Standards in this Framework
Standard | Lessons |
---|---|
K.AP.1
The student will apply computational thinking to identify patterns and sort items into categories based on an attribute. |
|
K.AP.2
The student will plan and implement algorithms that include sequential order. |
|
K.CSY.1
The student will identify the purpose and components of a computing device. |
|
K.CSY.2
The student will identify when a computing device might not work as expected. |
|
K.CYB.1
The student will demonstrate safe and responsible use of computing technologies. |
|
K.CYB.2
The student will describe the importance of protecting personal information online. |
|
K.DA.1
The student will gather and record data with or without a computing device. |
|
K.DA.2
The student will create representations of data to make predictions and draw conclusions. |
|
K.IC.1
The student will identify and discuss how computing technologies impact people's lives. |
|
K.IC.2
The student will discuss and describe how different careers use computing technologies. |
|
K.NI.1
The student will describe how people can communicate with others by connected computing devices and the Internet. |
|
1.AP.1
The student will apply computational thinking by sorting items into categories based on multiple attributes and create patterns. |
|
1.AP.2
The student will plan and implement algorithms that include the use of sequence and an event based on a predetermined task. |
|
1.AP.3
The student will use the iterative design process to construct, test, and debug algorithms that include sequencing and an event. |
|
1.CSY.1
The student will describe how computing components work together to create a computing system. |
|
1.CSY.2
The student will use accurate terminology to describe when a computing system might not work as expected. |
|
1.CYB.1
The student will demonstrate safe and responsible use of computing technologies. |
|
1.CYB.2
The student will discuss the importance of using a password to protect private information. |
|
1.DA.1
The student will explore how data can be stored and retrieved from various computing devices. |
|
1.DA.2
The student will create representations of data to make predictions and draw conclusions. |
|
1.IC.1
The student will describe how computing technologies impact daily tasks and communication. |
|
1.IC.2
The student will describe tasks and activities that use screens and categorize them based on their use. |
|
1.IC.3
The student will compare and contrast ways people complete tasks with and without computing technologies. |
|
1.NI.1
The student will explain that computing devices and the use of the Internet allow people the ability to gather information and connect with others. |
|
2.AP.1
The student will apply computational thinking to identify patterns, and design algorithms to compare and contrast objects based on attributes. |
|
2.AP.2
The student will plan and implement algorithms that consists of events and loops using a block-based programming language. |
|
2.AP.3
The student will use the iterative design process to create, test, and debug a program containing events and loops in a block-based programming tool. |
|
2.CSY.1
The student will describe the characteristics of computing systems including hardware, software, input, and output. |
|
2.CSY.2
The student will demonstrate an understanding of how to troubleshoot simple hardware and software problems that may occur during use. |
|
2.CYB.1
The student will model safe and responsible behaviors when using information and computing technologies. |
|
2.CYB.2
The student will explain the importance of using passwords to protect private information. |
|
2.DA.1
The student will analyze data to make decisions with or without a computing device. |
|
2.DA.2
The student will manipulate data, create representations, and evaluate data to solve a problem. |
|
2.IC.1
The student will examine the positive and negative impacts of how using computing technologies has changed the way people live, work, and interact. |
|
2.IC.2
The student will explain the need to balance screen time and other activities. |
|
2.IC.3
The student will explain how computing technologies have an impact on the workforce. |
|
2.NI.1
The student will demonstrate the use of the Internet in gathering information to accomplish a task. |
|
3.AP.1
The student will apply computational thinking to design algorithms to extend patterns, processes, or components of a problem. |
|
3.AP.2
The student will plan and implement algorithms that consist of events and conditional control structures using a block-based programming language. |
|
3.AP.3
The student will use the iterative design process to create, test, and debug programs containing events, loops, and conditional structures in a block-based programming tool. |
|
3.CSY.1
The student will model how computing devices within a computing system work. |
|
3.CSY.2
The student will use accurate terminology when troubleshooting problems when a computing system is not working as expected. |
