and builds a program using a visual language combining constructs and using multiple variables.<\/li>\n<li>Represents and manipulates structured information in programs, or databases for example, works with a list data structure in a visual language, or a flat file database.<\/li>\n<li>Interprets a problem statement, and identifies processes and information to create a physical computing and\/or software solution.<\/li>\n<li>Can find and correct errors in program logic.<\/li>\n<li>Groups related instructions into named subprograms (in a visual language).<\/li>\n<li>Writes code in which there is communication between parallel processes (in a visual language).<\/li>\n<li>Writes code which receives and responds to real world inputs (in a visual language).<\/li>\n<li>Designs and builds web pages using appropriate mark-up languages.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Benchmarks \u2013 Third Level Digital Literacy Using digital products and services in a variety of contexts to achieve a purposeful outcome I can explore and use the features of a range of digital technologies, integrated software and online resources to determine the most appropriate to solve problems. TCH 3-01a Uses the most appropriate applications and &hellip;<\/p>\n","protected":false},"author":32,"featured_media":0,"parent":1477,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1759","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/comments?post=1759"}],"version-history":[{"count":3,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1759\/revisions"}],"predecessor-version":[{"id":2009,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1759\/revisions\/2009"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1477"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/media?parent=1759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}