[ { "id": "c05067ec-45f4-4b33-b0a6-5f9f267f2c26", "code": "126.1.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "3ca642c3-b9d4-4e52-8e6d-85a042d35fe5" }, { "id": "228fd3a9-6a09-4bf8-805c-c1439b4a2c90", "code": "126.1.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "f4060b83-ce33-45a1-ae24-1cfcad6413d8" }, { "id": "8c0fa888-789d-4ce2-924a-8d3a39a95330", "code": "126.1.c.2", "title": "Computational thinking--applications. The student, with guidance from an educator, applies the fundamentals of computer science. The student is expected to create a sequence of code with or without technology such as solving a maze using drag-and-drop programming or creating step-by-step directions for student movement to a specific location.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "5f02e724-b5cc-4fc7-a649-e24612443915" }, { "id": "0b564a9d-c662-4cee-bada-cb5114b27ba6", "code": "126.1.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "ac2ccbce-cf0b-4c0b-912b-1c296fcfaf96" }, { "id": "e238cfd2-97d6-446c-8b1c-bb49f424e761", "code": "126.1.c.4", "title": "Data literacy, management, and representation--collect data. The student defines data and explains how data can be found and collected. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "9fbcf9b7-6722-48e5-8cde-6297f7992db9" }, { "id": "f07441d4-d13f-4a06-b11a-0e81347099ea", "code": "126.1.c.5", "title": "Digital citizenship--social interactions. The student identifies appropriate ways to communicate in various digital environments. The student is expected to identify and demonstrate responsible behavior within a digital environment.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "119bd617-4483-4cb4-b913-124e97ec386f" }, { "id": "6942d3ea-37d3-4f36-b994-fe3a766ebc69", "code": "126.1.c.6", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "13a34e97-ae6e-4e1f-8036-4dac63488a9f" }, { "id": "a0950e89-cb14-4c5d-982d-548e99aa7bfe", "code": "126.1.c.7", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "4936d031-6712-49ce-9ea8-26cad3061012" }, { "id": "7dc7da89-9f42-4af1-bb8d-486581a67514", "code": "126.1.c.8", "title": "Practical technology concepts--skills and tools. The student demonstrates knowledge and appropriate use of technology systems, concepts, and operations. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "52559f32-f08d-4258-919e-908d35d3373b" }, { "id": "6347e9af-e3c7-483b-a307-9fa6810e64ed", "code": "126.2.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "ca977e15-161a-4fc9-bdc0-bcb18fbbd618" }, { "id": "2282a63c-fa9c-4832-ace1-e85ace113cc1", "code": "126.2.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "362a9e24-93ed-448f-a9d7-ffe80c9f3f66" }, { "id": "f002dd26-2e82-42b1-b7e3-573006e42ebc", "code": "126.2.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "a3418ecc-fa24-44ca-980d-428dd2a044db" }, { "id": "9b71ca55-8f19-43da-a3bc-80e7bb37eda0", "code": "126.2.c.4", "title": "Creativity and innovation--emerging technologies. The student understands that technology is dynamic and impacts different communities. The student is expected to identify examples of how technology has impacted different communities.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "51f9577e-f767-4877-b3bc-d71d1507b66b" }, { "id": "8b60d076-bdfb-4919-a08f-1c52e04bfb42", "code": "126.2.c.5", "title": "Data literacy, management, and representation--collect data. The student defines data and explains how data can be found and collected. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "b2300ca1-7a55-49b4-b116-bc984abb3c89" }, { "id": "fa2d16c5-3450-4c08-b106-805e1bcc1aa9", "code": "126.2.c.6", "title": "Digital citizenship--social interactions. The student identifies appropriate ways to communicate in various digital environments. The student is expected to describe and demonstrate respectful behavior within a digital environment.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "7a588cf3-37eb-4948-a5c8-5d159ecd9000" }, { "id": "66ff5d28-90ee-4ff6-9f9a-20eff9f7528d", "code": "126.2.c.7", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "07424bd0-6cfc-4419-8f3a-8af6d7a6902a" }, { "id": "7be10d7f-4a45-421d-8a87-8c2632897ef2", "code": "126.2.c.8", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "728e03d5-1a27-460b-9357-1fefa61bbd42" }, { "id": "130afa4e-3e57-4516-a9bd-b607da68c251", "code": "126.2.c.9", "title": "Practical technology concepts--skills and tools. The student demonstrates knowledge and appropriate use of technology systems, concepts, and operations. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "fbe94a37-b2bd-40ee-89f5-40599b1fccaa" }, { "id": "867c1473-7776-4039-8fca-6af1aaece86e", "code": "126.3.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "ebbf6756-cc6a-4163-8fc4-c4c0ae6c1a6a" }, { "id": "299e41a5-b052-455c-826b-1fa2cbcde3c0", "code": "126.3.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "0723ed18-bf81-48e7-9c3d-f4843971c8a9" }, { "id": "046bb883-201e-4074-a89f-843566b45384", "code": "126.3.c.2", "title": "Computational thinking--applications. The student, with guidance from an educator, applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "d20168fd-924b-4f87-b568-176a68fef24c" }, { "id": "5494541f-03b3-475f-bf24-ccfe121a0fe1", "code": "126.3.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "8b70c9f2-e3a3-4125-9b80-446dbe18a4fb" }, { "id": "2630cd36-55af-4887-9533-8c9ee527b26a", "code": "126.3.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to identify and analyze how technology impacts different communities.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "f0c1edd7-59fa-422a-b5b3-28786fc840bc" }, { "id": "746b42b3-5df4-4073-af27-791d79e4156c", "code": "126.3.c.5", "title": "Data literacy, management, and representation--collect data. The student defines data and explains how data can be found and collected. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "31e3385c-dad6-4c44-b86e-d9771bf0449c" }, { "id": "8b142d64-5673-44b0-9050-f97a132603ed", "code": "126.c.6", "title": "Data literacy, management, and representation--communicate and publish results. The student communicates data through the use of digital tools. The student is expected to use a digital tool to individually or collaboratively create and communicate data visualizations such as pictographs and bar graphs.", "description": null, "subject_area": "Technology Applications", "grade_level": "Unknown", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "911a07ed-20f8-4013-90af-69b859c2617f" }, { "id": "419346ef-8e70-4d68-a3c2-3f0ff26c9248", "code": "126.3.c.7", "title": "Digital citizenship--social interactions. The student identifies appropriate ways to communicate in various digital environments. The student is expected to participate in digital environments to develop responsible and respectful interactions.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "f0e5fa7d-b521-4972-a6cf-52fe5c27ed00" }, { "id": "c2a1ffa8-d1a2-44a5-95f6-64f82979c928", "code": "126.3.c.8", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "a2fd5500-983a-4d44-af5f-c370caebf374" }, { "id": "fa6ad113-5b3c-4fd6-827a-5e9d1515973d", "code": "126.3.c.9", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "0e9d35c5-e28b-48fb-83f0-727917bf8e0b" }, { "id": "d842e01f-493a-40e1-bd3e-cd7c52c06604", "code": "126.3.c.10", "title": "Practical technology concepts\u2014skills and tools. The student demonstrates knowledge and appropriate use of technology systems, concepts, and operations. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "fba02705-d629-4e7b-84a9-9944891eef1d" }, { "id": "ad26f6de-fb73-414c-91b8-f85e14769081", "code": "126.3.c.1.C", "title": "analyze a plan with adult assistance that outlines the steps needed to complete a task; and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "cf8c8bf6-6ff5-4ade-acd7-67d1d2e934f1" }, { "id": "5d94be21-b6ba-42e0-8411-aa1bece88aa1", "code": "126.8.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "f1a9585d-3d96-4469-a685-2bab1ddefc8c" }, { "id": "bf82ac12-fcb4-4c69-83f0-18e4aaa7f855", "code": "126.8.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "45ecf92f-cfc5-4ddb-80ce-fdcc57792e9d" }, { "id": "7c8faea5-5c90-4a12-a18f-7003286fc8c3", "code": "126.8.c.2", "title": "Computational thinking--applications. The student applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "d9560dd2-459a-4e5f-8726-dbb3467d6f1b" }, { "id": "c470d0dd-4c9b-4748-a226-00bdaf920c43", "code": "126.8.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "d9521865-c784-4069-a156-0377646235a7" }, { "id": "a4c497c0-7c6b-4478-9dc2-fba698df3625", "code": "126.8.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to define emerging technologies.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "ad25f89c-fe69-42e3-8518-fce5c2f0cdb7" }, { "id": "dd1b3b76-2727-4770-8da5-69a04754e952", "code": "126.8.c.5", "title": "Data literacy, management, and representation--collect data. The student uses digital strategies to collect and identify data. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "9a69e0d0-b01c-4957-9c38-e3f6086427df" }, { "id": "be512811-e8da-4462-a840-73967cfc25ec", "code": "126.8.c.6", "title": "Data literacy, management, and representation--organize, manage, and analyze data. The student uses data to answer questions. The student is expected to analyze data in graphs to identify and discuss trends and inferences.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "a54acd57-0a2b-4a20-9a75-215a602f51e8" }, { "id": "5c0b5e56-058c-42f7-8284-0df97f2e8482", "code": "126.8.c.7", "title": "Data literacy, management, and representation--communicate and publish results. The student communicates data through the use of digital tools to inform an audience. The student is expected to use digital tools to communicate and publish results to inform an intended audience.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "c11699bf-f8c7-4ae0-8e74-00270474ac1c" }, { "id": "a4319c79-0198-4c48-9126-59d22330889f", "code": "126.8.c.8", "title": "Digital citizenship--social interactions. The student understands different styles of digital communication and that a student's actions online can have a long-term impact. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "f6b1a690-fcfc-40e6-964e-7504823c1803" }, { "id": "9d9cf268-0691-448c-9e8a-ad547bf27a9e", "code": "126.8.c.9", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "8259896f-f412-46e5-b3b6-8ca32bc52f80" }, { "id": "260e059f-cbe4-4bb9-b589-f9c576c1a0ca", "code": "126.8.c.10", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "e273ee6e-054d-41cc-9826-ac5106999693" }, { "id": "012e18d1-2f77-492f-b055-82cd665b2245", "code": "126.8.c.11", "title": "Practical technology concepts--processes. The student engages with technology systems, concepts, and operations. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 12, "teks_uuid": "1bc403f2-86d9-4f04-b473-30747033b3e2" }, { "id": "d9fd52ee-fe6e-495a-8f70-e673f9f4bbae", "code": "126.8.c.12", "title": "Practical technology concepts--skills and tools. The student selects appropriate methods or techniques for an assigned task and identifies and solves simple hardware and software problems using common troubleshooting strategies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 13, "teks_uuid": "146ec6f5-089a-4e9f-9884-1179b5d4bd5c" }, { "id": "b1895932-ccce-4fed-81d7-55e1c6f3a433", "code": "126.9.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "24ebcf8d-46b1-4495-a585-26b3997508c3" }, { "id": "2185e29c-f4e2-493d-8139-7701e3fe67cb", "code": "126.9.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "0a37bf28-b3e5-49c1-be66-5f6022d7a776" }, { "id": "ba666535-009a-4c27-bdc5-4c9e26a5bb52", "code": "126.9.c.2", "title": "Computational thinking--applications. The student applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "c7cac0d2-3e29-4f64-90e5-bb13d33c2cf5" }, { "id": "7fb71abe-e976-4702-a18e-53532842301a", "code": "126.9.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "7300f518-71b1-47f6-8cc0-83e69845dcae" }, { "id": "bcd9db83-3eac-4ea3-99b2-2d04b2e2dde1", "code": "126.9.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to identify examples of emerging technologies.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "bd998efb-a13a-4ae4-9dbb-5613029b59bf" }, { "id": "ac70a735-130f-428b-8a4e-50f47509efa8", "code": "126.9.c.5", "title": "Data literacy, management, and representation--collect data. The student uses digital strategies to collect and identify data. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "0e967511-d7e0-4b68-8480-49d7c2dc9fb5" }, { "id": "abd58df5-fd8b-48e2-87f1-63fd92170034", "code": "126.9.c.6", "title": "Data literacy, management, and representation--organize, manage, and analyze data. The student uses data to answer questions. The student is expected to use digital tools to transform and make inferences about data to answer a question.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "dfbee0ff-0d59-495f-ac1c-e5c1dfb0fd93" }, { "id": "0011665a-9681-4e18-8d5b-b835c3e2d1c0", "code": "126.9.c.7", "title": "Data literacy, management, and representation--communicate and publish results. The student communicates data through the use of digital tools to inform an audience. The student is expected to use digital tools to communicate results of an inquiry to inform an intended audience.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "cb2b3b95-eb8e-4ab8-b200-735730891ad7" }, { "id": "3e139265-17e8-4945-92e0-76b84a406411", "code": "126.9.c.8", "title": "Digital citizenship--social interactions. The student understands different styles of digital communication and that a student's actions online can have a long-term impact. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "0d409e9c-bba1-49d5-9d2e-b623ca0af7e0" }, { "id": "5d42b167-e68c-4b3c-a0e7-c13c52bd1d3f", "code": "126.9.c.9", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "b94a289d-0966-4d13-b789-f407dc12a7d4" }, { "id": "4d1a364d-65dc-48ed-890b-b0221b65a7b1", "code": "126.9.c.10", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "14d5988b-cebd-475c-9434-b1eb9ecadae0" }, { "id": "1d6d1717-3d71-4506-bdc1-8ff5540371fa", "code": "126.9.c.11", "title": "Practical technology concepts--processes. The student engages with technology systems, concepts, and operations. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 12, "teks_uuid": "07acc2bd-51e2-4088-81ac-956328707a91" }, { "id": "163b1d2c-6b9a-4ce1-bacb-6127d91604a5", "code": "126.9.c.12", "title": "Practical technology concepts--skills and tools. The student selects appropriate methods or techniques for an assigned task and identifies and solves simple hardware and software problems using common troubleshooting strategies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 13, "teks_uuid": "9fa256ef-b601-4e92-815c-16dc4ab02936" }, { "id": "4052caec-8a78-4efd-a333-2b43d86e1438", "code": "126.9.c.9.C", "title": "create citations for digital forms of media with assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 14, "teks_uuid": "1a00df4c-f98c-4a47-9c7f-4b0aea94a473" }, { "id": "e92afa1c-785e-4ebe-ab19-b42e74e12eaa", "code": "126.10.