Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
K.CS.1
Select computing devices that perform a variety of tasks accurately and quickly based on user needs and preferences. |
|
K.NI.1
Model and describe how people connect to other people and information through a network. |
|
K.NI.2
Create patterns to communicate a message. |
|
K.DA.1
Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. |
|
K.AP.1
Model processes by creating and following algorithms to complete tasks. |
|
K.CT.1
Decompose problems into smaller manageable parts to better understand them. |
|
1.CS.1
Operate a variety of computing devices that perform tasks accurately and quickly based on user needs and preferences. |
|
1.CS.2
Explore the functions of common hardware and software components of computing systems. |
|
1.DA.1
Collect and present data in various visual formats. |
|
1.DA.2
Identify and describe patterns in data visualizations (unplugged or digital), such as charts or graphs, to make predictions. |
|
1.AP.1
Demonstrate understanding of the way programs store and manipulate data as variables, such as numbers, words, colors, and images. |
|
1.AP.2
Break down (deconstruct) algorithms and list the steps needed to solve a problem into a sequence of tasks and sub-tasks. |
|
1.AP.3
Create programs with sequences (steps) of commands and simple loops (repeated patterns), to express ideas or address a problem. |
|
1.IC.1
Develop the ability to work respectfully and responsibly with others whether communicating face to face or electronically. |
|
1.CT.1
Determine the steps needed to solve a problem and develop a sequence of instructions. |
|
1.CT.2
Recognize similarities between new problems and problems they have solved in the past. |
|
2.CS.1
Describe and solve basic hardware and software problems. |
|
2.N1.1
Explain what a password is, why it is used, and be able to create a secure password. |
|
2.DA.1
Demonstrate how to store, copy, search, retrieve, modify and delete information using a computing device, and define the information stored as data. |
|
2.DA.2
Collect and present data in various visual formats. |
|
2.DA.3
Identify and describe patterns in data visualizations (i.e. charts or graphs) to make predictions. |
|
2.AP.1
Deconstruct the steps needed to solve a task into a sequence of instructions. |
|
2.AP.2
Collaboratively develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
|
2.AP.3
Properly credit others when using their ideas and creations while developing programs. |
|
2.AP.4
Debug and solve simple problems within an algorithm or program that includes sequences and simple loops. |
|
2.AP.5
Summarize the steps taken and choices made during the iterative process of program development. |
|
2.IC.1
Describe how technology has impacted society over time. |
|
2.IC.2
Describe rationales for keeping login information private, and for logging off devices appropriately. |
|
3.CS.1
Describe and model how computing devices connect to other components to extend their capabilities and form a system. |
|
3.NI.1
Describe physical and digital security measures for protecting personal information. |
|
3.NI.2
Develop personal patterns of behavior to protect information from unauthorized access. |
|
3.DA.1
Organize and present collected data visually to highlight relationships and support a claim. |
|
3.DA.2
Use data to communicate ideas, highlight relationships and predict outcomes. |
|
3.AP.1
Create programs that include events, sequences, loops, and simple conditionals to express ideas or address a problem. |
|
3.AP.2
Create programs that use variables to store and modify data. |
|
3.AP.3
Test and debug a program or algorithm to ensure it accomplishes the intended task. |
|
3.AP.4
Perform different roles when collaborating with peers during the design, implementation, and review stages of program development. |
|
3.AP.5
Use an iterative design process to plan and develop a program by considering the perspectives and preferences of others. |
|
3.AP.6
Create programs by incorporating smaller portions of existing programs to develop something new or add more advanced features. |
|
3.IC.1
Evaluate how computing technologies have changed the world, and express how those technologies influence, and are influenced by, cultural practices. |
|
3.IC.2
Describe reasons creators might limit the use of their work. |
|
3.CT.1
Decompose problems into smaller manageable tasks which may themselves be decomposed. |
|
3.CT.2
Recognize common patterns between problems and recurring patterns within problems. |
|
4.CS.1
Demonstrate how computer hardware and software work together as a system to accomplish tasks. |
|
4.NI.1
Model how information is broken down into smaller pieces called packets and transmitted through multiple devices over physical or wireless paths and reassembled at the destination. |
|
4.DA.1
Select, organize, and categorize data and represent that data visually to provide clarity or support a claim. |
|
4.DA.2
Use data to highlight and propose relationships, predict outcomes, or communicate ideas. |
|
4.AP.1
Compare and refine multiple algorithms for the same task, using computer and non-computer languages, and determine which is the most appropriate. |
|
4.AP.2
Create programs that include events, loops, and conditionals. |
|
4.AP.3
Decompose problems into smaller, manageable tasks which may be then be broken down further. |
|
4.AP.4
Test and debug a program or algorithm to ensure it accomplishes the intended task. |
|
4.IC.1
Evaluate computing technologies that have changed the world and express how those technologies influence and are influenced by cultural practices. |
|
4.IC.2
Propose ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
|
4.CT.1
Determine specific aspects of patterns between or within problems that can be abstracted out to leave only the common or important elements. |
|
5.CS.1
Create potential solutions to solve hardware and software problems using common troubleshooting strategies. |
|
5.NI.1
Model how information is broken down into smaller pieces, transmitted as packets (data groups) through multiple devices over networks and the Internet, and reassembled at the destination. |
|
5.DA.1
Explain how the amount of space required to store data differs based on the type of data and level of detail and that the utility of that data varies. |
|
5.DA.2
Organize and share collected data visually to highlight relationships and support a claim. |
|
5.DA.3
Prioritize, analyze and use data to communicate ideas, highlight relationships and predict outcomes. |
|
5.AP.1
Compare and refine multiple algorithms for the same task and determine which is the most appropriate. |
|
5.AP.2
Decompose problems into smaller, manageable tasks which may themselves be deconstructed and analyzed. |
|
5.AP.3
Create programs by incorporating smaller portions of existing programs, to develop something new or add more advanced features. |
|
5.AP.4
Use an iterative process to plan and develop a program by considering the perspectives and preferences of others. |
|
5.AP.5
Recognize and observe intellectual property rights and give appropriate attribution when creating, remixing, or combining programs. |
|
5.AP.6
Describe choices made during program development using code comments, presentations, and demonstrations. |
|
5.IC.1
Propose ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
|
5.IC.2
Seek and explain the impact of diverse perspectives for the purpose of improving computational artifacts. |
|
5.CT.1
Develop algorithms in computer programs to solve problems, including unique and repeated sub-tasks within a larger program. |
|