Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1A-AP-08
Model daily processes by creating and following algorithms (sets of step-by-step instructions) to complete tasks. |
|
1A-AP-09
Model the way programs store and manipulate data by using numbers or other symbols to represent information. |
|
1A-AP-10
Develop programs with sequences and simple loops, to express ideas or address a problem. |
|
1A-AP-11
Decompose (break down) the steps needed to solve a problem into a precise sequence of instructions. |
|
1A-AP-12
Develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
|
1A-AP-13
Give attribution when using the ideas and creations of others while developing programs. |
|
1A-AP-14
Debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. |
|
1A-AP-15
Using correct terminology, describe steps taken and choices made during the iterative process of program development. |
|
1A-CS-01
Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. |
|
1A-CS-02
Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware). |
|
1A-CS-03
Describe basic hardware and software problems using accurate terminology. |
|
1A-DA-05
Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. |
|
1A-DA-06
Collect and present the same data in various visual formats. |
|
1A-DA-07
Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. |
|
1A-IC-16
Compare how people live and work before and after the implementation or adoption of new computing technology. |
|
1A-IC-17
Work respectfully and responsibly with others online. |
|
1A-IC-18
Keep login information private, and log off of devices appropriately. |
|
1A-NI-04
Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. |
|