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "1022f161-ecdb-4dc5-b2c2-4852fd56c91a" }, { "id": "2fdda048-6537-4dad-b9b8-0ccf42cd9dc8", "code": "126.10.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "f9fceaa7-dc69-4bf8-be85-577b6c7e9c77" }, { "id": "006467a4-cee3-4a2c-95e7-75bd3050b8f4", "code": "126.10.c.2", "title": "Computational thinking--applications. The student applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "2d98d521-3ecf-47dd-87d0-41d2764af484" }, { "id": "0ed3f4d4-1499-49f2-adac-67252b031075", "code": "126.10.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "a8df7ae5-7b4f-43a3-8009-948171e99cfc" }, { "id": "12d86698-da43-4db7-97a6-53cd1bad17b0", "code": "126.10.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to predict how emerging technologies may impact different communities.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "034c00a3-507c-4722-b45e-0e1a150c2064" }, { "id": "b32046ad-16a5-47b3-bb9a-eca5d7566af4", "code": "126.10.c.5", "title": "Data literacy, management, and representation--collect data. The student uses digital strategies to collect and identify data. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "e7a8e8d6-b171-4675-86e6-62a9f0091000" }, { "id": "b0f0b89f-058a-4860-a134-b8dc6a832610", "code": "126.10.c.6", "title": "Data literacy, management, and representation--organize, manage, and analyze data. The student uses data to answer questions. The student is expected to use digital tools to analyze and transform data and make inferences to answer questions.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "9cecb3aa-6b14-4ffc-ae19-a8485494ea4d" }, { "id": "c1da6a23-9300-4ca4-86be-753be9f73787", "code": "126.10.c.7", "title": "Data literacy, management, and representation--communicate and publish results. The student communicates data through the use of digital tools to inform an audience. The student is expected to use digital tools to communicate and display data using appropriate visualization to inform an intended audience.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "29d389ea-d0ef-411c-9add-588b401642d3" }, { "id": "1bf458dd-5c07-4a54-9d71-2c6f6b31e12b", "code": "126.10.c.8", "title": "Digital citizenship--social interactions. The student understands different styles of digital communication and that a student's actions online can have a long-term impact. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "fd19332d-ebe4-4b13-a472-415810dfda1f" }, { "id": "408d760b-f2bc-4bb3-9021-113e9b23e730", "code": "126.10.c.9", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "70baffe4-a1a3-4522-a076-07d48a9272c0" }, { "id": "cfe4e537-c66d-4509-b162-c1d14a5511b4", "code": "126.10.c.10", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "595ad6da-213b-4a9f-9ee3-4c6097346aa7" }, { "id": "432d3b0c-d18b-4c05-8df7-9980543f55d7", "code": "126.10.c.11", "title": "Practical technology concepts--processes. The student engages with technology systems, concepts, and operations. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 12, "teks_uuid": "c638be6c-3a6f-42f2-a396-8dc26ed75dc0" }, { "id": "af54fdcc-3320-4863-a333-c745d6b55c01", "code": "126.10.c.12", "title": "Practical technology concepts--skills and tools. The student selects appropriate methods or techniques for an assigned task and identifies and solves simple hardware and software problems using common troubleshooting strategies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 13, "teks_uuid": "237781ae-44a0-422c-9926-aab1600dba1f" }, { "id": "5947178b-89dd-4fde-ac30-5bfba9fb9a5c", "code": "126.17.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "f68f6af1-51eb-4dcf-a04a-bab97d85ef44" }, { "id": "c45deb76-448e-4636-b287-802c4119c782", "code": "126.17.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "158814a5-b9d6-4eec-ab65-e3258dab72c8" }, { "id": "5bd16bcb-3354-40f4-b8c7-6775d09cc49d", "code": "126.17.c.2", "title": "Computational thinking--applications. The student applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "ee208714-7bad-42ec-a345-31e376ab7c16" }, { "id": "9548efb0-70c7-4a8f-a350-246ee95e21df", "code": "126.17.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process and creative thinking to develop and evaluate solutions, considering a variety of local and global perspectives. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "52fce68a-1925-45de-8a1c-71943e822b95" }, { "id": "26ee5492-9930-42f2-9c52-a565abdcc4cf", "code": "126.17.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates a thorough understanding of the role of technology throughout history and its impact on societies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "4e399e80-4ccd-4f6f-9723-fcc2edacc289" }, { "id": "dd1e60d9-9eee-45c0-ba17-a31fde268180", "code": "126.17.c.5", "title": "Data literacy, management, and representation--collect data. The student uses advanced digital strategies to collect and represent data. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "eeff15b8-6129-44a9-ba4a-a760e5da9fd8" }, { "id": "096eace4-87ef-4162-9930-2bfe1c2d86fd", "code": "126.17.c.6", "title": "Data literacy, management, and representation--organize, manage, and analyze data. The student uses digital tools to transform data, make inferences, and predictions. The student is expected to use digital tools to transform data in order to identify and discuss trends and make inferences.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "62b249eb-9d0d-4e0e-b221-a921082003c5" }, { "id": "07e4814d-a6c4-4888-84d1-07404d74d0b3", "code": "126.17.c.7", "title": "Data literacy, management, and representation--communicate and publish results. The student creates digital products to communicate data to an audience for an intended purpose. The student is expected to use digital tools to communicate and display data from a product or process to inform an intended audience.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "318507c0-daa9-4696-93ec-fcbb43ed530c" }, { "id": "dd974aed-e1b4-46e8-9457-311e20149516", "code": "126.17.c.8", "title": "Digital citizenship--social interactions. The student understands different styles of digital communication and that a student's actions online can have a long-term impact. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "a83430ee-860f-4f8a-a606-f67e08d08ef7" }, { "id": "9a3489b2-571a-4f1d-ab3d-577b5d284257", "code": "126.17.c.9", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "1abfe64c-254f-48a0-a59e-7e4371c58d5f" }, { "id": "f4b3e854-cbce-4784-90fc-7fc5186bb20f", "code": "126.17.c.10", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "94ebdc5b-0523-496d-8eb3-d88c9712ca9a" }, { "id": "a9456d63-6c6b-46c2-9e4c-856fb8e24ad6", "code": "126.17.c.11", "title": "Practical technology concepts--processes. The student evaluates and selects appropriate methods or techniques for an independent project and identifies and solves common hardware and software problems using troubleshooting strategies. The student is expected to create and design files in various formats such as text, graphics, video, and audio files.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 12, "teks_uuid": "f3932529-43a8-4381-ae5f-4e8d82f07009" }, { "id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "code": "126.17.c.12", "title": "Practical technology concepts--skills and tools. The student leverages technology systems, concepts, and operations to produce digital artifacts. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 13, "teks_uuid": "8d2b8b5f-8240-4012-bfaa-cfc907515333" }, { "id": "1e36acc1-d54f-4322-9db5-a2df652ff509", "code": "126.18.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "acc34407-7b9e-4155-806f-975b6f3c4f79" }, { "id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "code": "126.18.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "1d3cff21-b712-4626-8ae6-7f50d2332058" }, { "id": "f0b03852-399c-4c71-aa2b-4b8c795245c4", "code": "126.18.c.2", "title": "Computational thinking--applications. The student applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "ecba2ea0-f951-4c6c-aad2-2351f6338262" }, { "id": "64d6b1c5-56ad-47d8-924e-0399f23c6737", "code": "126.18.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process and creative thinking to develop and evaluate solutions, considering a variety of local and global perspectives. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "1a5ab24f-92b0-47e4-b01e-c739769b94c5" }, { "id": "9a881f20-a0d1-4820-a758-6dc354fbbe45", "code": "126.18.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates a thorough understanding of the role of technology throughout history and its impact on societies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "5714db95-71bb-46b8-b2af-080f2b3c42e9" }, { "id": "da1f2a9a-e220-421d-b1b5-68a5c7f63e0e", "code": "126.18.c.5", "title": "Data literacy, management, and representation--collect data. The student uses advanced digital strategies to collect and represent data. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "e87bfa2e-f1ea-4124-afd7-12610bedb23b" }, { "id": "98e636c5-89ec-44b6-950f-6aa5e571d171", "code": "126.18.c.6", "title": "Data literacy, management, and representation--organize, manage, and analyze data. The student uses digital tools to transform data, make inferences, and predictions. The student is expected to use digital tools in order to transform data to analyze trends and make inferences and predictions.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "53b8328c-2f66-46d0-b032-0cbefb9692fd" }, { "id": "8a9e27de-e2dd-4218-8275-811f0fbb8023", "code": "126.18.c.7", "title": "Data literacy, management, and representation--communicate and publish results. The student creates digital products to communicate data to an audience for an intended purpose. The student is expected to use digital tools to communicate and display data from a product or process to inform or persuade an intended audience.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "2cb789a2-e7df-459c-af69-ba5704d68c0d" }, { "id": "f638d452-0a10-41fc-9779-f5a13ff0bd21", "code": "126.18.c.8", "title": "Digital citizenship--social interactions. The student understands different styles of digital communication and that a student's actions online can have a long-term impact. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "a6a3e543-5e44-4dbf-84d5-62e97a39027e" }, { "id": "c4e4ddae-0e9e-47b9-9665-2bfc796d8530", "code": "126.18.c.9", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "b28186a2-d0a5-4e82-aef4-76e5dd664be8" }, { "id": "e79fc345-e29e-4b22-bffe-ad42d7c26d76", "code": "126.18.c.10", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "0a61f64b-638b-4e68-9728-61e7c8a192b4" }, { "id": "23263bbf-e180-4d8f-bb3c-2f93d862f63c", "code": "126.18.c.11", "title": "Practical technology concepts--processes. The student evaluates and selects appropriate methods or techniques for an independent project and identifies and solves common hardware and software problems using troubleshooting strategies. The student is expected to choose a variety of digital tools to create, share, and communicate digital artifacts.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 12, "teks_uuid": "a1f55a51-a639-4464-9038-a80a6e6f284b" }, { "id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "code": "126.18.c.12", "title": "Practical technology concepts--skills and tools. The student leverages technology systems, concepts, and operations to produce digital artifacts. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 13, "teks_uuid": "3752b47a-fe7f-4d11-8f79-9cb0573f3892" }, { "id": "cb6bcb37-aef7-4ab7-9584-a03cbfada4ac", "code": "126.19.c", "title": "Knowledge and skills.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 1, "teks_uuid": "77f07212-324b-4b5d-84ea-921253cf8d56" }, { "id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "code": "126.19.c.1", "title": "Computational thinking--foundations. The student explores the core concepts of computational thinking, a set of problem-solving processes that involve decomposition, pattern recognition, abstraction, and algorithms. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "1ec41c71-f7ce-4642-ae24-f3bc11ea9c24" }, { "id": "7ecef2f1-62f0-4bd0-a482-a9c9b01e1692", "code": "126.19.c.2", "title": "Computational thinking--applications. The student applies the fundamentals of computer science. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 3, "teks_uuid": "9fb8a852-c13a-4fb6-9deb-8078fa17de41" }, { "id": "166b8434-7995-4c76-a51f-7c0445757eed", "code": "126.19.c.3", "title": "Creativity and innovation--innovative design process. The student takes an active role in learning by using a design process and creative thinking to develop and evaluate solutions, considering a variety of local and global perspectives. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 4, "teks_uuid": "ffe063f3-f459-4d4d-b786-e0a725cd9849" }, { "id": "4d059e94-06cb-43ed-9945-42eacc25092c", "code": "126.19.c.4", "title": "Creativity and innovation--emerging technologies. The student demonstrates a thorough understanding of the role of technology throughout history and its impact on societies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 5, "teks_uuid": "22f3022d-f45d-4736-92ac-c074740c74b8" }, { "id": "bc8bdaa3-7d30-489b-bdb9-47c3af7ce17c", "code": "126.19.c.5", "title": "Data literacy, management, and representation--collect data. The student uses advanced digital strategies to collect and represent data. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 6, "teks_uuid": "fb4f14ef-2a81-49c5-aa4b-450e98aef68c" }, { "id": "66c52185-e74e-4678-94b3-21372094da7b", "code": "126.19.c.6", "title": "Data literacy, management, and representation--organize, manage, and analyze data. The student uses digital tools to transform data, make inferences, and predictions. The student is expected to use digital tools in order to transform data, analyze trends, and predict possibilities and develop steps for the creation of an innovative process or product.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 7, "teks_uuid": "ff45c7ae-0ae4-42da-ae7c-b6c564305430" }, { "id": "57f5310c-bf13-4f75-853c-440b3bb38efd", "code": "126.19.c.8", "title": "Digital citizenship--social interactions. The student understands different styles of digital communication and that a student's actions online can have a long-term impact. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 8, "teks_uuid": "c03dad01-3165-430b-b0ec-0a9c3c5afe68" }, { "id": "b2724131-a440-4570-908e-922832207e77", "code": "126.19.c.9", "title": "Digital citizenship--ethics and laws. The student recognizes and practices responsible, legal, and ethical behavior while using digital tools and resources. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 9, "teks_uuid": "cf7cd2fa-56a1-407f-8067-edeace710588" }, { "id": "c35757bb-b41e-4e31-a6fe-06b494a9534a", "code": "126.19.c.10", "title": "Digital citizenship--privacy, safety, and security. The student practices safe, legal, and ethical digital behaviors to become a socially responsible digital citizen. