Standards in this Framework
Standard | Description |
---|---|
CSK8.G5.1.1 | Identify and utilize level-appropriate, algorithmic problem-solving strategies |
CSK8.G6.1.1 | Identify and utilize level-appropriate, algorithmic problem-solving strategies |
CSK8.G7.1.1 | Identify and utilize level-appropriate, algorithmic problem-solving strategies |
CSK8.G8.1.1 | Identify and utilize level-appropriate, algorithmic problem-solving strategies |
CSK8.G5.1.2 | Examine visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity |
CSK8.G6.1.2 | Utilize visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity |
CSK8.G7.1.2 | Utilize visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity |
CSK8.G8.1.2 | Utilize visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity |
CSK8.G5.1.3 | Evaluate effective ways that collaboration can support problem solving and innovation |
CSK8.G6.1.3 | Analyze appropriate collaborative behaviors (e.g., accepting multiple perspectives, integrating feedback, providing useful feedback, understanding and using socialization) to solve problems |
CSK8.G7.1.3 | Analyze appropriate collaborative behaviors (e.g., accepting multiple perspectives, integrating feedback, providing useful feedback, understanding and using socialization) to solve problems |
CSK8.G8.1.3 | Analyze appropriate collaborative behaviors (e.g., accepting multiple perspectives, integrating feedback, providing useful feedback, understanding and using socialization) to solve problems |
CSK8.G5.1.4 | Apply strategies for solving simple hardware and software problems that may occur during use |
CSK8.G6.1.4 | Apply strategies for solving simple hardware and software problems that may occur during use |
CSK8.G7.1.4 | Apply strategies for identifying and solving routine hardware and software problems that occur during everyday computer use |
CSK8.G8.1.4 | Apply strategies for identifying and solving routine hardware and software problems that occur in everyday computer use |
CSK8.G6.2.1 | Describe subsets of a sample set identifying unions, intersections, and complements (e.g., describing information sorted with a Venn diagram) |
CSK8.G7.2.1 | Create compound statements that represent unions, intersections, and complements using OR, AND, and NOT (e.g., writing statements from information sorted with a Venn diagram) |
CSK8.G8.2.1 | Create subsets of a sample set by using logic (e.g., OR, AND, NOT, XOR) |
CSK8.G6.2.2 | Explore how variables are used to represent data |
CSK8.G7.2.2 | Utilize variables to construct expressions and equations |
CSK8.G8.2.2 | Utilize variables in the creation of functions, methods, or similar constructs |
CSK8.G5.2.3 | Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, block-based programming, treasure maps) |
CSK8.G6.2.3 | Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, block-based programming, treasure maps) |
CSK8.G7.2.3 | Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, block-based programming, treasure maps) |
CSK8.G8.2.3 | Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, text-based programming, treasure maps) |
CSK8.G6.2.4 | Discuss binary numbers, logic, sets, and functions and their application to computer science |
CSK8.G7.2.4 | Examine binary numbers, logic, sets, and functions and their application to computer science |
CSK8.G8.2.4 | Evaluate the relationship between binary and hexadecimal representations |
CSK8.G5.3.1 | Illustrate how different kinds of data can be represented |
CSK8.G6.3.1 | Represent a variety of data in multiple formats |
CSK8.G7.3.1 | Evaluate the effectiveness of visual representations of data |
CSK8.G8.3.1 | Create and analyze data representations of various artifacts |
CSK8.G5.3.2 | Recognize that binary can represent data using only two options (e.g., on/off) |
CSK8.G6.3.2 | Discuss how and why binary can represent data in a computer |
CSK8.G7.3.2 | Discuss how American Standard Code for Information Interchange (ASCII) codes represent data in a computer |
CSK8.G8.3.2 | Discuss how and why hexadecimal codes are used to represent data in a computer |
CSK8.G5.3.3 | Explore various models and simulations (e.g., ecosystems, epidemics) to support research and data analysis |
CSK8.G6.3.3 | Compare problems that can be solved using models and simulations that utilize data analysis |
CSK8.G7.3.3 | Evaluate the effectiveness of models and simulations for problem solving and analyze data |
CSK8.G8.3.3 | Analyze the degree to which a computer model accurately represents an actual situation |
CSK8.G5.3.4 | Identify the characteristics (e.g., collection environment, input method, units of measure) of the collected data |
CSK8.G6.3.4 | Describe the characteristics (e.g., collection environment, input method, units of measure) of the collected data |
CSK8.G7.3.4 | Analyze the quality of collected data based on its characteristics (e.g., temperatures gathered at different scale) to determine the value provided to the user |
CSK8.G8.3.4 | Collect data to be used for quality analysis |
CSK8.G5.3.5 | Evaluate, select, and use level-appropriate tools to collect data |
CSK8.G6.3.5 | Collect and analyze data using a variety of level-appropriate tools (e.g., analog, digital) |
CSK8.G7.3.5 | Collect and analyze data from multiple sources using a variety of level-appropriate tools (e.g., analog, digital) |
CSK8.G8.3.5 | Collect and analyze data from multiple sources using a variety of level-appropriate tools (e.g., analog, digital) |
