| 6.CS.D.1 | 
                Compare computing device designs based on how humans interact with them. | 
                
                    Lessons
                 | 
            
            
            
                | 6.CS.HS.1 | 
                Explain how hardware and software can be used to collect and exchange data. | 
                
                    Lessons
                 | 
            
            
            
                | 6.CS.T.1 | 
                Identify problems that can occur in computing devices and their components within a system. | 
                
                    Lessons
                 | 
            
            
            
                | 6.NI.C.1 | 
                Identify multiple methods of encryption to secure the transmission of information. | 
                
                    Lessons
                 | 
            
            
            
                | 6.NI.C.2 | 
                Identify different physical and digital security measures that protect electronic information. | 
                
                    Lessons
                 | 
            
            
            
                | 6.NI.NCO.1 | 
                Discuss how protocols are used in transmitting data across networks and the Internet. | 
                
                    Lessons
                 | 
            
            
            
                | 6.DA.CVT.1 | 
                Compare different computational tools used to collect, analyze and present data that is meaningful and useful. | 
                
                    Lessons
                 | 
            
            
            
                | 6.DA.S.1 | 
                Identify multiple encoding schemes used to represent data, including binary and ASCII. | 
                
                    Lessons
                 | 
            
            
            
                | 6.DA.IM.1 | 
                Discuss the validity of a computational model based on the reliability of the data. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.A.1 | 
                Identify planning strategies such as flowcharts or pseudocode, to simulate algorithms that solve problems. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.V.1 | 
                Identify variables that represent different data types and perform operations on their values. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.C.1 | 
                Design programs that combine control structures, including nested loops and compound conditionals. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.M.1 | 
                Decompose problems into parts to facilitate the design, implementation, and review of programs. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.M.2 | 
                Use procedures to organize code and make it easier to reuse. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.PD.1 | 
                Seek and incorporate feedback from team members and users to refine a solution that meets user needs. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.PD.2 | 
                Incorporate existing code into programs and give attribution. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.PD.3 | 
                Test programs using a range of inputs and identify expected outputs. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.PD.4 | 
                Maintain a timeline with specific tasks while collaboratively developing computational artifacts. | 
                
                    Lessons
                 | 
            
            
            
                | 6.AP.PD.5 | 
                Document programs in order to make them easier to follow, test, and debug | 
                
                    Lessons
                 | 
            
            
            
                | 6.IC.C.1 | 
                Identify some of the tradeoffs associated with computing technologies that can affect people's everyday activities and career options. | 
                
                    Lessons
                 | 
            
            
            
                | 6.IC.C.2 | 
                Identify issues of bias and accessibility in the design of existing technologies. | 
                
                    Lessons
                 | 
            
            
            
                | 6.IC.SI.1 | 
                Identify the advantages of creating a computational product by collaborating with others using digital technologies. | 
                
                    Lessons
                 | 
            
            
            
                | 6.IC.SLE.1 | 
                Describe how some digital information can be public or can be kept private and secure. | 
                
                    Lessons
                 |