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 10, "teks_uuid": "3f7df881-5005-4801-82ae-505013ef6efc" }, { "id": "088b089f-d432-4831-aca2-57e2051fbbee", "code": "126.19.c.11", "title": "Practical technology concepts--processes. The student evaluates and selects appropriate methods or techniques for an independent project and identifies and solves common hardware and software problems using troubleshooting strategies. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 11, "teks_uuid": "c5e697ac-2901-47b6-bf54-4a7562f9503a" }, { "id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "code": "126.19.c.12", "title": "Practical technology concepts--skills and tools. The student leverages technology systems, concepts, and operations to produce digital artifacts. The student is expected to:", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 12, "teks_uuid": "1810848b-6433-4782-8360-34a4c7b93874" }, { "id": "3d4826e2-f4b1-4587-97dd-fea2b004a717", "code": "126.1.c.1.A", "title": "identify a problem or task such as making a sandwich and break it down (decompose) into smaller pieces;", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "228fd3a9-6a09-4bf8-805c-c1439b4a2c90", "source": "texas_teks", "sort_order": 10, "teks_uuid": "6b3fee50-5bfb-4c22-9cf2-23d2386effea" }, { "id": "2d8fb582-df4a-4e8f-b62f-0015ed92fb96", "code": "126.1.c.1.B", "title": "identify simple patterns and make predictions based on the patterns; and", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "228fd3a9-6a09-4bf8-805c-c1439b4a2c90", "source": "texas_teks", "sort_order": 11, "teks_uuid": "e181adc2-685a-4ed8-a619-41b82d91bb1f" }, { "id": "97bb7f1d-93b7-4c2b-804c-d9c63a1eb11d", "code": "126.1.c.1.C", "title": "identify algorithms (step-by-step instructions) using a sequential process such as first, next, then, and last.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "228fd3a9-6a09-4bf8-805c-c1439b4a2c90", "source": "texas_teks", "sort_order": 12, "teks_uuid": "19ccba2b-5608-4f8c-b585-958960da5685" }, { "id": "231cf5ce-eade-4b89-9410-b315af05ccbc", "code": "126.1.c.3.A", "title": "practice personal skills, including following directions, needed to successfully implement design processes; and", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "0b564a9d-c662-4cee-bada-cb5114b27ba6", "source": "texas_teks", "sort_order": 13, "teks_uuid": "feaa9bfc-d65a-4364-afc1-3d1368c69679" }, { "id": "745ed42b-7809-4963-9e5d-52b76f59b2cb", "code": "126.1.c.3.B", "title": "use a design process with components such as asking questions, brainstorming, or storyboarding to identify and solve authentic problems with adult assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "0b564a9d-c662-4cee-bada-cb5114b27ba6", "source": "texas_teks", "sort_order": 14, "teks_uuid": "794acf59-e874-49e5-9dda-c53fbbc2f6b8" }, { "id": "bd32d9f1-3616-4197-9133-55d1be3f479d", "code": "126.1.c.4.A", "title": "communicate an understanding that data is information collected about people, events, or objects such as computer searches and weather patterns; and", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "e238cfd2-97d6-446c-8b1c-bb49f424e761", "source": "texas_teks", "sort_order": 15, "teks_uuid": "72ba56d1-96a7-4470-8b8b-fa8fdde78d60" }, { "id": "7dcaa577-6390-41cc-b9c7-c0880e90fa8f", "code": "126.1.c.4.B", "title": "communicate with adult assistance the idea that digital devices can search for and retrieve information.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "e238cfd2-97d6-446c-8b1c-bb49f424e761", "source": "texas_teks", "sort_order": 16, "teks_uuid": "d9480990-d7e4-4f2f-b19b-0ae8494f1dfc" }, { "id": "427d685b-b711-4cea-8b33-a9d53ff81af9", "code": "126.1.c.6.A", "title": "demonstrate acceptable use of digital resources and devices as outlined in local policies or acceptable use policy (AUP); and", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "6942d3ea-37d3-4f36-b994-fe3a766ebc69", "source": "texas_teks", "sort_order": 17, "teks_uuid": "69556dc5-af31-46ad-afb2-43e7fa25ad51" }, { "id": "d3de2e8b-cb5a-4487-a459-6910a13dfb1c", "code": "126.1.c.6.B", "title": "communicate an understanding that all digital content has owners.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "6942d3ea-37d3-4f36-b994-fe3a766ebc69", "source": "texas_teks", "sort_order": 18, "teks_uuid": "990f8f20-0c03-4483-a2b5-b97377951639" }, { "id": "c35a3bba-4be8-4b65-b96a-9ccbf8f8a6db", "code": "126.1.c.7.A", "title": "identify ways to keep a user account safe, including not sharing login information and logging off accounts and devices; and", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "a0950e89-cb14-4c5d-982d-548e99aa7bfe", "source": "texas_teks", "sort_order": 19, "teks_uuid": "64fd6a2a-1e82-4614-b81e-44f2423169e0" }, { "id": "0bd8567b-0fdb-4ad0-b9b2-5d6dd2175b61", "code": "126.1.c.7.B", "title": "identify and discuss what information is safe to share online such as hobbies and likes and dislikes and what information is unsafe such as identifying information.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "a0950e89-cb14-4c5d-982d-548e99aa7bfe", "source": "texas_teks", "sort_order": 20, "teks_uuid": "8f97d68e-6208-4738-9dd4-a45338a23fac" }, { "id": "5d796ca9-24b9-40fb-8454-a089952ca26c", "code": "126.1.c.8.A", "title": "use a variety of applications, devices, and online learning environments to engage with content; ", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "7dc7da89-9f42-4af1-bb8d-486581a67514", "source": "texas_teks", "sort_order": 21, "teks_uuid": "75ab8d30-d086-47d5-9795-9f0cb9dc4dbc" }, { "id": "f2aa33c6-31d0-4dc8-a145-745517507ef2", "code": "126.1.c.8.B", "title": "identify basic computer hardware, including a variety of input and output devices, and software using accurate terminology;", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "7dc7da89-9f42-4af1-bb8d-486581a67514", "source": "texas_teks", "sort_order": 22, "teks_uuid": "35c2072e-f316-45a4-a3b3-95d195aeb6f7" }, { "id": "2cf8d4da-0d89-4b6d-a100-2774c31cb935", "code": "126.1.c.8.C", "title": "perform software application functions such as opening an application and modifying, printing, and saving digital artifacts using a variety of developmentally appropriate digital tools and resources;", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "7dc7da89-9f42-4af1-bb8d-486581a67514", "source": "texas_teks", "sort_order": 23, "teks_uuid": "0e41303e-65c7-422b-9f64-50b9ffcea0aa" }, { "id": "740ab75d-c3f5-417f-b91b-d0eed0338a18", "code": "126.1.c.8.D", "title": "practice ergonomically correct keyboarding techniques and developmentally appropriate hand and body positions; and", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "7dc7da89-9f42-4af1-bb8d-486581a67514", "source": "texas_teks", "sort_order": 24, "teks_uuid": "3579068e-3761-4032-b69e-3e3cdc7cbc8d" }, { "id": "ba80ace1-4b15-45e1-b222-07e0734571e6", "code": "126.1.c.8.E", "title": "identify, locate, and practice using keys on the keyboard, including letters, numbers, and special keys such as space bar and backspace.", "description": null, "subject_area": "Technology Applications", "grade_level": "K", "domain": null, "cluster": null, "parent_id": "7dc7da89-9f42-4af1-bb8d-486581a67514", "source": "texas_teks", "sort_order": 25, "teks_uuid": "64abad53-82b7-45e0-86e3-a1c9fe5597e9" }, { "id": "4c6db452-836a-40cb-bf52-9cca3d41f434", "code": "126.2.c.C", "title": "Computational thinking--applications. The student, with guidance from an educator, applies the fundamentals of computer science. The student is expected to create a sequence of code that solves a simple problem with or without technology.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "6347e9af-e3c7-483b-a307-9fa6810e64ed", "source": "texas_teks", "sort_order": 10, "teks_uuid": "724dcc16-dfdc-4da3-a1b1-8ed9a098e432" }, { "id": "15b9d7e8-5f86-47e9-a224-7c67c5f8b69a", "code": "126.2.c.1.A", "title": "identify and discuss a problem or task and break down (decompose) the solution into sequential steps;", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "2282a63c-fa9c-4832-ace1-e85ace113cc1", "source": "texas_teks", "sort_order": 11, "teks_uuid": "2a4fa6a1-2226-43f0-b0bb-aff1144fea10" }, { "id": "a94bc2c0-a370-48f8-9662-656a43c13e95", "code": "126.2.c.1.B", "title": "identify the simple patterns found in the solutions to everyday problems or tasks; and", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "2282a63c-fa9c-4832-ace1-e85ace113cc1", "source": "texas_teks", "sort_order": 12, "teks_uuid": "03ab52ab-77ff-4e76-9f2c-2a16f8b120cb" }, { "id": "897698d0-416e-4cc8-b6eb-599dbca18c0e", "code": "126.2.c.1.C", "title": "create a simple algorithm (step-by-step instructions) for an everyday task.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "2282a63c-fa9c-4832-ace1-e85ace113cc1", "source": "texas_teks", "sort_order": 13, "teks_uuid": "29bb42ba-78c2-4b09-983a-1b340924d106" }, { "id": "a8d8c0b5-ec14-45ab-b9d7-6417c9d95e30", "code": "126.2.c.3.A", "title": "practice personal skills and behaviors, including following directions and mental agility, needed to implement a design process successfully; and", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "f002dd26-2e82-42b1-b7e3-573006e42ebc", "source": "texas_teks", "sort_order": 14, "teks_uuid": "a31a932a-68c9-4ff7-a706-4a1901b02d70" }, { "id": "b42bd7f4-7938-4dc6-9ac0-3fa2cbbb600a", "code": "126.2.c.3.B", "title": "use a design process with components such as asking questions, brainstorming, or storyboarding to identify and solve authentic problems with adult assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "f002dd26-2e82-42b1-b7e3-573006e42ebc", "source": "texas_teks", "sort_order": 15, "teks_uuid": "aada986f-3acd-4fb2-8c39-018b56ef563c" }, { "id": "44517de6-6fa9-422c-9e1a-ab99a3831021", "code": "126.2.c.5.A", "title": "explore and collect many types of data such as preferences or daily routines of people, events, or objects; and", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "8b60d076-bdfb-4919-a08f-1c52e04bfb42", "source": "texas_teks", "sort_order": 16, "teks_uuid": "f12fd607-82dd-422c-a7d1-cb2e4f8d5466" }, { "id": "984c41b1-76a6-4149-bbed-ac5ec3f2d3db", "code": "126.2.c.5.B", "title": "conduct a basic search using provided keywords and digital sources with adult assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "8b60d076-bdfb-4919-a08f-1c52e04bfb42", "source": "texas_teks", "sort_order": 17, "teks_uuid": "671b2062-fce9-40d4-ba50-62a21b3cf858" }, { "id": "90861e26-e005-48bf-a877-f8a135c28562", "code": "126.2.c.7.A", "title": "explain and demonstrate the importance of acceptable use of digital resources and devices as outlined in local policies or acceptable use policy (AUP); and", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "66ff5d28-90ee-4ff6-9f9a-20eff9f7528d", "source": "texas_teks", "sort_order": 18, "teks_uuid": "5e9dc3f0-c431-446c-863b-32d6020259af" }, { "id": "e1c40e53-ec0a-4710-aae6-5d904fdf0ae7", "code": "126.2.c.7.B", "title": "communicate an understanding that all digital content has owners and explain the importance of respecting others' belongings as they apply to digital content and information.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "66ff5d28-90ee-4ff6-9f9a-20eff9f7528d", "source": "texas_teks", "sort_order": 19, "teks_uuid": "722ddf0a-5e4e-4cdb-a5dc-ff91ca53e2f1" }, { "id": "f0c6564f-df1b-4e2b-9adc-829d0ed82ff0", "code": "126.2.c.8.A", "title": "identify ways to keep a user account safe, including not sharing login information and logging off accounts and devices;", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "7be10d7f-4a45-421d-8a87-8c2632897ef2", "source": "texas_teks", "sort_order": 20, "teks_uuid": "3b9d73cc-4bd0-4ce6-9ab9-e51f2b00c985" }, { "id": "1ce2dde8-ca2e-4471-ba55-da710bb214ce", "code": "126.2.c.8.B", "title": "identify and discuss what information is safe to share online such as hobbies and likes and dislikes and what information is unsafe such as identifying information; and", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "7be10d7f-4a45-421d-8a87-8c2632897ef2", "source": "texas_teks", "sort_order": 21, "teks_uuid": "e18deb5e-a727-47a4-8e19-a815a80f3282" }, { "id": "0f806ac9-2928-4628-bcfb-fde00521fa2d", "code": "126.2.c.8.C", "title": "discuss and define cyberbullying with teacher support and guidance.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "7be10d7f-4a45-421d-8a87-8c2632897ef2", "source": "texas_teks", "sort_order": 22, "teks_uuid": "2f9f7230-a549-4914-bc44-3873d31d1bc0" }, { "id": "eb8e7abf-758e-444b-902c-449dd0026eae", "code": "126.2.c.9.A", "title": "select and use a variety of applications, devices, and online learning environments to create an original product;", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "130afa4e-3e57-4516-a9bd-b607da68c251", "source": "texas_teks", "sort_order": 23, "teks_uuid": "7dab36ce-bfd9-458c-9423-69ba02562436" }, { "id": "7ac275fe-b38e-475c-81e3-f92b84e9cfc6", "code": "126.2.c.9.B", "title": "describe basic computer hardware, including a variety of input and output devices, and software using accurate terminology;", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "130afa4e-3e57-4516-a9bd-b607da68c251", "source": "texas_teks", "sort_order": 24, "teks_uuid": "44ba41c9-9ccd-4d51-9e61-b6fb1d05da70" }, { "id": "3b8582fc-d258-4781-9cd1-66bb6f5556c4", "code": "126.2.c.9.C", "title": "perform software application functions such as file management, collaboration, and the creation and revision of digital artifacts using a variety of developmentally appropriate digital tools and resources;", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "130afa4e-3e57-4516-a9bd-b607da68c251", "source": "texas_teks", "sort_order": 25, "teks_uuid": "a5b38888-12f9-4b88-a6e0-fc7b39bf529d" }, { "id": "50a4af01-26d6-460f-a0bd-41a69e497cef", "code": "126.2.c.9.D", "title": "practice ergonomically correct keyboarding techniques and developmentally appropriate hand and body positions; and", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "130afa4e-3e57-4516-a9bd-b607da68c251", "source": "texas_teks", "sort_order": 26, "teks_uuid": "6bf912e0-32b5-4e03-a991-0ea501a8fa20" }, { "id": "7e0f0a95-d4a9-4bec-9bd6-51a10723d47c", "code": "126.2.c.9.E", "title": "identify, locate, and practice using keys on the keyboard, including upper- and lower-case letters, numbers, and special keys such as space bar, shift, and backspace.", "description": null, "subject_area": "Technology Applications", "grade_level": "1", "domain": null, "cluster": null, "parent_id": "130afa4e-3e57-4516-a9bd-b607da68c251", "source": "texas_teks", "sort_order": 27, "teks_uuid": "e2304b31-7959-444e-8458-4f9d4b5300b9" }, { "id": "20119f94-48ae-4af2-b404-cfd6a92e8512", "code": "126.3.c.1.A", "title": "identify and communicate a problem or task and break down (decompose) multiple solutions into sequential steps;", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "299e41a5-b052-455c-826b-1fa2cbcde3c0", "source": "texas_teks", "sort_order": 12, "teks_uuid": "9286baf0-ba47-46f0-8d41-92c63b5ce312" }, { "id": "e530a3b7-35cb-45f2-8449-76b4a0e0b069", "code": "126.3.c.1.B", "title": "identify complex patterns and make predictions based on the pattern;", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "299e41a5-b052-455c-826b-1fa2cbcde3c0", "source": "texas_teks", "sort_order": 13, "teks_uuid": "9cdf42ce-7e21-4e06-9bf8-0ec8614423f2" }, { "id": "0bd2351f-a231-4c07-bd9c-92128e5b5219", "code": "126.3.c.1.D", "title": "create and troubleshoot simple algorithms (step-by-step instructions) that include conditionals such as if-then statements as they apply to an everyday task.