|
3.CYB.1
The student will apply safe practices to protect private information. |
|
3.CYB.2
The student will identify the relationship between passwords and security risk. |
|
3.CYB.3
The student will define and explain cybersecurity. |
|
3.DA.1
The student will gather, store, and organize data to evaluate trends and identify patterns using a computing device. |
|
3.DA.2
The student will create and evaluate data representations and conclusions. |
|
3.DA.3
The student will create models that can represent a physical object or process. |
|
3.IC.1
The student will identify and examine the positive and negative impacts of the prevalence of computing technologies. |
|
3.IC.2
The student will discuss and describe strategies to manage screen time. |
|
3.IC.3
The student will identify and describe computing technology careers and their impact on society. |
|
3.IC.4
The student will demonstrate how to use information created by others with permission. |
|
3.NI.1
The student will describe computing networks. |
|
4.AP.1
The student will apply computational thinking to identify patterns and design algorithms to compare and contrast multiple algorithms used for the same task. |
|
4.AP.2
The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and conditional control structures using a block-based programming language. |
|
4.AP.3
The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, and conditional control structures in a block-based programming tool. |
|
4.CSY.1
The student will model how a computing system works to accomplish a task. |
|
4.CSY.2
The student will apply troubleshooting strategies when a computing system is not working as intended. |
|
4.CSY.3
The student will describe the learning process of humans and computers. |
|
4.CYB.1
The student will examine the impacts of appropriate and inappropriate use of computing technologies. |
|
4.CYB.2
The student will identify and investigate best practices to safeguard information shared online and through online platforms. |
|
4.CYB.3
The student will examine how information is shared online and explain the importance of cybersecurity. |
|
4.DA.1
The student will identify the appropriate type of data needed to solve a problem or answer a question. |
|
4.DA.2
The student will create and evaluate data representations to make predictions and conclusions. |
|
4.DA.3
The student will create a computational model that represents attributes and behaviors associated with a concept. |
|
4.IC.1
The student will identify and examine the positive and negative impacts of the prevalence of computing technologies. |
|
4.IC.2
The student will describe the impact of screen time on relationships at home and at school. |
|
4.IC.3
The student will examine the impact of computing technologies in the workforce. |
|
4.IC.4
The student will describe the importance of copyrights and intellectual property rights. |
|
4.NI.1
The student will identify the interrelationship between computing devices and a computing network. |
|
5.AP.1
The student will apply computational thinking to identify patterns, make use of decomposition to break down problems or processes into sub-components, and design algorithms. |
|
5.AP.2
The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and nested conditional control structures using a block-based programming language. |
|
5.AP.3
The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, nested conditional control structures, and two-way branching conditional control structures in a block-based programming tool. |
|
5.CSY.1
The student will explain how computing systems are used to collect and exchange data. |
|
5.CSY.2
The student will describe an automated decision-making process employed by a computing system. |
|
5.CSY.3
The student will evaluate and implement troubleshooting strategies when a computing system is not operational. |
|
5.CYB.1
The student will identify ways to limit unauthorized access on computing devices. |
|
5.CYB.2
The student will explain how cybersecurity policies and laws are designed to protect individuals. |
|
5.DA.1
The student will collect data or use data sets to solve a problem or investigate a topic. |
|
5.DA.2
The student will create multiple data representations to make predictions and conclusions. |
|
5.DA.3
The student will explain the significance of training data in machine learning. |
|
5.IC.1
The student will analyze the impact of inappropriate use of computing technologies. |
|
5.IC.2
The student will explain the potential impact of excessive screen time on academic performance. |
|
5.IC.3
The student will identify the impact of computing technologies on the workforce, culture, and global society. |
|
5.IC.4
The student will observe and examine intellectual property rights when considering the use of open-source licenses and copyrights. |
|
5.IC.5
The student will examine the effects of social interactions due to computing technologies. |
|
5.NI.1
The student will identify and describe cloud computing. |
|