K.AP.A.1 |
Model daily processes by creating and following sets of step-by-step instructions (algorithms) to complete tasks. |
Lessons
|
K.AP.PD.1 |
Identify and fix (debug) errors in a sequence of instructions (algorithms) that includes loops. |
Lessons
|
K.CS.HS.1 |
Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware). For example: monitor, keyboard, mouse, earbuds, headphones, printer. |
Lessons
|
K.CS.HS.2 |
Recognize some computing devices (e.g., computer, smartphone) can perform a variety of tasks and some computing devices are specialized (e.g., navigation system, game controller). |
Lessons
|
K.DA.S.1 |
Recognize that data can be collected and stored on different computing devices over time. |
Lessons
|
K.IC.C.1 |
Understand how computing devices have changed people’s lives. |
Lessons
|
K.IC.SI.1 |
Exhibit good digital citizenship using technology safely, responsibly, and ethically. |
Lessons
|
K.NI.C.1 |
Explain that a password helps protect the privacy of information. |
Lessons
|
1.AP.PD.1 |
Describe the iterative process of program development (including terminology, steps taken, and the logic of choices). |
Lessons
|
1.AP.V.1 |
Model the way programs store and manipulate data by using numbers or other symbols to represent information. |
Lessons
|
1.CS.D.1 |
Select and operate appropriate device and software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. |
Lessons
|
1.DA.S.1 |
Recognize that a variety of data (e.g., music, video, images, text) can be stored in and retrieved from a computing device. |
Lessons
|
1.IC.SI.1 |
Work respectfully and responsibly with others online. |
Lessons
|
1.NI.C.1 |
Explain why we keep personal information (e.g., name, location, phone number, home address) private. |
Lessons
|
2.AP.C.1 |
Develop programs with sequences and loops, to express ideas or address a problem. |
Lessons
|
2.AP.M.1 |
Break down (decompose) the steps needed to solve a problem into a precise sequence of instructions. |
Lessons
|
2.AP.PD.1 |
Develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
Lessons
|
2.AP.PD.2 |
Give attribution (credit) when using the ideas and creations of others while developing programs. |
Lessons
|
2.CS.T.1 |
Describe basic hardware and software problems using accurate terminology. |
Lessons
|
2.DA.S.1 |
Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. |
Lessons
|
2.IC.C.1 |
Compare how people live and work before and after the implementation or adoption of new computing technology. |
Lessons
|
2.IC.SLE.1 |
Identify safe and unsafe examples of online communications. |
Lessons
|
2.NI.C.1 |
Explain what passwords are and why we use them; use strong passwords to protect devices and information from unauthorized access. |
Lessons
|
3.AP.PD.1 |
Debug (identify and fix) errors in an algorithm or program that includes sequences and loops. |
Lessons
|
3.AP.PD.2 |
Take on varying roles (e.g., researcher, programmer, test developer, designer, recorder) with teacher guidance, when collaborating with peers during the design, implementation, and review stages of program development. |
Lessons
|
3.AP.V.1 |
Create programs that use variables to store and modify data. |
Lessons
|
3.CS.D.1 |
Describe how internal and external parts of computing devices function to form a system. |
Lessons
|
3.DA.CVT.1 |
Organize and present collected data visually to highlight relationships and support a claim. |
Lessons
|
3.IC.C.1 |
Discuss computing technologies that have changed the world, and express how those technologies influence and are influenced by cultural practices. |
Lessons
|
3.IC.SLE.1 |
Use public domain or creative commons media, and refrain from copying or using material created by others without permission. |
Lessons
|
3.NI.C.1 |
Discuss real-world cybersecurity problems and how personal information can be protected. |
Lessons
|
4.AP.A.1 |
Test, compare, and refine multiple algorithms for the same task and determine which is the most appropriate. |
Lessons
|
4.AP.C.1 |
Develop programs that include sequences, events, loops, and conditionals. |
Lessons
|
4.AP.M.1 |
Explore how complex tasks can be decomposed into simple tasks and how simple tasks can be composed into complex tasks. |
Lessons
|
4.AP.PD.1 |
Test and debug (identify and fix) errors in a program or algorithm to ensure it runs as intended. |
Lessons
|
4.CS.HS.1 |
Model how computer hardware and software work together as a system to accomplish tasks. |
Lessons
|
4.DA.IM.1 |
Use data to highlight or propose cause-and-effect relationships, predict outcomes, or communicate ideas. |
Lessons
|
4.IC.C.1 |
Compare and contrast how computing has changed society from the past to the present. |
Lessons
|
4.NI.NCO.1 |
Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the internet, and reassembled at the destination. |
Lessons
|
5.AP.M.1 |
Demonstrate how to decompose a task of complexity into simple tasks and compose a simple task into tasks of complexity. |
Lessons
|
5.AP.M.2 |
Modify, incorporate, and test portions of an existing program into their own work, to develop something new or add more advanced features. |
Lessons
|
5.AP.PD.1 |
Use the iterative process to develop a program to express an idea or address a problem while considering others’ perspectives and preferences. |
Lessons
|
5.AP.PD.2 |
Describe choices made during program development using code comments, presentations, and demonstrations. |
Lessons
|
5.AP.PD.3 |
Observe intellectual property rights and give appropriate attribution (credit) when creating or remixing programs. |
Lessons
|
5.CS.T.1 |
Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. |
Lessons
|
5.DA.IM.1 |
Recognize how text, images, and sounds are represented as binary numbers in computing devices. |
Lessons
|
5.IC.C.1 |
Brainstorm ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
Lessons
|
5.IC.SI.1 |
Seek diverse perspectives for the purpose of improving computational artifacts. |
Lessons
|
5.NI.NCO.1 |
Explain the concept of network protocols. |
Lessons
|
5.NI.NCO.2 |
Identify the advantages and disadvantages of various network types (e.g., wire, WiFi, cellular data). |
Lessons
|