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "299e41a5-b052-455c-826b-1fa2cbcde3c0", "source": "texas_teks", "sort_order": 14, "teks_uuid": "45a13492-69f9-4bab-b893-77358ec58efe" }, { "id": "7334c3be-da47-40a0-a147-4149d1381ed0", "code": "126.3.c.2.A", "title": "identify and explore what a variable is in a sequence of code; and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "046bb883-201e-4074-a89f-843566b45384", "source": "texas_teks", "sort_order": 15, "teks_uuid": "1bbef129-7b4b-4661-bfdf-7b64139e3070" }, { "id": "c3bf97ad-7b93-4f6a-9950-ecb5411b5473", "code": "126.3.c.2.B", "title": "use a design process to create a sequence of code that includes loops to solve a simple problem with or without technology.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "046bb883-201e-4074-a89f-843566b45384", "source": "texas_teks", "sort_order": 16, "teks_uuid": "d5dfc6e3-58c8-4491-8276-caf1a8ac4d86" }, { "id": "cef1a8ef-4c2c-4acf-9ac2-0fe16231434c", "code": "126.3.c.3.A", "title": "demonstrate personal skills and behaviors, including effective communication, following directions, and mental agility, needed to implement a design process successfully; and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "5494541f-03b3-475f-bf24-ccfe121a0fe1", "source": "texas_teks", "sort_order": 17, "teks_uuid": "366eb235-d4e1-4e91-bfae-d5a29ef6fe2f" }, { "id": "16f6bc3c-d269-4867-916f-e2a01392f905", "code": "126.3.c.3.B", "title": "apply a design process with components such as testing and reflecting to create new and useful solutions to identify and solve for authentic problems.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "5494541f-03b3-475f-bf24-ccfe121a0fe1", "source": "texas_teks", "sort_order": 18, "teks_uuid": "0539af8c-9523-4cae-a291-38a247fbef39" }, { "id": "1929c5e1-0c1f-4383-a855-9ac5fe335176", "code": "126.3.c.5.A", "title": "identify and collect non-numerical data, such as weather patterns, preferred reading genres, and holidays; and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "746b42b3-5df4-4073-af27-791d79e4156c", "source": "texas_teks", "sort_order": 19, "teks_uuid": "2680103b-6854-4bba-b9c6-44324b32def1" }, { "id": "7d1c9cd9-0833-444d-9429-8aae6069c350", "code": "126.3.c.5.B", "title": "conduct a basic search independently using provided keywords and digital sources.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "746b42b3-5df4-4073-af27-791d79e4156c", "source": "texas_teks", "sort_order": 20, "teks_uuid": "5e7f70bf-f352-40ba-9218-357f6d18d375" }, { "id": "adc392e2-6489-4664-a6e0-57a6fcfd631c", "code": "126.3.c.8.A", "title": "explain and demonstrate the importance of acceptable use of digital resources and devices as outlined in local policies or acceptable use policy (AUP); and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "c2a1ffa8-d1a2-44a5-95f6-64f82979c928", "source": "texas_teks", "sort_order": 21, "teks_uuid": "e1a4e17d-bbd7-4060-a786-5342c328cadc" }, { "id": "5fdc4ee2-ea42-47be-9a8d-126ffde2ff6b", "code": "126.3.c.8.B", "title": "communicate an understanding that all digital content has owners and explain the importance of respecting others' belongings as they apply to digital content and information.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "c2a1ffa8-d1a2-44a5-95f6-64f82979c928", "source": "texas_teks", "sort_order": 22, "teks_uuid": "870c434f-5cec-4472-af05-0f3ca772ecfe" }, { "id": "81cb409e-f6ef-43ed-ad4d-0f9996350c74", "code": "126.3.c.9.A", "title": "demonstrate account safety, including creating a strong password and logging off accounts and devices;", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "fa6ad113-5b3c-4fd6-827a-5e9d1515973d", "source": "texas_teks", "sort_order": 23, "teks_uuid": "6c0c16cb-1ebe-4369-9c70-d34ffd34f889" }, { "id": "af1da54f-885f-4860-a29f-1e5d0d3e1aa5", "code": "126.3.c.9.B", "title": "compare and contrast private and public information and discuss what is safe to be shared online and with whom; and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "fa6ad113-5b3c-4fd6-827a-5e9d1515973d", "source": "texas_teks", "sort_order": 24, "teks_uuid": "e163d81c-8536-459b-8cbc-12f1c897115f" }, { "id": "12593dcb-e70a-41f2-9d76-139eec29b662", "code": "126.3.c.9.C", "title": "discuss cyberbullying and identify examples.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "fa6ad113-5b3c-4fd6-827a-5e9d1515973d", "source": "texas_teks", "sort_order": 25, "teks_uuid": "36dcbbbf-4e71-4e5f-802a-ed4dde3b2fde" }, { "id": "14cf686a-5ccb-4fad-8e6c-cc152d6b42c4", "code": "126.3.c.10.A", "title": "select and use a variety of applications, devices, and online learning environments to create and share content;", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "d842e01f-493a-40e1-bd3e-cd7c52c06604", "source": "texas_teks", "sort_order": 26, "teks_uuid": "11738bc0-e6d5-45f3-bf89-f643e0393bf5" }, { "id": "3835246e-b957-4e0b-a0df-1c5bcf93b5e0", "code": "126.3.c.10.B", "title": "identify, compare, and describe the function of basic computer hardware, including a variety of input and output devices, and software applications using accurate terminology;", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "d842e01f-493a-40e1-bd3e-cd7c52c06604", "source": "texas_teks", "sort_order": 27, "teks_uuid": "9f0ded38-7c5f-4f70-8b10-81c8888367d2" }, { "id": "101f93ab-4d01-433f-9b99-a4c1d42a5a1d", "code": "126.3.c.10.C", "title": "operate a variety of developmentally appropriate digital tools and resources to perform software application functions such as reviewing digital artifacts and designing solutions to problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "d842e01f-493a-40e1-bd3e-cd7c52c06604", "source": "texas_teks", "sort_order": 28, "teks_uuid": "872ebd81-cc73-4945-b0b5-4e20cc2a6a6b" }, { "id": "d292cbf9-0fdc-430a-86ec-01639b7f5a44", "code": "126.3.c.10.D", "title": "practice ergonomically correct keyboarding techniques and developmentally appropriate hand and body positions; and", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "d842e01f-493a-40e1-bd3e-cd7c52c06604", "source": "texas_teks", "sort_order": 29, "teks_uuid": "5bfcd32f-0341-4941-ae62-544e35128536" }, { "id": "a069b44f-962f-4b89-aff8-3fdca47f7cae", "code": "126.3.c.10.E", "title": "identify, locate, and practice using keys on the keyboard, including secondary actions of different keys such as \u2033@,\u2033 \u2033#,\u2033 \u2033$,\u2033 and \u2033?\u2033.", "description": null, "subject_area": "Technology Applications", "grade_level": "2", "domain": null, "cluster": null, "parent_id": "d842e01f-493a-40e1-bd3e-cd7c52c06604", "source": "texas_teks", "sort_order": 30, "teks_uuid": "9fe73bcf-d375-4842-98b5-89290de49bef" }, { "id": "620627f1-19ea-4c55-ac57-5bea37767537", "code": "126.8.c.1.A", "title": "decompose story problems into smaller, manageable subproblems and identify a solution to the problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "bf82ac12-fcb4-4c69-83f0-18e4aaa7f855", "source": "texas_teks", "sort_order": 14, "teks_uuid": "f7d7093b-43a1-459f-b488-84882ca44773" }, { "id": "4dc551b0-64a4-44c5-8f9b-248714ef1fc0", "code": "126.8.c.1.B", "title": "identify simple and complex patterns in story problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "bf82ac12-fcb4-4c69-83f0-18e4aaa7f855", "source": "texas_teks", "sort_order": 15, "teks_uuid": "9ad43e9b-fac9-49dd-9bb7-1e6b3ae6d4ee" }, { "id": "cee68a2a-3083-485e-a6a1-4c7b72d6ac4c", "code": "126.8.c.1.C", "title": "develop a plan collaboratively and document a plan that outlines specific steps taken to complete a project; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "bf82ac12-fcb4-4c69-83f0-18e4aaa7f855", "source": "texas_teks", "sort_order": 16, "teks_uuid": "37cd8ede-6b2e-4f75-ac94-5a5dc11e24bd" }, { "id": "8b788ef1-ee5d-44af-b02a-02a371befa87", "code": "126.8.c.1.D", "title": "debug simple algorithms (set of procedures) by identifying and removing errors.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "bf82ac12-fcb4-4c69-83f0-18e4aaa7f855", "source": "texas_teks", "sort_order": 17, "teks_uuid": "4a5cfd93-30b4-4022-a3e3-a98c226b030d" }, { "id": "d9ca9b31-ad8e-4d29-a11a-8945f90dc7e8", "code": "126.8.c.2.A", "title": "use variables within a program to store data; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "7c8faea5-5c90-4a12-a18f-7003286fc8c3", "source": "texas_teks", "sort_order": 18, "teks_uuid": "1712b22f-bbe8-4194-8390-06a2605b0db4" }, { "id": "f9032656-0890-4b56-8cbc-0632414a277d", "code": "126.c.2.B", "title": "use a design process to create programs that include sequences, loops, and conditionals to express ideas or address a problem.", "description": null, "subject_area": "Technology Applications", "grade_level": "Unknown", "domain": null, "cluster": null, "parent_id": null, "source": "texas_teks", "sort_order": 2, "teks_uuid": "199eeb0d-cc88-42e5-885e-787c4bc80037" }, { "id": "2615e07b-c513-4c2b-8603-4d24515dabd9", "code": "126.8.c.3.A", "title": "explain the importance of and demonstrate personal skills and behaviors, including metacognition, effective communication, following directions, and mental agility, needed to implement the design process successfully; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "c470d0dd-4c9b-4748-a226-00bdaf920c43", "source": "texas_teks", "sort_order": 19, "teks_uuid": "3e257af9-c1a1-423d-86e6-04f6dcc227bb" }, { "id": "ed32798f-95d9-40e3-aca3-e0a470f7be7c", "code": "126.8.c.3.B", "title": "apply an appropriate design process using components such as peer and teacher feedback to create new and useful solutions to authentic problems.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "c470d0dd-4c9b-4748-a226-00bdaf920c43", "source": "texas_teks", "sort_order": 20, "teks_uuid": "9c8e46a1-6cfc-4054-9343-66d1d18eddd9" }, { "id": "7423db94-6192-499a-94cf-116c8ca6748d", "code": "126.8.c.5.A", "title": "identify and collect numerical data such as the price of goods or temperature; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "dd1b3b76-2727-4770-8da5-69a04754e952", "source": "texas_teks", "sort_order": 21, "teks_uuid": "b379a2fb-0f2a-446d-8b7d-84fa867541e6" }, { "id": "b55e87c8-1c8a-4577-8642-c5b4c1e06a51", "code": "126.8.c.5.B", "title": "use various search strategies with adult assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "dd1b3b76-2727-4770-8da5-69a04754e952", "source": "texas_teks", "sort_order": 22, "teks_uuid": "a08e1757-8cd3-47e7-8a60-fd2fd8d9e866" }, { "id": "3479c972-c0f7-49ef-bce0-f20efbae44e3", "code": "126.8.c.8.A", "title": "define digital footprint;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "a4319c79-0198-4c48-9126-59d22330889f", "source": "texas_teks", "sort_order": 23, "teks_uuid": "5e828867-218b-4a57-a3f4-b424fed080b1" }, { "id": "a2ae82df-092e-46ae-8be8-fec008d7966c", "code": "126.8.c.8.B", "title": "define digital etiquette; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "a4319c79-0198-4c48-9126-59d22330889f", "source": "texas_teks", "sort_order": 24, "teks_uuid": "d32663ca-f73c-40ff-9c07-7c448cd58d2b" }, { "id": "ed3269ac-0d10-4f46-8984-00f2a26d6753", "code": "126.8.c.8.C", "title": "define digital collaboration.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "a4319c79-0198-4c48-9126-59d22330889f", "source": "texas_teks", "sort_order": 25, "teks_uuid": "af90549e-921b-41da-b575-051c709be9ae" }, { "id": "5f1f7f79-9def-49db-982d-8deaa296dbeb", "code": "126.8.c.9.A", "title": "demonstrate adherence to local acceptable use policy (AUP) that reflects positive social behavior in the digital environment;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "9d9cf268-0691-448c-9e8a-ad547bf27a9e", "source": "texas_teks", "sort_order": 26, "teks_uuid": "dcf1da93-573d-4eb2-a208-c9c938c349bf" }, { "id": "50d6085f-13a9-453c-9042-2e4b35d3b751", "code": "126.8.c.9.B", "title": "communicate the purpose of copyright law and identify appropriate and inappropriate uses of digital content and information; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "9d9cf268-0691-448c-9e8a-ad547bf27a9e", "source": "texas_teks", "sort_order": 27, "teks_uuid": "32bcfe36-974a-407e-bf5b-215931140cfc" }, { "id": "8b342158-f631-4d83-aeac-cb564f3a6e45", "code": "126.8.c.9.C", "title": "identify the required elements of citations for digital forms of media.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "9d9cf268-0691-448c-9e8a-ad547bf27a9e", "source": "texas_teks", "sort_order": 28, "teks_uuid": "f426fc9f-da1d-420d-a8c4-d9f63aad7562" }, { "id": "c1a91a0c-c983-4ad5-adfa-876db29cfabc", "code": "126.8.c.10.A", "title": "demonstrate account safety, including creating a strong password and logging off accounts and devices;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "260e059f-cbe4-4bb9-b589-f9c576c1a0ca", "source": "texas_teks", "sort_order": 29, "teks_uuid": "0178090d-f5f6-4382-b4e3-21c54e0fa945" }, { "id": "853af9cb-45bd-49a2-82ba-ed6bbd0686b0", "code": "126.8.c.10.B", "title": "describe ways to employ safe practices such as protecting digital identity and avoid online dangers such as accessing unsafe websites or clicking on suspicious links; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "260e059f-cbe4-4bb9-b589-f9c576c1a0ca", "source": "texas_teks", "sort_order": 30, "teks_uuid": "d58aecde-ad2a-40c1-bdd3-839812b1e6e2" }, { "id": "a60309dd-b13e-4eb2-aac6-a909cee65cf8", "code": "126.8.c.10.C", "title": "discuss cyberbullying and explain how to respond to cyberbullying.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "260e059f-cbe4-4bb9-b589-f9c576c1a0ca", "source": "texas_teks", "sort_order": 31, "teks_uuid": "39f999c7-51c4-4145-a21e-8abac89a810c" }, { "id": "c5ea2c90-76b1-4916-97d5-f12521544963", "code": "126.8.c.11.A", "title": "compare and contrast applications such as word processor, spreadsheet, and presentation tools for relevance to an assigned task; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "012e18d1-2f77-492f-b055-82cd665b2245", "source": "texas_teks", "sort_order": 32, "teks_uuid": "4948e469-2dd8-4640-a3b5-a9fb8a8b4d37" }, { "id": "e94d6b0a-44c3-4b12-a92d-9cfa0e23d4d3", "code": "126.8.c.11.B", "title": "perform software application functions such as inserting or deleting text, inserting images, and formatting page layout and margins.