Standards in this Framework
Standard | Lessons |
---|---|
3-5.CAS.a.1
Describe how to use proper ergonomics (e.g., body position, lighting, positioning of equipment, taking breaks) when using devices. |
|
3-5.CAS.a.2
Describe the threats to safe and efficient use of devices (e.g., SPAM, spyware, phishing, viruses) associated with various forms of technology use (e.g., downloading and executing software programs, following hyperlinks, opening files). |
|
3-5.CAS.a.3
Identify appropriate and inappropriate uses of technology when posting to social media, sending e-mail or texts, and browsing the Internet. |
|
3-5.CAS.a.4
Explain the proper use and operation of security technologies (e.g., passwords, virus protection software, spam filters, popup blockers, cookies). |
|
3-5.CAS.a.5
Describe ways to employ safe practices and avoid the potential risks/dangers associated with various forms of online communications, downloads, linking, Internet purchases, advertisements, and inappropriate content within constrained environments. |
|
3-5.CAS.a.6
Identify different types of cyberbullying (e.g., harassment, flaming, excluding people, outing, and impersonation). |
|
3-5.CAS.a.7
Explain that if you encounter cyberbullying or other inappropriate content, you should immediately tell a responsible adult (e.g., teacher, parent). |
|
3-5.CAS.b.1
Demonstrate responsible use of computers, peripheral devices, and resources as outlined in school rules [Acceptable Use Policy (AUP)]. |
|
3-5.CAS.b.2
Describe the difference between digital artifacts that are open or free and those that are protected by copyright. |
|
3-5.CAS.b.3
Explain the guidelines for the fair use of downloading, sharing, or modifying of digital artifacts. |
|
3-5.CAS.b.4
Describe the purpose of copyright and the possible consequences for inappropriate use of digital artifacts that are protected by copyright. |
|
3-5.CAS.b.5
Explain that laws exist (e.g., Section 508, Telecommunication Act of 1996) that help ensure that people with disabilities can access electronic and information technology. |
|
3-5.CAS.c.1
Explain the different forms of web advertising (e.g., search ads, pay-per-click ads, banner ads, targeted ads, in-game ads, e-mail ads). |
|
3-5.CAS.c.2
Explain why websites, digital resources, and artifacts may include advertisements and collect personal information. |
|
3-5.CAS.c.3
Define the digital divide as unequal access to technology on the basis of differences, such as income, education, age, and geographic location. |
|
3-5.CAS.c.4
Use critical thinking to explain how access to technology helps empower individuals and groups (e.g., gives them access to information, the ability to communicate with others around the world, allows them to buy and sell things). |
|
3-5.CAS.c.5
Identify resources in the community that can give people access to technology (e.g., libraries, community centers, education programs, schools, hardware/software donation programs). |
|
3-5.CAS.c.6
Identify ways in which people with disabilities access and use technology (e.g., audio players and recorders, FM listening systems, magnifiers). |
|
3-5.CAS.c.7
Identify the impact of social media and cyberbullying on individuals, families, and society. |
|
3-5.DTC.a.1
Type five words-per-minute times grade level (e.g., for Grade 5, type 25 words/minute). |
|
3-5.DTC.a.2
Navigate between local, networked, or online/cloud environments and transfer files between each (upload/download). |
|
3-5.DTC.a.3
Use digital tools (local and online) to manipulate and publish multimedia artifacts. |
|
3-5.DTC.b.1
Communicate key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using digital tools and media-rich resources. |
|
3-5.DTC.b.2
Collaborate through online digital tools under teacher supervision. |
|
3-5.DTC.c.1
Identify digital information sources to answer research questions (e.g., online library catalog, online encyclopedias, databases, websites). |
|
3-5.DTC.c.2
Perform searches to locate information using two or more key words and techniques to refine and limit such searches. |
|
3-5.DTC.c.3
Evaluate digital sources for accuracy, relevancy, and appropriateness. |
|
3-5.DTC.c.4
Gather and organize information from digital sources by quoting, paraphrasing, and/or summarizing. |
|
3-5.DTC.c.5
Create an artifact that answers a research question and clearly communicates thoughts and ideas. |
|
3-5.DTC.c.6
Cite text-based sources using a school- or district-adopted format. |
|
3-5.DTC.c.7
Provide basic source information [e.g., Uniform Resource Locator (URL), date accessed] for nontext-based sources (e.g., images, audio, video). |
