Skip to main content
Home

Main navigation

  • TEKS Guide
  • TEKS
  • About
    • Texas Gateway
    • TEKS Guide
  • More
    • News
    • Help Center
    • Contact
  • Quick Links
    • Restorative Discipline Practices in Texas
    • Flashing Lights Senate Bill 30
Search

User account menu

  • Log In
  • Sign Up
Translate
Back to TEKS search
  • Technology Applications
  • Grade 8
  • Digital citizenship

Technology Applications.8.10.A

Previous Next
The student is expected to analyze real-world scenarios to identify cybersecurity threats and propose ways to prevent harm; and

A student expectation is directly related to the knowledge and skills statement, is more specific about how students demonstrate their learning, and always begins with a verb. Student expectations are further broken down into their component parts, often referred to as “breakouts.”

  • Overview
  • Alignments
  • Resources

TECHNOLOGY APPLICATIONS.8.10.A — Vertical Alignment

Vertical alignment shows student expectations in the same subject area at different grade levels that are related to or build upon one another.

Previous grade
TA.K.7.A
identify ways to keep a user account safe, including not sharing login information and logging off accounts and devices; and
TA.1.8.A
identify ways to keep a user account safe, including not sharing login information and logging off accounts and devices;
TA.2.9.A
demonstrate account safety, including creating a strong password and logging off accounts and devices;
TA.3.10.A
demonstrate account safety, including creating a strong password and logging off accounts and devices;
TA.4.10.A
demonstrate account safety, including creating a strong password and logging off devices, and explain the importance of these practices;
TA.5.10.A
discuss cybersecurity strategies such as using a secured internet connection to protect digital information;
TA.6.10.A
identify real-world cybersecurity problems such as phishing, malware, password attacks, identity theft, and hacking; and
TA.7.10.A
describe and model ways to protect oneself from real-world cybersecurity attacks; and
TA.8.10.A
analyze real-world scenarios to identify cybersecurity threats and propose ways to prevent harm; and

TECHNOLOGY APPLICATIONS.8.10.A — Breakout of skills

Breakouts are the component parts that make up a student expectation. A breakout shows a distinct concept a student should know or a distinct skill that a student should be able to demonstrate.

The student is expected to
analyze real-world scenarios
to identify cybersecurity threats
to propose ways to prevent harm

Cross-curricular Connections

The cross-curricular connections are designed to help educators make content connections between the technology applications TEKS and other subject areas. The standards below illustrate alignment between grade level content areas which may help educators develop cross-curricular lessons. These connections do not represent all possible connections that might be made.
Expand All
Health

Health.8.13.C evaluate strategies and techniques for identity protection in digital and online environments

Gateway footer

  • About
  • Help Center
  • Contact
  • Accessibility
  • Privacy Policy
  • Terms of Service

Footer One

  • Compact with Texans
  • Encrypted Email
  • Fraud Hotline
  • Complaints
  • Public Information Requests

Footer Two

  • Frequently Asked Questions
  • ESCs
  • State of Texas
  • Texas Legislature
  • Homeland Security

Footer Three

  • Trail
  • Military Families
  • Where Our Money Goes
  • Equal Educational Opportunity
  • Governor's Committee on People with Disabilities
TEA logo
1701 N. Congress Avenue
Austin, Texas, 78701
(512) 463-9734
© 2007-2025 Texas Education Agency (TEA). All Rights Reserved.
Feedback