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "012e18d1-2f77-492f-b055-82cd665b2245", "source": "texas_teks", "sort_order": 33, "teks_uuid": "f417eeb8-8509-4226-aac8-86830aa517fe" }, { "id": "4d48a047-d8e0-4866-ab9b-43a1d16f0b7d", "code": "126.8.c.12.A", "title": "communicate an understanding of terminology related to operating systems and network systems such as internet, intranet, wireless network, short-range wireless technology, and learning management systems;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "d9fd52ee-fe6e-495a-8f70-e673f9f4bbae", "source": "texas_teks", "sort_order": 34, "teks_uuid": "9248f2c7-0065-466e-bad4-fdabe5d4973f" }, { "id": "67dececd-0aa6-47d7-8bae-eb4eb74cf280", "code": "126.8.c.12.B", "title": "identify where and how to save files such as using appropriate naming conventions and effective file management strategies;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "d9fd52ee-fe6e-495a-8f70-e673f9f4bbae", "source": "texas_teks", "sort_order": 35, "teks_uuid": "c76c81d4-389c-4fe4-958c-302b2198e425" }, { "id": "4e852672-f07f-4aef-9514-13b25f0b7f5a", "code": "126.8.c.12.C", "title": "demonstrate proper touch keyboarding techniques with accuracy and ergonomic strategies such as correct hand and body positions;", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "d9fd52ee-fe6e-495a-8f70-e673f9f4bbae", "source": "texas_teks", "sort_order": 36, "teks_uuid": "c7a7b244-83b0-46bd-8fbb-506533aa1e0d" }, { "id": "d1595b0b-be37-444e-8102-20ad7ef35e9c", "code": "126.8.c.12.D", "title": "identify and practice using keyboard or other input device shortcuts for actions such as copy, paste, undo, or closing windows; and", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "d9fd52ee-fe6e-495a-8f70-e673f9f4bbae", "source": "texas_teks", "sort_order": 37, "teks_uuid": "f94ebcdc-3aac-4612-94ee-cbbbd1910f5c" }, { "id": "d2942244-27ce-4d73-a1a2-ec8af8391a75", "code": "126.8.c.12.E", "title": "identify minor technical problems with hardware and software and solve the issues with assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "3", "domain": null, "cluster": null, "parent_id": "d9fd52ee-fe6e-495a-8f70-e673f9f4bbae", "source": "texas_teks", "sort_order": 38, "teks_uuid": "d7ec8fb4-70ff-46e8-a661-cb841766b09c" }, { "id": "1d1ac7b2-e301-4791-a1f8-55b2d9aee8b2", "code": "126.9.c.1.A", "title": "decompose story problems into smaller, manageable subproblems and discuss and document various solutions to the problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "2185e29c-f4e2-493d-8139-7701e3fe67cb", "source": "texas_teks", "sort_order": 15, "teks_uuid": "eda8979b-f5d1-4047-930f-8262b35a5965" }, { "id": "b59d8f7e-cdb3-4868-a818-e27b86ee8ae7", "code": "126.9.c.1.B", "title": "identify patterns in story problems and make predictions based on the pattern;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "2185e29c-f4e2-493d-8139-7701e3fe67cb", "source": "texas_teks", "sort_order": 16, "teks_uuid": "9a123f15-66f5-4582-86da-79f7b1f0e8fa" }, { "id": "d8d25086-904d-46bc-9686-a8490323d79d", "code": "126.9.c.1.C", "title": "communicate design plans and solutions using a variety of options; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "2185e29c-f4e2-493d-8139-7701e3fe67cb", "source": "texas_teks", "sort_order": 17, "teks_uuid": "e5293d41-76b2-4377-8a14-cb97fff59866" }, { "id": "4b2e06dd-521f-4b68-96ac-5d96b4dc8f08", "code": "126.9.c.1.D", "title": "debug algorithms (set of procedures) by identifying and removing errors.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "2185e29c-f4e2-493d-8139-7701e3fe67cb", "source": "texas_teks", "sort_order": 18, "teks_uuid": "a5dde746-f1f0-4d89-8db0-15de749a23ec" }, { "id": "b729468e-839f-4e83-a8e6-8ddade95a5f3", "code": "126.9.c.2.A", "title": "use variables within a program to modify data; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "ba666535-009a-4c27-bdc5-4c9e26a5bb52", "source": "texas_teks", "sort_order": 19, "teks_uuid": "700ed8fe-4d03-47d7-a723-b5f585ff24e4" }, { "id": "eb11a7e9-8545-48ba-aaf1-53e063a87bbe", "code": "126.9.c.2.B", "title": "use a design process to create programs that include sequences, loops, and conditionals to express ideas or address a problem.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "ba666535-009a-4c27-bdc5-4c9e26a5bb52", "source": "texas_teks", "sort_order": 20, "teks_uuid": "e8597dd8-daf6-44da-8e50-e72e32b41e68" }, { "id": "83cc1669-580b-4dde-bb95-2e4f7f2796ef", "code": "126.9.c.3.A", "title": "explain the importance of and demonstrate personal skills and behaviors, including problem solving and questioning, effective communication, following directions, mental agility, and metacognition, that are needed to implement a design process successfully; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "7fb71abe-e976-4702-a18e-53532842301a", "source": "texas_teks", "sort_order": 21, "teks_uuid": "a8520dee-7f4d-49ad-b533-988e2325bc70" }, { "id": "2b75e365-dd0a-40b0-a8f3-fdf73e49071c", "code": "126.9.c.3.B", "title": "apply an appropriate design process that includes components to improve processes and refine original products for authentic problems.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "7fb71abe-e976-4702-a18e-53532842301a", "source": "texas_teks", "sort_order": 22, "teks_uuid": "52ddb06d-6e61-4b71-b773-9cd9c09cba64" }, { "id": "239f295d-2fe9-4844-a702-e59979f94f69", "code": "126.9.c.5.A", "title": "classify numerical and non-numerical data; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "ac70a735-130f-428b-8a4e-50f47509efa8", "source": "texas_teks", "sort_order": 23, "teks_uuid": "df74534e-5394-45e9-802d-cc9f3549d7b3" }, { "id": "603398a8-18c9-42c5-866b-f7d6206a3984", "code": "126.9.c.5.B", "title": "identify and collect data by using various search strategies, including two or more keywords within specific parameters.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "ac70a735-130f-428b-8a4e-50f47509efa8", "source": "texas_teks", "sort_order": 24, "teks_uuid": "81f87e50-60ec-4168-a9a5-83c23d4d4226" }, { "id": "0067e28a-c624-42fe-a923-79f27411057f", "code": "126.9.c.8.A", "title": "describe how information retained online creates a permanent digital footprint;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "3e139265-17e8-4945-92e0-76b84a406411", "source": "texas_teks", "sort_order": 25, "teks_uuid": "3b170014-334d-4def-9454-c0cfc8af4dc0" }, { "id": "bba58e72-2802-4681-a7ea-03590576ba93", "code": "126.9.c.8.B", "title": "describe appropriate digital etiquette for various forms of digital communication such as text, email, and online chat; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "3e139265-17e8-4945-92e0-76b84a406411", "source": "texas_teks", "sort_order": 26, "teks_uuid": "da3e22e4-08c7-48b8-8b90-e82e40128053" }, { "id": "a3fc38a4-1dba-4bef-abeb-6156f0c9889e", "code": "126.9.c.8.C", "title": "demonstrate appropriate digital etiquette for various forms of digital collaboration such as shared documents, video conferencing, and other platforms.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "3e139265-17e8-4945-92e0-76b84a406411", "source": "texas_teks", "sort_order": 27, "teks_uuid": "307e9c5b-d6b1-4a1c-b249-b95483a1203e" }, { "id": "b430fda2-a32f-4d7f-b6f0-d978198666cc", "code": "126.9.c.9.A", "title": "demonstrate adherence to local acceptable use policy (AUP) and explain the importance of responsible and ethical technology use;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "5d42b167-e68c-4b3c-a0e7-c13c52bd1d3f", "source": "texas_teks", "sort_order": 28, "teks_uuid": "86e11808-dae1-4c4f-be0d-124a245772a7" }, { "id": "ebfd6188-4ed3-4f00-9093-3a1e3b4c7ed4", "code": "126.9.c.9.B", "title": "describe the rights and responsibilities of a creator, define copyright law, and explain how copyright law applies to creative work; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "5d42b167-e68c-4b3c-a0e7-c13c52bd1d3f", "source": "texas_teks", "sort_order": 29, "teks_uuid": "fbed256e-b4e7-4b0b-8481-efbb9e0b3d4e" }, { "id": "716bf513-4dca-4395-9f1f-f611d89f5df2", "code": "126.9.c.10.A", "title": "demonstrate account safety, including creating a strong password and logging off devices, and explain the importance of these practices;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "4d1a364d-65dc-48ed-890b-b0221b65a7b1", "source": "texas_teks", "sort_order": 30, "teks_uuid": "989a22d4-eb8d-452c-8e4b-3515dfdd3f7e" }, { "id": "5f05b7b2-b43f-4b7e-90a1-12d84ccd4c51", "code": "126.9.c.10.B", "title": "identify and discuss types of data collection tools such as cookies, pop-ups, smart devices, and unsecured networks and explain why it is important to maintain digital privacy; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "4d1a364d-65dc-48ed-890b-b0221b65a7b1", "source": "texas_teks", "sort_order": 31, "teks_uuid": "ecf7de0b-9fdc-4056-91c5-b3b538cf03bd" }, { "id": "8ea74e85-5711-447a-bc43-d230640e1854", "code": "126.9.c.10.C", "title": "discuss and explain how to respond to cyberbullying, including advocating for self and others.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "4d1a364d-65dc-48ed-890b-b0221b65a7b1", "source": "texas_teks", "sort_order": 32, "teks_uuid": "34ed2fe2-c7ad-4b5c-8703-4a7dac22fc71" }, { "id": "534037e9-0ab0-4292-8c83-46c24fdb7dea", "code": "126.9.c.11.A", "title": "evaluate and choose applications for relevance to an assigned task; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "1d6d1717-3d71-4506-bdc1-8ff5540371fa", "source": "texas_teks", "sort_order": 33, "teks_uuid": "f7b8176e-7312-42d4-a251-95bc2bdfaa4b" }, { "id": "9e8306e3-6b82-4e03-bb01-63c53324a86a", "code": "126.9.c.11.B", "title": "perform software application functions such as outline options, bulleting, and numbering lists, and perform editing functions such as finding and replacing.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "1d6d1717-3d71-4506-bdc1-8ff5540371fa", "source": "texas_teks", "sort_order": 34, "teks_uuid": "8d04373f-bd21-4a69-8550-1839a7275a9a" }, { "id": "f38edf9d-0240-47e7-957d-8ef997880261", "code": "126.9.c.12.A", "title": "communicate an understanding of terminology related to virtual systems such as video conferencing, augmented reality, and virtual reality environments;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "163b1d2c-6b9a-4ce1-bacb-6127d91604a5", "source": "texas_teks", "sort_order": 35, "teks_uuid": "e36bd969-4157-4fdf-8195-bde1ffd46368" }, { "id": "5ba3e915-f691-4e90-8471-e4a2394b86f5", "code": "126.9.c.12.B", "title": "evaluate where and how to save, including the use of appropriate naming conventions and effective file management strategies and folder structures;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "163b1d2c-6b9a-4ce1-bacb-6127d91604a5", "source": "texas_teks", "sort_order": 36, "teks_uuid": "6c7a840b-54ec-4a84-8fc0-30d9a0685937" }, { "id": "e6223aaa-3d3d-4fb9-b983-07ea37a4105c", "code": "126.9.c.12.C", "title": "demonstrate proper touch keyboarding techniques with speed and accuracy and ergonomic strategies such as correct hand and body positions;", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "163b1d2c-6b9a-4ce1-bacb-6127d91604a5", "source": "texas_teks", "sort_order": 37, "teks_uuid": "5bd0bf79-867f-48cf-a0d9-5bf20ec08d13" }, { "id": "720a9cf4-d5db-4d70-8511-fa6e6804b48b", "code": "126.9.c.12.D", "title": "identify and practice using cross-curricular symbols or other input device shortcuts on a keyboard; and", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "163b1d2c-6b9a-4ce1-bacb-6127d91604a5", "source": "texas_teks", "sort_order": 38, "teks_uuid": "111570ca-2ee2-497c-a2df-0aad9c30fda5" }, { "id": "df44375b-b514-4d51-80aa-4ee27d993360", "code": "126.9.c.12.E", "title": "use troubleshooting strategies to solve minor technical problems with hardware and software such as restarting software or rebooting hardware.", "description": null, "subject_area": "Technology Applications", "grade_level": "4", "domain": null, "cluster": null, "parent_id": "163b1d2c-6b9a-4ce1-bacb-6127d91604a5", "source": "texas_teks", "sort_order": 39, "teks_uuid": "57f6c172-d90b-4244-bc89-4f97ab18ffb8" }, { "id": "32ad9bf9-0c6d-4ffe-870c-3ebab549d971", "code": "126.10.c.1.A", "title": "decompose a real-world problem into smaller, manageable subproblems using graphic organizers such as learning maps, concept maps, or other representations of data;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "2fdda048-6537-4dad-b9b8-0ccf42cd9dc8", "source": "texas_teks", "sort_order": 14, "teks_uuid": "d8692a69-a9a3-4c9b-95c4-ef86318d6e28" }, { "id": "807360ed-534c-4397-8da5-6aa94afd58d0", "code": "126.10.c.1.B", "title": "identify patterns in real-world problems and make predictions based on the pattern;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "2fdda048-6537-4dad-b9b8-0ccf42cd9dc8", "source": "texas_teks", "sort_order": 15, "teks_uuid": "8edac4bd-4196-4c09-8c61-aff78f76d0b1" }, { "id": "b872a02d-454d-404c-9a8c-c1db1d6cb6e7", "code": "126.10.c.1.C", "title": "design and create an outline collaboratively that documents a problem, possible solutions, and an expected timeline for the development of a coded solution; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "2fdda048-6537-4dad-b9b8-0ccf42cd9dc8", "source": "texas_teks", "sort_order": 16, "teks_uuid": "38541c61-388d-4fb4-8b36-a6aa1de721c9" }, { "id": "c860b517-a1c4-4703-861f-7ddb02af5468", "code": "126.10.c.1.D", "title": "compare multiple algorithms for the same task and determine which algorithm is the most appropriate for that task.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "2fdda048-6537-4dad-b9b8-0ccf42cd9dc8", "source": "texas_teks", "sort_order": 17, "teks_uuid": "9bf289fa-0ed1-44eb-9d71-8b640bf8a560" }, { "id": "813bc924-96c5-418a-89e8-e04c3abd5766", "code": "126.10.c.2.A", "title": "use variables within a program to store and modify data;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "006467a4-cee3-4a2c-95e7-75bd3050b8f4", "source": "texas_teks", "sort_order": 18, "teks_uuid": "0a22aca7-cfc3-40e6-ac1d-a8d3b44f8a8c" }, { "id": "d2717408-824e-4554-a517-aca8f9912a58", "code": "126.10.c.2.B", "title": "use a design process to create block-based programs that include sequences, loops, conditionals, and events to solve an everyday problem; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "006467a4-cee3-4a2c-95e7-75bd3050b8f4", "source": "texas_teks", "sort_order": 19, "teks_uuid": "e9ec5f36-4d75-47ac-b15b-f2daa7619771" }, { "id": "e2579c18-509a-4daf-bf9a-af069e7966a6", "code": "126.10.c.2.C", "title": "analyze a code and how the code may be reused to develop new or improved programs.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "006467a4-cee3-4a2c-95e7-75bd3050b8f4", "source": "texas_teks", "sort_order": 20, "teks_uuid": "ba6477c6-7b71-4480-90ec-0c5aac65fcd8" }, { "id": "25e631cc-dda1-4e4e-b381-b7e9a2159053", "code": "126.10.c.3.A", "title": "explain the importance of and demonstrate personal skills and behaviors, including persistence, effective communication, following directions, mental agility, metacognition, problem solving and questioning, that are needed to implement a design process successfully; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "0ed3f4d4-1499-49f2-adac-67252b031075", "source": "texas_teks", "sort_order": 21, "teks_uuid": "1bcf4757-4604-4119-9718-87831b8c0766" }, { "id": "adda4d45-2211-464c-8349-2dec56ff42d9", "code": "126.10.c.3.B", "title": "apply an appropriate design process that includes components to generate multiple solutions for an authentic problem and develop original products.