CSK8.G5.3.6 | Evaluate the most effective ways to arrange, collect, and visually represent data |
CSK8.G6.3.6 | Evaluate the most effective ways to arrange, collect, and visually represent data |
CSK8.G7.3.6 | Evaluate the most effective ways to arrange, collect, and visually represent data |
CSK8.G8.3.6 | Evaluate the most effective ways to arrange, collect, and visually represent data |
CSK8.G5.4.1 | Identify real-world cybersecurity problems (e.g., malicious hacking) and apply strategies for protecting and securing personal digital information |
CSK8.G6.4.1 | Identify real-world cybersecurity problems (e.g., malicious hacking) as they relate to personal cybersecurity, and how to apply strategies for protecting and securing personal digital information |
CSK8.G7.4.1 | Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity and how to apply digital and physical methods for protecting and securing personal information |
CSK8.G8.4.1 | Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity and how to apply digital and physical methods for protecting and securing personal information |
CSK8.G5.4.2 | Discuss issues related to the use of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use |
CSK8.G6.4.2 | Discuss the difference between appropriate, legal, and ethical uses of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use |
CSK8.G7.4.2 | Demonstrate an understanding between appropriate, legal, and ethical uses of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use |
CSK8.G8.4.2 | Analyze the difference between appropriate, legal, and ethical uses of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use |
CSK8.G5.4.3 | Identify individual digital footprint (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world |
CSK8.G6.4.3 | Apply strategies to protect personal digital footprints (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world |
CSK8.G7.4.3 | Apply strategies to protect personal digital footprints (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world |
CSK8.G8.4.3 | Apply strategies to protect personal digital footprints (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world |
CSK8.G5.5.1 | Create algorithms to solve problems and evaluate effectiveness |
CSK8.G6.5.1 | Create algorithms to solve problems and evaluate effectiveness |
CSK8.G7.5.1 | Create algorithms using constraints to solve problems and evaluate effectiveness |
CSK8.G8.5.1 | Create algorithms using constraints to solve problems and evaluate effectiveness |
CSK8.G5.5.2 | Design and test algorithms collaboratively using technology |
CSK8.G6.5.2 | Design and test algorithms collaboratively using technology |
CSK8.G7.5.2 | Design and test algorithms collaboratively using technology |
CSK8.G8.5.2 | Design and test algorithms collaboratively using technology |
CSK8.G5.5.3 | Compare and refine algorithms |
CSK8.G6.5.3 | Compare and refine algorithms |
CSK8.G7.5.3 | Compare and refine algorithms |
CSK8.G8.5.3 | Compare and refine algorithms |
CSK8.G5.5.4 | Identify and correct multiple errors within a level-appropriate algorithm |
CSK8.G6.5.4 | Identify and correct multiple errors within a level-appropriate algorithm |
CSK8.G7.5.4 | Identify and correct multiple errors within a level-appropriate algorithm |
CSK8.G8.5.4 | Identify and correct multiple errors within a level-appropriate algorithm |
CSK8.G5.6.1 | Use a visual block-based or text-based programming language individually and collaboratively to solve level-appropriate problems |
CSK8.G6.6.1 | Use a visual block-based or text-based programming language individually and collaboratively to solve level-appropriate problems |
CSK8.G7.6.1 | Use a visual block-based or text-based programming language individually and collaboratively to solve level-appropriate problems |
CSK8.G8.6.1 | Create a level-appropriate program individually and collaboratively using a text-based programming language |
CSK8.G5.6.2 | Discuss and apply best practices of documentation (e.g., comments, descriptive variable names, program headers) |
CSK8.G6.6.2 | Discuss and apply best practices of documentation (e.g., comments, descriptive variable names, program headers) |
CSK8.G7.6.2 | Utilize best practices of documentation (e.g., comments, descriptive variable names, program headers) |
CSK8.G8.6.2 | Utilize best practices of documentation (e.g., comments, descriptive variable names, program headers) |
CSK8.G5.6.3 | Improve or remix existing block-based and/or text-based programs |
CSK8.G6.6.3 | Improve or remix existing block-based and/or text-based programs |
CSK8.G7.6.3 | Improve or remix existing block-based and/or text-based programs |
CSK8.G8.6.3 | Improve or remix existing text-based programs |
CSK8.G5.7.1 | Discuss ways that humans create input for a desired output through a device (e.g., changing device settings, texting) |
CSK8.G6.7.1 | Identify what distinguishes humans from machines, including focusing on human intelligence versus machine intelligence (e.g., computer vision, language understanding, robot motion, speech) |
CSK8.G7.7.1 | Describe ways in which computers use models of intelligent behavior (e.g., computer vision, language understanding, robot motion, speech) |
CSK8.G8.7.1 | Compare and contrast human intelligence and computer intelligence (e.g., common sense, emotional decisions, literal versus abstract) |
CSK8.G5.7.2 | Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment |
