Please enable JavaScript to use CodeHS

Elementary Standards Mapping

for VA CS K-5

87

Standards in this Framework

Standard Lessons
K.AP.1
The student will apply computational thinking to identify patterns and sort items into categories based on an attribute.
    Computational Thinking: Morning Routines Computational Thinking: Evening Routines Computational Thinking: School Day Routines
K.AP.2
The student will plan and implement algorithms that include sequential order.
    Computational Thinking: Morning Routines Computational Thinking: Evening Routines Computational Thinking: School Day Routines
K.CSY.1
The student will identify the purpose and components of a computing device.
K.CSY.2
The student will identify when a computing device might not work as expected.
K.CYB.1
The student will demonstrate safe and responsible use of computing technologies.
K.CYB.2
The student will describe the importance of protecting personal information online.
K.DA.1
The student will gather and record data with or without a computing device.
K.DA.2
The student will create representations of data to make predictions and draw conclusions.
K.IC.1
The student will identify and discuss how computing technologies impact people's lives.
K.IC.2
The student will discuss and describe how different careers use computing technologies.
K.NI.1
The student will describe how people can communicate with others by connected computing devices and the Internet.
1.AP.1
The student will apply computational thinking by sorting items into categories based on multiple attributes and create patterns.
1.AP.2
The student will plan and implement algorithms that include the use of sequence and an event based on a predetermined task.
1.AP.3
The student will use the iterative design process to construct, test, and debug algorithms that include sequencing and an event.
1.CSY.1
The student will describe how computing components work together to create a computing system.
1.CSY.2
The student will use accurate terminology to describe when a computing system might not work as expected.
1.CYB.1
The student will demonstrate safe and responsible use of computing technologies.
1.CYB.2
The student will discuss the importance of using a password to protect private information.
1.DA.1
The student will explore how data can be stored and retrieved from various computing devices.
1.DA.2
The student will create representations of data to make predictions and draw conclusions.
1.IC.1
The student will describe how computing technologies impact daily tasks and communication.
1.IC.2
The student will describe tasks and activities that use screens and categorize them based on their use.
1.IC.3
The student will compare and contrast ways people complete tasks with and without computing technologies.
1.NI.1
The student will explain that computing devices and the use of the Internet allow people the ability to gather information and connect with others.
2.AP.1
The student will apply computational thinking to identify patterns, and design algorithms to compare and contrast objects based on attributes.
2.AP.2
The student will plan and implement algorithms that consists of events and loops using a block-based programming language.
2.AP.3
The student will use the iterative design process to create, test, and debug a program containing events and loops in a block-based programming tool.
2.CSY.1
The student will describe the characteristics of computing systems including hardware, software, input, and output.
2.CSY.2
The student will demonstrate an understanding of how to troubleshoot simple hardware and software problems that may occur during use.
2.CYB.1
The student will model safe and responsible behaviors when using information and computing technologies.
2.CYB.2
The student will explain the importance of using passwords to protect private information.
2.DA.1
The student will analyze data to make decisions with or without a computing device.
2.DA.2
The student will manipulate data, create representations, and evaluate data to solve a problem.
2.IC.1
The student will examine the positive and negative impacts of how using computing technologies has changed the way people live, work, and interact.
2.IC.2
The student will explain the need to balance screen time and other activities.
2.IC.3
The student will explain how computing technologies have an impact on the workforce.
2.NI.1
The student will demonstrate the use of the Internet in gathering information to accomplish a task.
3.AP.1
The student will apply computational thinking to design algorithms to extend patterns, processes, or components of a problem.
    Computational Thinking: Design an Obstacle Course Computational Thinking: Design a School Computational Thinking: Design a Neighborhood
3.AP.2
The student will plan and implement algorithms that consist of events and conditional control structures using a block-based programming language.
    Drawing Tools: Sea Creatures
3.AP.3
The student will use the iterative design process to create, test, and debug programs containing events, loops, and conditional structures in a block-based programming tool.
3.CSY.1
The student will model how computing devices within a computing system work.
3.CSY.2
The student will use accurate terminology when troubleshooting problems when a computing system is not working as expected.
3.CYB.1
The student will apply safe practices to protect private information.
3.CYB.2
The student will identify the relationship between passwords and security risk.
3.CYB.3
The student will define and explain cybersecurity.
3.DA.1
The student will gather, store, and organize data to evaluate trends and identify patterns using a computing device.
3.DA.2
The student will create and evaluate data representations and conclusions.
3.DA.3
The student will create models that can represent a physical object or process.