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "0ed3f4d4-1499-49f2-adac-67252b031075", "source": "texas_teks", "sort_order": 22, "teks_uuid": "1c44d745-2e4e-40c7-9e4f-893c3cdc3949" }, { "id": "282e2284-7dd7-4e67-bdc7-02ba712c6ca7", "code": "126.10.c.5.A", "title": "identify and collect quantitative and qualitative data with digital tools; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "b32046ad-16a5-47b3-bb9a-eca5d7566af4", "source": "texas_teks", "sort_order": 23, "teks_uuid": "02b275f0-e8ac-43c3-ba96-06cbf3ab041e" }, { "id": "bcb1b921-8406-41d8-9fc2-9b3832f9d917", "code": "126.10.c.5.B", "title": "identify keyword(s), Boolean operators, and limiters within provided search strategies.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "b32046ad-16a5-47b3-bb9a-eca5d7566af4", "source": "texas_teks", "sort_order": 24, "teks_uuid": "68c073bf-59de-4b7b-87a5-ef5d63d19dd2" }, { "id": "5428d35d-fd75-4601-9fa9-6603708f429a", "code": "126.10.c.8.A", "title": "identify the components of a digital footprint such as online activity, game use, or social media platforms;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "1bf458dd-5c07-4a54-9d71-2c6f6b31e12b", "source": "texas_teks", "sort_order": 25, "teks_uuid": "31076ddb-5c1c-4ee2-ada1-930ed1e2af3c" }, { "id": "d1806bdf-c633-42ce-bd8d-22af1902fdc8", "code": "126.10.c.8.B", "title": "describe appropriate digital etiquette for addressing different audiences such as peers, teachers, and other adults; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "1bf458dd-5c07-4a54-9d71-2c6f6b31e12b", "source": "texas_teks", "sort_order": 26, "teks_uuid": "3c767089-6dad-4fc0-8342-244dab8f5834" }, { "id": "fd495bcc-3ab5-462c-ba16-395df1df9f04", "code": "126.10.c.8.C", "title": "apply appropriate digital etiquette for collaborating with different audiences such as peers, teachers, and other adults.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "1bf458dd-5c07-4a54-9d71-2c6f6b31e12b", "source": "texas_teks", "sort_order": 27, "teks_uuid": "78ffbe7b-2a5d-4e15-b118-d82d7e5466ad" }, { "id": "b4f95b31-f4a5-48df-ac9f-2247948bce24", "code": "126.10.c.9.A", "title": "demonstrate adherence to local acceptable use policy (AUP) and explain the importance of responsible and ethical technology use;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "408d760b-f2bc-4bb3-9021-113e9b23e730", "source": "texas_teks", "sort_order": 28, "teks_uuid": "77d77659-dc2b-4ebc-b13e-54a2c5909ef4" }, { "id": "0b3d3925-889b-4159-9363-0daf0ada151a", "code": "126.10.c.9.B", "title": "describe the purpose of copyright law and the possible consequences for inappropriate use of digital content; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "408d760b-f2bc-4bb3-9021-113e9b23e730", "source": "texas_teks", "sort_order": 29, "teks_uuid": "cc786039-50c6-482e-a61b-d9f972c1ead2" }, { "id": "d38b18a8-9de2-41b3-8c18-bcc1c6ffe4be", "code": "126.10.c.9.C", "title": "create citations for digital forms of media with assistance.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "408d760b-f2bc-4bb3-9021-113e9b23e730", "source": "texas_teks", "sort_order": 30, "teks_uuid": "0ff494cf-def9-4fdd-a187-e25154ba0d06" }, { "id": "8376b88a-b2c2-4110-a972-d9532994e108", "code": "126.10.c.10.A", "title": "discuss cybersecurity strategies such as using a secured internet connection to protect digital information;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "cfe4e537-c66d-4509-b162-c1d14a5511b4", "source": "texas_teks", "sort_order": 31, "teks_uuid": "b7d4e0a9-26bc-4ebf-8564-3c0c871d288e" }, { "id": "d64b63f8-1d46-4532-a352-f8347157029b", "code": "126.10.c.10.B", "title": "discuss how data collection technology is used to track online navigation and identify strategies to maintain digital privacy and security; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "cfe4e537-c66d-4509-b162-c1d14a5511b4", "source": "texas_teks", "sort_order": 32, "teks_uuid": "7283b4b9-6fa1-4cdc-9c97-29ca11e36bcd" }, { "id": "a0bef9d0-6896-41cf-8f37-5184354d74c3", "code": "126.10.c.10.C", "title": "discuss and identify how interactions can escalate online and explain ways to stand up to cyberbullying, including advocating for self and others.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "cfe4e537-c66d-4509-b162-c1d14a5511b4", "source": "texas_teks", "sort_order": 33, "teks_uuid": "468156e8-3561-4c49-855d-c3217c4a4182" }, { "id": "97f01301-492b-4c2e-8f89-5988fa5fbb70", "code": "126.10.c.11.A", "title": "identify file types for text, graphics, and multimedia files; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "432d3b0c-d18b-4c05-8df7-9980543f55d7", "source": "texas_teks", "sort_order": 34, "teks_uuid": "d9bffb97-60c6-4251-b4b9-55fd7e2cdacf" }, { "id": "05f34653-77fe-4245-ae6f-f2c350f3cfa3", "code": "126.10.c.11.B", "title": "perform software application functions, including inserting or deleting text and images and formatting tools or options.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "432d3b0c-d18b-4c05-8df7-9980543f55d7", "source": "texas_teks", "sort_order": 35, "teks_uuid": "3a3c8cfa-8b2e-4c17-92dc-e8f41a2a8f6e" }, { "id": "e7343c42-72ce-4942-b2f7-c6ed14815779", "code": "126.10.c.12.A", "title": "describe and evaluate operating systems, learning management systems, virtual systems, and network systems such as internet, intranet, wireless network, and short-range wireless technology;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "af54fdcc-3320-4863-a333-c745d6b55c01", "source": "texas_teks", "sort_order": 36, "teks_uuid": "45d00c2a-debd-466d-98c6-bfa3ff94b2f9" }, { "id": "11644199-0566-4548-864a-b1f8ae947091", "code": "126.10.c.12.B", "title": "organize files using appropriate naming conventions and folder structures;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "af54fdcc-3320-4863-a333-c745d6b55c01", "source": "texas_teks", "sort_order": 37, "teks_uuid": "d514bb49-3db6-4519-9f2e-e8d8a175cb69" }, { "id": "a33e30b1-7fb5-45ef-a413-d2b190b69b53", "code": "126.10.c.12.C", "title": "demonstrate proper touch keyboarding techniques with increasing speed and accuracy and ergonomic strategies such as correct hand and body positions;", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "af54fdcc-3320-4863-a333-c745d6b55c01", "source": "texas_teks", "sort_order": 38, "teks_uuid": "1ee55989-f84d-434a-8c68-65314b425524" }, { "id": "862218cb-8d27-4c3c-a52f-28bcab306c51", "code": "126.10.c.12.D", "title": "demonstrate keyboard or other input device shortcuts with fluency; and", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "af54fdcc-3320-4863-a333-c745d6b55c01", "source": "texas_teks", "sort_order": 39, "teks_uuid": "922aef86-7f2f-401c-a453-5873b6263702" }, { "id": "f5ff7832-f420-4cd7-947c-e48a1605c93a", "code": "126.10.c.12.E", "title": "use help sources to research application features and solve software issues.", "description": null, "subject_area": "Technology Applications", "grade_level": "5", "domain": null, "cluster": null, "parent_id": "af54fdcc-3320-4863-a333-c745d6b55c01", "source": "texas_teks", "sort_order": 40, "teks_uuid": "1366370c-e876-481e-8af9-89fa525f30d1" }, { "id": "b08d3acf-1c2e-42c3-8fd0-7a4233643f6e", "code": "126.17.c.1.A", "title": "decompose real-world problems into structured parts by using visual representation;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "c45deb76-448e-4636-b287-802c4119c782", "source": "texas_teks", "sort_order": 14, "teks_uuid": "79b7647a-4c29-4572-90da-2654b0ca8e01" }, { "id": "1565e8d5-586c-4e73-96d8-20035a888b27", "code": "126.17.c.1.B", "title": "analyze the patterns and sequences found in visual representations such as learning maps, concept maps, or other representations of data;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "c45deb76-448e-4636-b287-802c4119c782", "source": "texas_teks", "sort_order": 15, "teks_uuid": "99efbd56-bdd2-4564-9de7-bdfc9bbd1613" }, { "id": "d3741f83-74fa-4ba0-b9d4-055524db11b5", "code": "126.17.c.1.C", "title": "define abstraction and distinguish between generalized information and specific information in the context of solving a problem or completing a task;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "c45deb76-448e-4636-b287-802c4119c782", "source": "texas_teks", "sort_order": 16, "teks_uuid": "ae19b04c-0f96-41ae-b97b-6275e69f95fb" }, { "id": "7e659b8a-9818-4141-8130-d63d4364ce0f", "code": "126.17.c.1.D", "title": "design a plan collaboratively using visual representation to document a problem, possible solutions, and an expected timeline for the development of a coded solution;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "c45deb76-448e-4636-b287-802c4119c782", "source": "texas_teks", "sort_order": 17, "teks_uuid": "12d7bc37-4f53-4f3c-a84f-859f3c54ac0b" }, { "id": "2d2ac977-6091-4f99-b4e2-84cac2987535", "code": "126.17.c.1.E", "title": "analyze different techniques used in debugging and apply them to an algorithm; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "c45deb76-448e-4636-b287-802c4119c782", "source": "texas_teks", "sort_order": 18, "teks_uuid": "e31548d0-2d2f-42cb-9423-3ce48462d4c4" }, { "id": "155f90ca-5286-49b7-9eab-ed3f5f79cafa", "code": "126.17.c.1.F", "title": "analyze the benefits of using iteration (code and sequence repetition) in algorithms.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "c45deb76-448e-4636-b287-802c4119c782", "source": "texas_teks", "sort_order": 19, "teks_uuid": "77b82941-19a0-48e9-b178-554d32ab439e" }, { "id": "3931c562-7a35-4e10-827d-0516f12263e9", "code": "126.17.c.2.A", "title": "define and label variables that relate to their programming or algorithm; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "5bd16bcb-3354-40f4-b8c7-6775d09cc49d", "source": "texas_teks", "sort_order": 20, "teks_uuid": "1ba4d789-d729-4118-a510-7a4be79fe036" }, { "id": "d9504734-1076-4b96-bb22-88ed7143be46", "code": "126.17.c.2.B", "title": "use a design process to create block-based and text-based programs that include sequences, loops, conditionals, and events to solve an everyday problem.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "5bd16bcb-3354-40f4-b8c7-6775d09cc49d", "source": "texas_teks", "sort_order": 21, "teks_uuid": "f20003f6-a15e-4827-9f17-7e2d3ec46047" }, { "id": "c091d1fe-7384-4e24-8698-bc723ad846a9", "code": "126.17.c.3.A", "title": "resolve challenges in design processes independently using goal setting and personal character traits such as demonstrating courage and confidence;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9548efb0-70c7-4a8f-a350-246ee95e21df", "source": "texas_teks", "sort_order": 22, "teks_uuid": "65c360d5-c6b4-458e-8a3e-f0517cb51b43" }, { "id": "67aa33e1-1f50-4031-99c4-e265c56044a8", "code": "126.17.c.3.B", "title": "discuss and implement a design process using digital tools to compare, contrast, and evaluate student-generated outcomes; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9548efb0-70c7-4a8f-a350-246ee95e21df", "source": "texas_teks", "sort_order": 23, "teks_uuid": "91e07b4f-64d1-447c-b4c5-21453a8089a3" }, { "id": "eaf57be8-0ad1-4841-a116-a106363b6afa", "code": "126.17.c.3.C", "title": "identify how the design process is used in various industries.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9548efb0-70c7-4a8f-a350-246ee95e21df", "source": "texas_teks", "sort_order": 24, "teks_uuid": "d45c7a05-4f76-4188-8918-6e0015482d38" }, { "id": "e5b20085-2f14-4ce7-8a01-644228bf73eb", "code": "126.17.c.4.A", "title": "discuss how changes in technology throughout history have impacted various areas of study;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "26ee5492-9930-42f2-9c52-a565abdcc4cf", "source": "texas_teks", "sort_order": 25, "teks_uuid": "da14d58c-c1f6-4062-8f52-f845ac4cc950" }, { "id": "d4b031d9-91c7-4166-86ae-ddbec0cb2100", "code": "126.17.c.4.B", "title": "discuss how global trends impact the development of technology; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "26ee5492-9930-42f2-9c52-a565abdcc4cf", "source": "texas_teks", "sort_order": 26, "teks_uuid": "d92ffe55-f13b-489d-abed-04d5cb679c2e" }, { "id": "721aae67-d31d-4d8d-940f-a3aa25bb5c71", "code": "126.17.c.4.C", "title": "transfer current knowledge to the learning of newly encountered technologies.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "26ee5492-9930-42f2-9c52-a565abdcc4cf", "source": "texas_teks", "sort_order": 27, "teks_uuid": "0a9f092b-e984-4b68-960c-1b6c35836eca" }, { "id": "9a422795-0c07-4c99-a94d-3d0f4da6ee5d", "code": "126.17.c.5.A", "title": "demonstrate how data can be represented in Boolean expression; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "dd1e60d9-9eee-45c0-ba17-a31fde268180", "source": "texas_teks", "sort_order": 28, "teks_uuid": "7c867338-d851-4efb-bd88-f1c418cf1cfd" }, { "id": "98eaa23c-5a4b-4a87-96f5-814aacf63c90", "code": "126.17.c.5.B", "title": "discuss and use advanced search strategies, including keywords, Boolean operators, and limiters.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "dd1e60d9-9eee-45c0-ba17-a31fde268180", "source": "texas_teks", "sort_order": 29, "teks_uuid": "2e4314e4-9503-424a-8fb5-0e8385829566" }, { "id": "6553af99-7485-400f-a77f-139f378c1605", "code": "126.17.c.8.A", "title": "identify the impact of a digital footprint;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "dd974aed-e1b4-46e8-9457-311e20149516", "source": "texas_teks", "sort_order": 30, "teks_uuid": "8b897cc4-b219-44d6-80ba-1187c1cbbcc1" }, { "id": "8eb2113f-014e-4138-a1ce-02d25fb7110b", "code": "126.17.c.8.B", "title": "create formal and informal digital communications using appropriate digital etiquette; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "dd974aed-e1b4-46e8-9457-311e20149516", "source": "texas_teks", "sort_order": 31, "teks_uuid": "191d71de-ea6e-4774-b564-c0eef2266085" }, { "id": "1c9442e3-2f34-4adb-82f5-5561c92d239e", "code": "126.17.c.8.C", "title": "collaborate on digital platforms such as recording a video conference presentation using appropriate formal and informal digital etiquette.