CSK8.G6.7.2 | Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment |
CSK8.G7.7.2 | Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment |
CSK8.G8.7.2 | Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment |
CSK8.G5.8.1 | Describe how information can be transmitted using computing devices via a network |
CSK8.G6.8.1 | Describe how information can be transmitted using computing devices via a network |
CSK8.G7.8.1 | Identify major components and functions of computer systems and networks |
CSK8.G8.8.1 | Describe major components and functions of computer systems and networks |
CSK8.G5.8.2 | Demonstrate touch typing techniques while increasing speed and maintaining accuracy |
CSK8.G6.8.2 | Demonstrate touch typing techniques while increasing speed and maintaining accuracy |
CSK8.G7.8.2 | Demonstrate touch typing techniques while increasing speed and maintaining accuracy |
CSK8.G8.8.2 | Demonstrate touch typing techniques while increasing speed and maintaining accuracy |
CSK8.G5.8.3 | Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture |
CSK8.G6.8.3 | Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture |
CSK8.G7.8.3 | Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture |
CSK8.G8.8.3 | Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture |
CSK8.G7.9.1 | Compare and contrast examples of high-level and low-level programming languages |
CSK8.G8.9.1 | Research the hierarchy in computing including high-level languages, instruction sets, logic circuits, and translations |
CSK8.G5.9.2 | Demonstrate level-appropriate proficiency with keyboards and other input/output devices |
CSK8.G6.9.2 | Demonstrate level-appropriate proficiency with keyboards and other input/output devices |
CSK8.G7.9.2 | Demonstrate level-appropriate proficiency with keyboards and other input/output devices |
CSK8.G8.9.2 | Demonstrate level-appropriate proficiency with keyboards and other input/output devices |
CSK8.G5.9.3 | Use and evaluate productivity technology tools for effectiveness in writing, communication, and publishing activities |
CSK8.G6.9.3 | Apply productivity/multimedia tools to support communication throughout the curriculum |
CSK8.G7.9.3 | Apply productivity/multimedia tools to support communication throughout the curriculum |
CSK8.G8.9.3 | Design, develop, and publish/present products (e.g., podcasts, videos, websites) using technology resources that demonstrate and communicate curriculum concepts |
CSK8.G5.10.1 | Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers |
CSK8.G6.10.1 | Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers |
CSK8.G7.10.1 | Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers |
CSK8.G8.10.1 | Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers |
CSK8.G5.10.2 | Discuss the impact of access to computing resources |
CSK8.G6.10.2 | Demonstrate an understanding of the impact of access to computing resources |
CSK8.G7.10.2 | Demonstrate an understanding of the impact of access to computing resources on a global economy |
CSK8.G8.10.2 | Analyze the impact of the availability to computing resources on accessing critical information |
CSK8.G5.10.3 | Classify different types of relationships (e.g., parents, trusted adults, friends, strangers, anonymous users) and how they affect what information should be shared |
CSK8.G6.10.3 | Identify the potential outcomes of oversharing information with otherwise trusted parties and how to minimize the effects |
CSK8.G7.10.3 | Research and discuss potential outcomes of oversharing information with otherwise trusted parties and how to minimize the effects |
CSK8.G8.10.3 | Research and discuss potential outcomes of oversharing information with otherwise trusted parties and how to minimize the effects |
CSK8.G5.10.4 | Research the history of computers and technology |
CSK8.G6.10.4 | Research the history of computers and technology |
CSK8.G7.10.4 | Research the history of computers and technology |
CSK8.G8.10.4 | Research the history of computers and technology |
CSK8.G5.10.5 | Examine the range and types of careers that require computing and technology |
CSK8.G6.10.5 | Investigate a career that requires computing and technology |
CSK8.G7.10.5 | Describe how computer science enhances other career fields |
CSK8.G8.10.5 | Predict the role of computer science in future careers |
CSK8.G5.10.6 | Explain positive and negative impacts of technology on the daily life of individuals and society |
CSK8.G6.10.6 | Demonstrate an understanding of positive and negative impacts of technology on the daily life of individuals and society |
CSK8.G7.10.6 | Analyze changes in technology through time and the effects those changes have on the daily life of individuals and society |
CSK8.G8.10.6 | Analyze positive and negative impacts of technology on aspects of the world (e.g., culture, economy, education, environment, workforce) |
CSK8.G5.10.7 | Demonstrate an understanding of ethical issues in copyright laws, fair use exemptions, and intellectual property rights in various media |
CSK8.G6.10.7 | Demonstrate ethical uses of copyright laws, fair use exemptions, and intellectual property in various media |
CSK8.G7.10.7 | Demonstrate ethical uses of copyright laws, fair use exemptions, and intellectual property in various media |
CSK8.G8.10.7 | Analyze ethical issues that relate to copyright laws, fair use exemptions, and intellectual property in various media |