    Computational Thinking: Design an Obstacle Course Computational Thinking: Design a School Computational Thinking: Design a Neighborhood
3.IC.1
The student will identify and examine the positive and negative impacts of the prevalence of computing technologies.
3.IC.2
The student will discuss and describe strategies to manage screen time.
3.IC.3
The student will identify and describe computing technology careers and their impact on society.
3.IC.4
The student will demonstrate how to use information created by others with permission.
3.NI.1
The student will describe computing networks.
4.AP.1
The student will apply computational thinking to identify patterns and design algorithms to compare and contrast multiple algorithms used for the same task.
    Computational Thinking: Design an Obstacle Course Computational Thinking: Design a School Computational Thinking: Design a Neighborhood
4.AP.2
The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and conditional control structures using a block-based programming language.
    micro:bit® Butterfly Migration Simulator
4.AP.3
The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, and conditional control structures in a block-based programming tool.
4.CSY.1
The student will model how a computing system works to accomplish a task.
4.CSY.2
The student will apply troubleshooting strategies when a computing system is not working as intended.
4.CSY.3
The student will describe the learning process of humans and computers.
4.CYB.1
The student will examine the impacts of appropriate and inappropriate use of computing technologies.
4.CYB.2
The student will identify and investigate best practices to safeguard information shared online and through online platforms.
4.CYB.3
The student will examine how information is shared online and explain the importance of cybersecurity.
4.DA.1
The student will identify the appropriate type of data needed to solve a problem or answer a question.
4.DA.2
The student will create and evaluate data representations to make predictions and conclusions.
4.DA.3
The student will create a computational model that represents attributes and behaviors associated with a concept.
4.IC.1
The student will identify and examine the positive and negative impacts of the prevalence of computing technologies.
4.IC.2
The student will describe the impact of screen time on relationships at home and at school.
4.IC.3
The student will examine the impact of computing technologies in the workforce.
4.IC.4
The student will describe the importance of copyrights and intellectual property rights.
4.NI.1
The student will identify the interrelationship between computing devices and a computing network.
5.AP.1
The student will apply computational thinking to identify patterns, make use of decomposition to break down problems or processes into sub-components, and design algorithms.
    Computational Thinking: Design an Obstacle Course CS Innovators: Grace Hopper Computational Thinking: Design a School Computational Thinking: Design a Neighborhood
5.AP.2
The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and nested conditional control structures using a block-based programming language.
    KA2.2.1a - A Day at the Park: Karel Clean Up KA2.2.1b - A Day at the Park: Find the Exit KA2.2.1c - A Day at the Park: Escape the Bedroom KA2.2.2a - A Day at the Park: Fetch Karel KA2.2.2b - A Day at the Park: Get Down the Hallway KA2.2.2c - A Day at the Park: Escape the Building KA2.2.3a - A Day at the Park: Building Towers KA2.2.3b - A Day at the Park: Get Around the Cars KA2.2.3c - A Day at the Park: Find the Park KA2.2.4a - A Day at the Park: Making Custom Colors KA2.2.4b - A Day at the Park: Make a Tree KA2.2.4c - A Day at the Park: Set Up the Scavenger Hunt KA2.1.1a- Rosetta Stone: Pick Up the Hat 1 KA2.1.1b- Rosetta Stone: Pick Up the Hat 2 KA2.1.1c- Rosetta Stone: Travel to Egypt KA2.1.2a- Rosetta Stone: Approach the Entrance KA2.1.2b- Rosetta Stone: Uncover the Hieroglyph KA2.1.3a- Rosetta Stone: Light the Torches 1 KA2.1.3b- Rosetta Stone: Light the Torches 2 KA2.1.4a- Rosetta Stone: Leave Without a Trace KA2.1.4b- Rosetta Stone: Which Way? KA2.1.5a- Rosetta Stone: Snakes! KA2.1.5b- Rosetta Stone: Escape the Scarab Room KA2.1.6- Rosetta Stone: Challenge: Draw a Hieroglyph KA2.3.1- Evaluation: Collect the Tennis Balls
5.AP.3
The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, nested conditional control structures, and two-way branching conditional control structures in a block-based programming tool.
5.CSY.1
The student will explain how computing systems are used to collect and exchange data.
5.CSY.2
The student will describe an automated decision-making process employed by a computing system.
5.CSY.3
The student will evaluate and implement troubleshooting strategies when a computing system is not operational.
5.CYB.1
The student will identify ways to limit unauthorized access on computing devices.
5.CYB.2
The student will explain how cybersecurity policies and laws are designed to protect individuals.
5.DA.1
The student will collect data or use data sets to solve a problem or investigate a topic.
5.DA.2
The student will create multiple data representations to make predictions and conclusions.
5.DA.3
The student will explain the significance of training data in machine learning.
5.IC.1
The student will analyze the impact of inappropriate use of computing technologies.
5.IC.2
The student will explain the potential impact of excessive screen time on academic performance.
5.IC.3
The student will identify the impact of computing technologies on the workforce, culture, and global society.
5.IC.4
The student will observe and examine intellectual property rights when considering the use of open-source licenses and copyrights.
5.IC.5
The student will examine the effects of social interactions due to computing technologies.
5.NI.1
The student will identify and describe cloud computing.