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "dd974aed-e1b4-46e8-9457-311e20149516", "source": "texas_teks", "sort_order": 32, "teks_uuid": "0f00775a-add9-48f0-a765-380be7c2d7a5" }, { "id": "5fe1d367-ee55-481b-8db5-79b567658920", "code": "126.17.c.9.A", "title": "adhere to local acceptable use policy (AUP) and practice safe, ethical, and positive online behaviors;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9a3489b2-571a-4f1d-ab3d-577b5d284257", "source": "texas_teks", "sort_order": 33, "teks_uuid": "2188b949-c67a-4bd9-bcd6-444a566b48ce" }, { "id": "49d269af-2761-4bdb-a773-6d9559117ea1", "code": "126.17.c.9.B", "title": "discuss and define intellectual property and associated terms, including copyright law, permission, fair use, creative commons, open source, and public domain;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9a3489b2-571a-4f1d-ab3d-577b5d284257", "source": "texas_teks", "sort_order": 34, "teks_uuid": "b4c7aaa7-03f4-4dc8-a9ee-e47ac0b88d03" }, { "id": "c20593ac-16d1-49d5-9e13-f8c844d859cf", "code": "126.17.c.9.C", "title": "create citations and cite sources for a variety of digital forms of intellectual property; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9a3489b2-571a-4f1d-ab3d-577b5d284257", "source": "texas_teks", "sort_order": 35, "teks_uuid": "7c98947f-c94e-42e5-b6f3-aeb28287ac75" }, { "id": "27b8ee5c-996a-4c54-bbd7-f395f47ea664", "code": "126.17.c.9.D", "title": "describe how information can be exaggerated or misrepresented online.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "9a3489b2-571a-4f1d-ab3d-577b5d284257", "source": "texas_teks", "sort_order": 36, "teks_uuid": "6f7a4fb7-e168-4587-b47d-43d409f3c19c" }, { "id": "df842ff6-7ec7-4830-830f-61bffc0b6ad2", "code": "126.17.c.10.A", "title": "identify real-world cybersecurity problems such as phishing, malware, password attacks, identity theft, and hacking; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "f4b3e854-cbce-4784-90fc-7fc5186bb20f", "source": "texas_teks", "sort_order": 37, "teks_uuid": "16dca047-001b-48af-8638-8a8c60ab7784" }, { "id": "f15cf498-a3b1-45cb-9539-f77ea088b19a", "code": "126.17.c.10.B", "title": "identify various methods of cyberbullying such as harassment, impersonation, and cyberstalking.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "f4b3e854-cbce-4784-90fc-7fc5186bb20f", "source": "texas_teks", "sort_order": 38, "teks_uuid": "1a7f84eb-92ac-4d6e-b9f9-6bf793a5dd44" }, { "id": "9076716a-80c4-4570-8f1c-101098655859", "code": "126.17.c.12.A", "title": "apply appropriate technology terminology such as cloud applications, input, output, and basic programming;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 39, "teks_uuid": "81360354-d4e1-4127-a1de-e0ccacf2d5aa" }, { "id": "c9b7b0ed-f479-445b-9662-1d47eed84975", "code": "126.17.c.12.B", "title": "identify effective file management strategies such as file naming conventions, local and remote locations, backup, hierarchy, folder structure, file conversion, tags, and emerging digital organizational strategies;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 40, "teks_uuid": "65585bb2-cc1b-42c5-ace1-e9d656621c6b" }, { "id": "1a93ab7a-4171-4bcc-ac7a-77bf525c8b30", "code": "126.17.c.12.C", "title": "select and use the appropriate platform and tools to complete a specific task or project;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 41, "teks_uuid": "7aac75ad-5a57-4b6c-8076-a299715be8c9" }, { "id": "1448b891-65ac-4d51-96eb-a7dc416c35df", "code": "126.17.c.12.D", "title": "demonstrate improvement in speed and accuracy as measured by words per minute when applying correct keyboarding techniques;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 42, "teks_uuid": "99e81795-1c8d-4c99-bbb8-99f6ef96e009" }, { "id": "8813d003-52f1-4daa-b92d-e8b5dc4d9ac0", "code": "126.17.c.12.E", "title": "select and use appropriate shortcuts within applications;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 43, "teks_uuid": "86346e13-ba4d-486c-bd98-e70e1af40143" }, { "id": "c162bff1-14fe-42b6-b60e-76ee99c0a1e3", "code": "126.17.c.12.F", "title": "use help sources to research application features and solve software issues;", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 44, "teks_uuid": "92a8cef7-1de6-4e12-af58-007b44f13480" }, { "id": "4fdb2c3a-5d0a-4550-941e-72687d460983", "code": "126.17.c.12.G", "title": "identify types of local and remote data storage such as cloud architecture or local server; and", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 45, "teks_uuid": "38859dd8-80fa-4abb-93e1-53953714f01e" }, { "id": "d84a42fb-f3bf-41a9-bbc4-40a71b5fdcfd", "code": "126.17.c.12.H", "title": "use productivity tools found in spread sheet, word processing, and publication applications to create digital artifacts such as reports, graphs, and charts.", "description": null, "subject_area": "Technology Applications", "grade_level": "6", "domain": null, "cluster": null, "parent_id": "797c217c-99ec-44b7-9f79-6feef6844b7a", "source": "texas_teks", "sort_order": 46, "teks_uuid": "04c1fe93-862b-46c4-a898-4d25db24922c" }, { "id": "8af41a76-2bc2-45c9-9f8c-87b58e9ec9a1", "code": "126.18.c.1.A", "title": "decompose real-world problems into structured parts using flowcharts;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "source": "texas_teks", "sort_order": 14, "teks_uuid": "20d04eff-8d15-4b0f-ba17-6002de13bf20" }, { "id": "03c7d665-e0f9-4eab-a852-fb044ac71114", "code": "126.18.c.1.B", "title": "analyze the patterns and sequences found in flowcharts;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "source": "texas_teks", "sort_order": 15, "teks_uuid": "90a9d0c7-4189-42fd-85f0-b01d306786c2" }, { "id": "87fcf988-2751-460d-977f-ef3d168284b5", "code": "126.18.c.1.C", "title": "identify abstraction and analyze how an algorithm the student created can be generalized to solve additional problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "source": "texas_teks", "sort_order": 16, "teks_uuid": "17d93db2-2822-47bb-a54a-249e48d7e10a" }, { "id": "e22a1595-86a2-489c-b0bc-f73a8fa0977d", "code": "126.18.c.1.D", "title": "design a plan collaboratively using flowcharts to document a problem, possible solutions, and an expected timeline for the development of a coded solution;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "source": "texas_teks", "sort_order": 17, "teks_uuid": "e96b2490-6dc1-4414-ab55-432ee974ad4a" }, { "id": "0e565834-8b30-4ac9-a0c2-7db77dbacb42", "code": "126.18.c.1.E", "title": "analyze different techniques used in debugging and apply them to an algorithm; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "source": "texas_teks", "sort_order": 18, "teks_uuid": "fd68b5e8-50ed-4ba0-bec8-23d6a1d89ce0" }, { "id": "6c294ee9-8870-4721-85e6-a380d5626ab0", "code": "126.18.c.1.F", "title": "analyze the benefits of using iteration (code and sequence repetition) in algorithms.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "3e9b496f-ecd4-4374-83f1-9a352ca82a43", "source": "texas_teks", "sort_order": 19, "teks_uuid": "e85836c5-80cd-4174-b347-bbd2cd74e110" }, { "id": "610965fb-b658-465f-b3dd-b34224961ca4", "code": "126.18.c.2.A", "title": "manipulate and rename variables and describe different data types; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "f0b03852-399c-4c71-aa2b-4b8c795245c4", "source": "texas_teks", "sort_order": 20, "teks_uuid": "093639ce-153d-49f1-b9d9-8fe9dc907e3f" }, { "id": "88833b1a-a7b9-4b32-a31a-52bb80c81432", "code": "126.18.c.2.B", "title": "use a software design process to create text-based programs with nested loops that address different subproblems within a real-world context.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "f0b03852-399c-4c71-aa2b-4b8c795245c4", "source": "texas_teks", "sort_order": 21, "teks_uuid": "a53808d9-2933-4f0d-b631-00c5578b3096" }, { "id": "b8fbede0-a62e-49cd-9ca6-893a261538a2", "code": "126.18.c.3.A", "title": "resolve challenges in design processes independently using goal setting and personal character traits such as demonstrating responsibility and advocating for self appropriately;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "64d6b1c5-56ad-47d8-924e-0399f23c6737", "source": "texas_teks", "sort_order": 22, "teks_uuid": "1345a161-656f-4c89-98b4-3d0a73b3997a" }, { "id": "edf54593-f43b-459a-8c8d-ecfa0cd4d843", "code": "126.18.c.3.B", "title": "discuss and implement a design process that includes planning and selecting digital tools to develop and refine a prototype or model through trial and error; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "64d6b1c5-56ad-47d8-924e-0399f23c6737", "source": "texas_teks", "sort_order": 23, "teks_uuid": "38ab8b19-c4b0-446d-8840-55c90093a0d7" }, { "id": "3c7e2245-9982-4c0c-bd08-eb0ecbd8804b", "code": "126.18.c.3.C", "title": "identify how the design process is used in various industries.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "64d6b1c5-56ad-47d8-924e-0399f23c6737", "source": "texas_teks", "sort_order": 24, "teks_uuid": "300e831e-6b0a-4954-b3e4-febdc8702554" }, { "id": "861289b1-c20e-4cd7-80d3-0b7c3aa0f615", "code": "126.18.c.4.A", "title": "explain how changes in technology throughout history have impacted various areas of study;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "9a881f20-a0d1-4820-a758-6dc354fbbe45", "source": "texas_teks", "sort_order": 25, "teks_uuid": "3504e850-c3af-41e3-a25e-fd0c6dc8dba0" }, { "id": "40ea2f01-4ee5-4094-a2fb-c43da83f3cae", "code": "126.18.c.4.B", "title": "explain how global trends impact the development of technology; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "9a881f20-a0d1-4820-a758-6dc354fbbe45", "source": "texas_teks", "sort_order": 26, "teks_uuid": "7c868f69-5e48-4ae9-aaa8-0c20c4884c7d" }, { "id": "02cc11cd-0e6b-48eb-b355-53670b10b7ed", "code": "126.18.c.4.C", "title": "transfer current knowledge to the learning of newly encountered technologies.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "9a881f20-a0d1-4820-a758-6dc354fbbe45", "source": "texas_teks", "sort_order": 27, "teks_uuid": "b65f4d12-e713-40cb-8c13-f4499f7d772d" }, { "id": "0d848944-94dc-4d9d-bd61-c42cb5522736", "code": "126.18.c.5.A", "title": "demonstrate how data can be represented in a binary number systems; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "da1f2a9a-e220-421d-b1b5-68a5c7f63e0e", "source": "texas_teks", "sort_order": 28, "teks_uuid": "1cdd7e0a-1a01-47bd-a730-2a7e5dd7f100" }, { "id": "45668a0f-ec4c-4c13-9d47-01018bf6070d", "code": "126.18.c.5.B", "title": "evaluate advanced search strategies, including keywords, Boolean operators, and limiters.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "da1f2a9a-e220-421d-b1b5-68a5c7f63e0e", "source": "texas_teks", "sort_order": 29, "teks_uuid": "3d4a157c-d875-4521-b886-b922230add31" }, { "id": "a677912d-0834-4375-a4ae-aa5c68fcbda8", "code": "126.18.c.8.A", "title": "classify actions as having a positive or negative effect on a digital footprint;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "f638d452-0a10-41fc-9779-f5a13ff0bd21", "source": "texas_teks", "sort_order": 30, "teks_uuid": "c3973e3a-a654-401f-9529-468470def75a" }, { "id": "e667fb1d-1e34-4017-80a2-a6cd053b1889", "code": "126.18.c.8.B", "title": "create and revise formal and informal communications using a feedback process and appropriate digital etiquette; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "f638d452-0a10-41fc-9779-f5a13ff0bd21", "source": "texas_teks", "sort_order": 31, "teks_uuid": "cf000594-9394-442a-a08b-a06d230f3c74" }, { "id": "d5322476-6a35-4445-a8c9-d9c494fe7df5", "code": "126.18.c.8.C", "title": "collaborate on digital platforms such as recording a video conference presentation using appropriate formal and informal digital etiquette.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "f638d452-0a10-41fc-9779-f5a13ff0bd21", "source": "texas_teks", "sort_order": 32, "teks_uuid": "0c93b9a0-4ee0-4ba7-988f-713f443ed59b" }, { "id": "58b34a62-12d0-4c20-aeee-1af32f895030", "code": "126.18.c.9.A", "title": "adhere to local acceptable use policy (AUP) and practice and model safe, ethical, and positive online behaviors;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "c4e4ddae-0e9e-47b9-9665-2bfc796d8530", "source": "texas_teks", "sort_order": 33, "teks_uuid": "16ba2d13-4af0-4c39-9d8d-42ffa2554be5" }, { "id": "6443b167-4165-451e-92b4-eddd2efc75b4", "code": "126.18.c.9.B", "title": "explain the importance of intellectual property laws, including the benefits of protection for content owners, and the consequences of violating these laws;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "c4e4ddae-0e9e-47b9-9665-2bfc796d8530", "source": "texas_teks", "sort_order": 34, "teks_uuid": "296a691d-1e81-4f0e-b6f2-d11410601dbb" }, { "id": "1f06a764-1809-47aa-8768-482648e524c2", "code": "126.18.c.9.C", "title": "create citations and cite sources for a variety of digital forms of intellectual property; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "c4e4ddae-0e9e-47b9-9665-2bfc796d8530", "source": "texas_teks", "sort_order": 35, "teks_uuid": "eac145ad-103b-4fc7-b209-d57032f061fc" }, { "id": "e049f808-254c-447f-9c98-b96f64212984", "code": "126.18.c.9.D", "title": "evaluate how various types of media, including social media, and technology can be used to exaggerate and misrepresent information.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "c4e4ddae-0e9e-47b9-9665-2bfc796d8530", "source": "texas_teks", "sort_order": 36, "teks_uuid": "afcd7992-b4cb-4739-92c2-103f2ee757a2" }, { "id": "513174c7-8c4d-43d4-9196-93ca3722fc63", "code": "126.18.c.10.A", "title": "describe and model ways to protect oneself from real-world cybersecurity attacks; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "e79fc345-e29e-4b22-bffe-ad42d7c26d76", "source": "texas_teks", "sort_order": 37, "teks_uuid": "63ac4f62-103e-42fa-976b-bbfaa3676a89" }, { "id": "7458fba9-164c-4e22-8186-33c1b55eb337", "code": "126.18.c.10.B", "title": "analyze the negative impacts of cyberbullying on the victim and the bully.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "e79fc345-e29e-4b22-bffe-ad42d7c26d76", "source": "texas_teks", "sort_order": 38, "teks_uuid": "dfc4e164-7814-47b0-bd59-93ac86e40f07" }, { "id": "c9ab6a52-d930-4f83-9738-109052142724", "code": "126.18.c.12.A", "title": "demonstrate proficiency in the appropriate use of technology terminology in projects through team collaboration and communication;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 39, "teks_uuid": "7abd00d1-730c-4691-84ef-346d7619b7d6" }, { "id": "cc51216e-76bf-402c-ac2a-18edd790425e", "code": "126.18.c.12.B", "title": "demonstrate effective file management strategies such as file naming conventions, local and remote locations, backup, hierarchy, folder structure, file conversion, tags, and emerging digital organizational strategies with assistance;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 40, "teks_uuid": "68981fa1-e0df-4275-a2a4-ad51c717a492" }, { "id": "7b21efc7-4b85-4a3d-b0d2-fbf58e8dcd1b", "code": "126.18.c.12.C", "title": "select and use appropriate platform and tools, including selecting and using software or hardware for a defined task;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 41, "teks_uuid": "805dffe5-a0e5-45be-b133-c087d483bc48" }, { "id": "137acf39-0f19-4e8f-bd0d-afbf49684e2c", "code": "126.18.c.12.D", "title": "demonstrate improvement in speed and accuracy as measured by words per minute when applying correct keyboarding techniques;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 42, "teks_uuid": "793358bd-0698-4815-a76d-f1918d397cd2" }, { "id": "3eac3f02-7c84-44b7-ac77-42e98d40eafe", "code": "126.18.c.12.E", "title": "select and use appropriate shortcuts within applications;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 43, "teks_uuid": "7c8f8862-213e-4e01-99e7-91415dbf9ea4" }, { "id": "85134381-2c91-45c5-a9a9-69e069ee5d0d", "code": "126.18.c.12.F", "title": "research and test potential solutions to solve hardware and software problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 44, "teks_uuid": "c9fb8556-5d67-40eb-bbd9-bca3bcf624d7" }, { "id": "fd321328-f13e-4253-99b9-acf733aa48d9", "code": "126.18.c.12.G", "title": "use a variety of types of local and remote data storage to store or share data such as cloud architecture or local server; and", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 45, "teks_uuid": "cb3e732d-73a5-457b-a884-5fb536fc0430" }, { "id": "d81676f9-4458-4e24-a339-c9b967a12212", "code": "126.18.c.12.H", "title": "select and use productivity tools found in spread sheet, word processing, and publication applications to create digital artifacts such as reports, graphs, and charts with increasing complexity.", "description": null, "subject_area": "Technology Applications", "grade_level": "7", "domain": null, "cluster": null, "parent_id": "2ea104f1-5da2-4e63-9993-a883f98fabae", "source": "texas_teks", "sort_order": 46, "teks_uuid": "651a1b6b-f5bd-4fe7-a554-9927ae6789c1" }, { "id": "b00c2be9-d785-471f-a57f-0f12a21235ff", "code": "126.19.c.7", "title": "Data literacy, management, and representation--communicate and publish results. The student creates digital products to communicate data to an audience for an intended purpose. The student is expected to use digital tools to communicate and publish data from a product or process to persuade an intended audience.