|
3-5.CS.a.1
Identify a broad range of computing devices (e.g., computers, smart phones, tablets, robots, etextiles) and appropriate uses for them. |
|
3-5.CS.a.2
Describe the function and purpose of various input and output devices (e.g., monitor, keyboard, speakers, controller, probes, sensors, Bluetooth transmitters, synthesizers). |
|
3-5.CS.a.3
Demonstrate an appropriate level of proficiency (connect and record data, print, send command, connect to Internet, search) in using a range of computing devices (e.g., probes, sensors, printers, robots, computers). |
|
3-5.CS.a.4
Identify and solve simple hardware and software problems that may occur during everyday use (e.g., power, connections, application window or toolbar). |
|
3-5.CS.a.5
Describe the differences between hardware and software. |
|
3-5.CS.a.6
Identify and explain that some computing functions are always active (e.g., locations function on smart phones). |
|
3-5.CS.b.1
Compare and contrast human and computer performance on similar tasks (e.g., sorting alphabetically, finding a path across a cluttered room) to understand which is best suited to the task. |
|
3-5.CS.b.2
Explain how hardware and applications [e.g., Global Positioning System (GPS) navigation for driving directions, text-to-speech translation, language translation] can enable everyone, including people with disabilities, to do things they could not do otherwise. |
|
3-5.CS.b.3
Explain advantages and limitations of technology (e.g., a spell-checker can check thousands of words faster than a human could look them up, however, a spell-checker might not know whether ‘underserved’ is correct or if the author’s intent was to type ‘undeserved’). |
|
3-5.CS.c.1
Describe how a network is made up of a variety of components and identify the common components (e.g., links, nodes, networking devices). |
|
3-5.CS.c.2
Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security. |
|
3-5.CS.c.3
Define and explain why devices are numbered/labeled in networks [e.g., the World Wide Web Uniform Resource Locator (URL), the Internet Protocol (IP) address, the Machine Access Code (MAC)]. |
|
3-5.CS.c.4
Recognize that there are many sources of and means for accessing information within a network (e.g., websites, e-mail protocols, search engines) |
|
3-5.CS.d.1
Identify common services (e.g., driving directions apps that access remote map services, digital personal assistants that access remote information services). |
|
3-5.CT.a.1
Use numbers or letters to represent information in another form (e.g., secret codes, Roman numerals, abbreviations). |
|
3-5.CT.a.2
Organize information in different ways to make it more useful/relevant (e.g., sorting, tables). |
|
3-5.CT.a.3
Make a list of sub-problems to consider, while addressing a larger problem. |
|
3-5.CT.b.1
Define an algorithm as a sequence of instructions that can be processed by a computer. |
|
3-5.CT.b.2
Recognize that different solutions exist for the same problem (or sub-problem). |
|
3-5.CT.b.3
Use logical reasoning to predict outcomes of an algorithm. |
|
3-5.CT.b.4
Individually and collaboratively create an algorithm to solve a problem (e.g., move a character/robot/person through a maze). |
|
3-5.CT.b.5
Detect and correct logical errors in various algorithms (e.g., written, mapped, live action, or digital). |
|
3-5.CT.c.1
Describe examples of databases from everyday life (e.g., library catalogs, school records, telephone directories, contact lists). |
|
3-5.CT.c.2
Individually and collaboratively collect and manipulate data to answer a question using a variety of computing methods (e.g., sorting, totaling, averaging) and tools (such as a spreadsheet) to collect, organize, graph, and analyze data. |
|
3-5.CT.d.1
Individually and collaboratively create, test, and modify a program in a graphical environment (e.g., block-based visual programming language). |
|
3-5.CT.d.2
Use arithmetic operators, conditionals, and repetition in programs. |
|
3-5.CT.d.3
Use interactive debugging to detect and correct simple program errors. |
|
3-5.CT.d.4
Recognize that programs need known starting values (e.g., set initial score to zero in a game). |
|
3-5.CT.e.1
Individually and collaboratively create a simple model of a system (e.g., water cycle, solar system) and explain what the model shows and does not show. |
|
3-5.CT.e.2
Identify the concepts, features, and behaviors illustrated by a simulation (e.g., object motion, weather, ecosystem, predator/prey) and those that were not included. |
|
3-5.CT.e.3
Individually and collaboratively, use data from a simulation to answer a question. |
|