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "cb6bcb37-aef7-4ab7-9584-a03cbfada4ac", "source": "texas_teks", "sort_order": 13, "teks_uuid": "7ba22d74-3d52-4e26-a089-201ca0ca1090" }, { "id": "3fbcbbd4-1966-4d9d-8b52-6de9ad79f793", "code": "126.19.c.1.A", "title": "decompose real-world problems into structured parts using pseudocode;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "source": "texas_teks", "sort_order": 14, "teks_uuid": "72e7ec03-030e-488e-af4b-283a5e71c473" }, { "id": "869519d8-e5a7-457b-a6c5-af53dafd2dd5", "code": "126.19.c.1.B", "title": "analyze the patterns and sequences found in pseudocode and identify its variables;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "source": "texas_teks", "sort_order": 15, "teks_uuid": "092c14e0-ba53-45f0-8f24-9611a9c7ab37" }, { "id": "88ee7037-279d-4b87-9581-4d2700e4eb72", "code": "126.19.c.1.C", "title": "practice abstraction by developing a generalized algorithm that can solve different types of problems;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "source": "texas_teks", "sort_order": 16, "teks_uuid": "71860217-ab13-4bee-81a3-12f9f8f1c0dd" }, { "id": "1dcb0ac6-d6cb-4366-805c-7e4673099e08", "code": "126.19.c.1.D", "title": "design a plan collaboratively using pseudocode to document a problem, possible solutions, and an expected timeline for the development of a coded solution;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "source": "texas_teks", "sort_order": 17, "teks_uuid": "23a969ec-13d7-4bcf-892b-4c998363c360" }, { "id": "2ffc994f-651d-4a15-80c7-0f1492245d5a", "code": "126.19.c.1.E", "title": "develop, compare, and improve algorithms for a specific task to solve a problem; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "source": "texas_teks", "sort_order": 18, "teks_uuid": "ceccef7b-ff3a-4c71-b7fa-117fc66783db" }, { "id": "f99b5cf7-1000-4ed3-a815-08ddbc559050", "code": "126.19.c.1.F", "title": "analyze the benefits of using iteration (code and sequence repetition) in algorithms.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4f900fb6-fd48-4ef7-8557-23d8be6f66d5", "source": "texas_teks", "sort_order": 19, "teks_uuid": "c059c8aa-b459-4e08-a1b0-9191895da529" }, { "id": "bc45ec9e-2326-431f-8270-3543a3d9fcd5", "code": "126.19.c.2.A", "title": "construct named variables with multiple data types and perform operations on their values; ", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "7ecef2f1-62f0-4bd0-a482-a9c9b01e1692", "source": "texas_teks", "sort_order": 20, "teks_uuid": "e807d2b0-bca2-4b38-8a8b-672aa2f2465c" }, { "id": "a201c53c-6ba1-437b-95ab-b65f9f62e0e3", "code": "126.19.c.2.B", "title": "use a software design process to create text-based programs with nested loops that address different subproblems within a real-world context; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "7ecef2f1-62f0-4bd0-a482-a9c9b01e1692", "source": "texas_teks", "sort_order": 21, "teks_uuid": "b7bf6079-7264-427b-9133-cc9db047b488" }, { "id": "fc6f9a6a-ae71-4c2a-a16d-a57f47f54de3", "code": "126.19.c.2.C", "title": "modify and implement previously written code to develop improved programs.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "7ecef2f1-62f0-4bd0-a482-a9c9b01e1692", "source": "texas_teks", "sort_order": 22, "teks_uuid": "7ca0bcba-94d8-4561-b767-31f8ff7b8cc6" }, { "id": "09183972-d843-425b-93dd-f2a945053416", "code": "126.19.c.3.A", "title": "demonstrate innovation in a design process using goal setting and personal character traits, including demonstrating calculated risk-taking and tolerance;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "166b8434-7995-4c76-a51f-7c0445757eed", "source": "texas_teks", "sort_order": 23, "teks_uuid": "d6828772-68d1-404e-aeb1-2f46bd3850c6" }, { "id": "bfbb16e5-425e-4715-a53c-98db461ceb67", "code": "126.19.c.3.B", "title": "discuss and implement a design process that includes planning, selecting digital tools to develop, test, and evaluate design limitations, and refining a prototype or model; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "166b8434-7995-4c76-a51f-7c0445757eed", "source": "texas_teks", "sort_order": 24, "teks_uuid": "e575cc0c-87f9-4213-a3b1-f41f4b3f7091" }, { "id": "5c705cfc-673e-446b-821e-c1645c10c8fa", "code": "126.19.c.3.C", "title": "identify how the design process is used in various industries.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "166b8434-7995-4c76-a51f-7c0445757eed", "source": "texas_teks", "sort_order": 25, "teks_uuid": "f7af9b89-74e3-4a81-90b7-c4da21046b2d" }, { "id": "fa9d6c9f-13aa-4a43-9b69-7f58df114a2a", "code": "126.19.c.4.A", "title": "evaluate how changes in technology throughout history have impacted various areas of study;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4d059e94-06cb-43ed-9945-42eacc25092c", "source": "texas_teks", "sort_order": 26, "teks_uuid": "6712c1b1-6b73-4015-913d-58a40c437e97" }, { "id": "0b7772a7-6046-4795-9654-13e35d3dd510", "code": "126.19.c.4.B", "title": "evaluate and predict how global trends impact the development of technology; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4d059e94-06cb-43ed-9945-42eacc25092c", "source": "texas_teks", "sort_order": 27, "teks_uuid": "9d24884b-f581-45a4-88bc-ae074074d9b6" }, { "id": "95f1e21a-65d4-4505-92c3-870f8708808a", "code": "126.19.c.4.C", "title": "transfer current knowledge to the learning of newly encountered technologies.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "4d059e94-06cb-43ed-9945-42eacc25092c", "source": "texas_teks", "sort_order": 28, "teks_uuid": "560710c0-d5f4-4f4e-ac61-b74b276eedb7" }, { "id": "13434059-86d7-48d6-9d43-2b1cbebd3fd0", "code": "126.19.c.5.A", "title": "compare and contrast data types, including binary, integers, real numbers, Boolean data, and text-based representations; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "bc8bdaa3-7d30-489b-bdb9-47c3af7ce17c", "source": "texas_teks", "sort_order": 29, "teks_uuid": "a7baf337-4740-4b6d-9c77-33cd80119061" }, { "id": "2bdacb25-7525-4923-a0e6-1fe3bda90d4a", "code": "126.19.c.5.B", "title": "apply appropriate search strategies, including keywords, Boolean operators, and limiters, to achieve a specified outcome that includes a variety of file formats.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "bc8bdaa3-7d30-489b-bdb9-47c3af7ce17c", "source": "texas_teks", "sort_order": 30, "teks_uuid": "51d0896c-b234-425a-8f73-6fcf96c40320" }, { "id": "e85ec937-3cce-4beb-a564-c2bb22873fea", "code": "126.19.c.8.A", "title": "analyze the importance of managing a digital footprint and how a digital footprint can affect the future;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "57f5310c-bf13-4f75-853c-440b3bb38efd", "source": "texas_teks", "sort_order": 31, "teks_uuid": "204c1df6-8719-40fc-87ef-2caa0e788fc9" }, { "id": "64fffde4-5aa0-4991-b2d4-3f4b07eb2583", "code": "126.19.c.8.B", "title": "create and publish a formal digital communication for a global audience using appropriate digital etiquette; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "57f5310c-bf13-4f75-853c-440b3bb38efd", "source": "texas_teks", "sort_order": 32, "teks_uuid": "23d0d4bb-97ad-4325-9e38-39c1552ac345" }, { "id": "c677c322-3516-4c91-9d76-c07e57ef3477", "code": "126.19.c.8.C", "title": "collaborate and publish for a global audience on digital platforms such as recording and editing videos using appropriate formal and informal digital etiquette.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "57f5310c-bf13-4f75-853c-440b3bb38efd", "source": "texas_teks", "sort_order": 33, "teks_uuid": "62dfca2a-810d-4303-93b0-07a546ee5a4f" }, { "id": "7a523580-a5ff-476b-a103-cdfa67c201c1", "code": "126.19.c.9.A", "title": "adhere to local acceptable use policy (AUP) and practice and advocate for safe, ethical, and positive online behaviors;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "b2724131-a440-4570-908e-922832207e77", "source": "texas_teks", "sort_order": 34, "teks_uuid": "a9150b4d-b0cb-4d01-befd-6284c3c97be3" }, { "id": "912c6639-0de8-4553-902d-ef449f427106", "code": "126.19.c.9.B", "title": "adhere to appropriate intellectual property law when creating digital products;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "b2724131-a440-4570-908e-922832207e77", "source": "texas_teks", "sort_order": 35, "teks_uuid": "3a057eb1-2960-4773-9388-4b6218441bf4" }, { "id": "e2b5b25d-ab75-46d2-a29b-669782e15233", "code": "126.19.c.9.C", "title": "create citations and cite sources for a variety of digital forms of intellectual property; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "b2724131-a440-4570-908e-922832207e77", "source": "texas_teks", "sort_order": 36, "teks_uuid": "39b8f55a-1425-4ccd-a652-2af6402c1644" }, { "id": "fb8963db-7725-417b-832e-62fb019e5a07", "code": "126.19.c.9.D", "title": "evaluate the bias of digital information sources, including websites.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "b2724131-a440-4570-908e-922832207e77", "source": "texas_teks", "sort_order": 37, "teks_uuid": "6682b4f6-c9e3-4173-b889-1cc385c22e0f" }, { "id": "3c8c903b-0348-480f-bea4-c93b3ba53e4c", "code": "126.19.c.10.A", "title": "analyze real-world scenarios to identify cybersecurity threats and propose ways to prevent harm; and ", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "c35757bb-b41e-4e31-a6fe-06b494a9534a", "source": "texas_teks", "sort_order": 38, "teks_uuid": "914241b4-e641-45a4-a0fa-e6b9ee87dd2a" }, { "id": "42d96934-d29f-4264-91e4-8ccb5775be7c", "code": "126.19.c.10.B", "title": "evaluate scenarios or case studies to identify warning signs of a cyberbullying victim such as withdrawal or lack of sleep and predict the outcomes for both the victim and the bully.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "c35757bb-b41e-4e31-a6fe-06b494a9534a", "source": "texas_teks", "sort_order": 39, "teks_uuid": "e8bddc3e-895d-4ee4-b375-94e9890b5ff5" }, { "id": "cac5ba0f-9769-4166-837e-799d973c268b", "code": "126.19.c.11.A", "title": "combine various file formats for a specific project or audience; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "088b089f-d432-4831-aca2-57e2051fbbee", "source": "texas_teks", "sort_order": 40, "teks_uuid": "e3f1577b-baa6-49df-ace5-71f85a266b73" }, { "id": "98d985f9-ed10-4e60-a6d6-f3097524fa4e", "code": "126.19.c.11.B", "title": "share and seek feedback on files in various formats, including text, raster and vector graphics, video, and audio files.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "088b089f-d432-4831-aca2-57e2051fbbee", "source": "texas_teks", "sort_order": 41, "teks_uuid": "594fe8fe-25e3-4e29-ab38-ff3629c2b67f" }, { "id": "cb81c12e-7cb7-4080-9df0-37880544e4dc", "code": "126.19.c.12.A", "title": "integrate use of appropriate technology terminology in scholarly inquiry and dialogue such as classroom discussion and written samples;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 42, "teks_uuid": "b646c908-e86d-4141-8e7a-9b8a903a494d" }, { "id": "7f384844-c25d-45d0-8d6e-e42742f88cf1", "code": "126.19.c.12.B", "title": "implement effective file management strategies independently, including file naming conventions, local and remote locations, backup, hierarchy, folder structure, file conversion, tags, and emerging digital organizational strategies;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 43, "teks_uuid": "442fb70e-7887-4f2e-9ee5-cbaf3c0f3359" }, { "id": "87b7ff88-7b95-4545-a6c1-60c73f02672f", "code": "126.19.c.12.C", "title": "select and use appropriate platform and tools, including selecting and using software or hardware to transfer data;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 44, "teks_uuid": "04954507-143e-4420-9250-81aa6d426aef" }, { "id": "1bf29305-3fac-4502-97b4-e8da9b869918", "code": "126.19.c.12.D", "title": "demonstrate improvement in speed and accuracy as measured by words per minute when applying correct keyboarding techniques;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 45, "teks_uuid": "42adf55f-64bc-4253-867e-b0941bde62e9" }, { "id": "8fe25648-9d79-422b-99cb-6c81a29a4ded", "code": "126.19.c.12.E", "title": "select and use appropriate shortcuts within applications;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 46, "teks_uuid": "72a4d250-d7f4-432b-b524-a1858634aa97" }, { "id": "70f10b31-99c2-4429-ac2a-a22f5d0b5906", "code": "126.19.c.12.F", "title": "apply appropriate troubleshooting techniques and seek technical assistance as needed;", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 47, "teks_uuid": "d987a6dd-a3f6-46e6-9bf0-11928a57f73e" }, { "id": "2a6f2fbf-29a2-4e47-96b8-46a3236fa319", "code": "126.19.c.12.G", "title": "compare types of local and remote data storage such as cloud architecture or local server and select the appropriate type of storage to store and share data; and", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 48, "teks_uuid": "6cf3cdbe-1674-4734-86f3-d3a2e606bae5" }, { "id": "6a40df02-6dfd-4eac-a034-fde182b35f04", "code": "126.19.c.12.H", "title": "select and use productivity tools found in spread sheet, word processing, and publication applications to create digital artifacts, including reports, graphs, and charts, with increasing complexity.", "description": null, "subject_area": "Technology Applications", "grade_level": "8", "domain": null, "cluster": null, "parent_id": "56c83e8e-da39-43c1-aef3-5e3c5cb13226", "source": "texas_teks", "sort_order": 49, "teks_uuid": "0b2296e7-38ea-451d-b036-8b43fe98780e" } ]