K.CS.D.1 |
With teacher guidance, select and operate an appropriate device to perform a task. |
Lessons
|
K.CS.HS.1 |
Use appropriate terminology in identifying and describing the function of common physical components of computing systems. |
Lessons
|
K.CS.T.1 |
Discuss basic hardware and software problems. |
Lessons
|
K.NI.C.1 |
Explain that a password helps protect the privacy of information. |
Lessons
|
K.NI.NCO.1 |
With teacher guidance, students define computer networks and how they can be used to connect people to other people, places, information, and ideas. |
Lessons
|
K.DA.CVT.1 |
With teacher guidance, collect and transform data using digital devices; Display data for communication in various visual formats. |
Lessons
|
K.DA.S.1 |
Recognize that data can be collected and stored on different computing devices over time and retrieved later. |
Lessons
|
K.DA.IM.1 |
Discuss patterns in data to make inferences or predictions. |
Lessons
|
K.AP.A.1 |
With teacher assistance, model daily processes by following algorithms (sets of step-by-step instructions) to complete tasks. |
Lessons
|
K.AP.V.1 |
With teacher assistance, model the way programs store and manipulate data by using numbers or other symbols to represent information. |
Lessons
|
K.AP.C.1 |
With teacher assistance, identify programs with sequences and simple loops, to express ideas or address a problem. |
Lessons
|
K.AP.M.1 |
With teacher assistance, solve a problem by breaking it down into smaller parts. |
Lessons
|
K.AP.PD.1 |
With teacher assistance, develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
Lessons
|
K.AP.PD.2 |
With teacher assistance, identify attribution (credit) when using the ideas and creations of others while developing programs. |
Lessons
|
K.AP.PD.3 |
With teacher assistance, debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. |
Lessons
|
K.AP.PD.4 |
With teacher assistance, using correct terminology, describe steps taken and choices made during program development. |
Lessons
|
K.IC.C.1 |
Discuss how people lived and worked before and after the implementation or adoption of new computing technology. |
Lessons
|
K.IC.SI.1 |
Work respectfully and responsibly with others online. |
Lessons
|
K.IC.SLE.1 |
Keep login information private, and log off of devices appropriately. |
Lessons
|
1.CS.D.1 |
With teacher guidance, select and operate appropriate devices and software to perform a task. |
Lessons
|
1.CS.HS.1 |
Use appropriate terminology in identifying and describing the function of common physical components of computing systems. |
Lessons
|
1.CS.T.1 |
Identify basic hardware and software problems using accurate terminology. |
Lessons
|
1.CS.T.2 |
With teacher guidance, begin to use basic troubleshooting strategies. |
Lessons
|
1.NI.C.1 |
Explain what passwords are and why we use them to protect personal information (e.g., name, location, phone number, home address) and keep it private. |
Lessons
|
1.NI.NCO.1 |
With teacher guidance, students discuss how computer networks can be used to connect people to other people, places, information, and ideas. |
Lessons
|
1.DA.CVT.1 |
With teacher guidance, collect and transform data using digital devices; Display data for communication in various visual formats. |
Lessons
|
1.DA.S.1 |
Explain that a variety of data (e.g., music, video, images, and text) can be stored in and retrieved from a computing device. |
Lessons
|
1.DA.IM.1 |
Identify patterns in data to make inferences or predictions. |
Lessons
|
1.AP.A.1 |
Model daily processes by following algorithms (sets of step-by-step instructions) to complete tasks. |
Lessons
|
1.AP.V.1 |
Model the way programs store and manipulate data by using numbers or other symbols to represent information. |
Lessons
|
1.AP.C.1 |
Identify programs with sequences and simple loops, to express ideas or address a problem. |
Lessons
|
1.AP.M.1 |
Solve a problem by breaking it down into smaller parts. |
Lessons
|
1.AP.PD.1 |
With teacher assistance identify plans that describe a program’s sequence of events, goals, and expected outcomes. |
Lessons
|
1.AP.PD.2 |
With teacher assistance, give attribution (credit) when using the ideas and creations of others while developing programs. |
Lessons
|
1.AP.PD.3 |
With teacher assistance, debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. |
Lessons
|
1.AP.PD.4 |
Using correct terminology, describe steps taken and choices made during program development. |
Lessons
|
1.IC.C.1 |
Discuss how people live and work before and after the implementation or adoption of new computing technology. |
Lessons
|
1.IC.SI.1 |
Work respectfully and responsibly with others online. |
Lessons
|
1.IC.SLE.1 |
Keep login information private, and log off devices appropriately. |
Lessons
|
2.CS.D.1 |
Recognize that users have different needs and preferences for technology they used by selecting and operating appropriate devices. |
Lessons
|
2.CS.HS.1 |
Understand how computing systems use both hardware (device) and software (program/app) to process information. |
Lessons
|
2.CS.T.1 |
Explain basic hardware (device) and software (program/app) problems using accurate terminology. |
Lessons
|
2.CS.T.2 |
With teacher guidance, use basic troubleshooting strategies. |
Lessons
|
2.NI.C.1 |
Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. |
Lessons
|
2.NI.NCO.1 |
Students can discuss how computer networks can be used to connect people to other people, places, information, and ideas. |
Lessons
|
2.DA.CVT.1 |
Collect and transform data using digital devices; Display data for communication in various visual formats. |
Lessons
|
2.DA.S.1 |
Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. |
Lessons
|
2.DA.IM.1 |
Describe patterns in data to make inferences or predictions. |
Lessons
|
2.AP.A.1 |
Model daily processes by creating and following algorithms (sets of step-by-step instructions to complete tasks. |
Lessons
|
2.AP.V.1 |
Model the way programs store and manipulate data by using numbers or other symbols to represent information. |
Lessons
|
2.AP.C.1 |
Develop programs with sequences and simple loops, to express ideas or address a problem. |
Lessons
|
2.AP.M.1 |
Decompose (break down) the steps needed to solve a problem into a precise sequence of instructions. |
Lessons
|
2.AP.PD.1 |
Develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
Lessons
|
2.AP.PD.2 |
Give attribution (credit) when using the ideas and creations of others while developing programs. |
Lessons
|
2.AP.PD.3 |
Debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. |
Lessons
|
2.AP.PD.4 |
Using correct terminology, describe steps taken and choices made during the iterative process of program (procedure) development. |
Lessons
|
2.IC.C.1 |
Compare how people live and work before and after the implementation or adoption of new computing technology. |
Lessons
|
2.IC.SI.1 |
Work respectfully and responsibly with others online. |
Lessons
|
2.IC.SLE.1 |
Keep login information private, and log off of devices appropriately. |
Lessons
|
3.CS.D.1 |
Identify how internal and external parts of computing devices function to form a system within a single device and hardware that connects to the device to extend capability. |
Lessons
|
3.CS.HS.1 |
Recognize that hardware (devices) and software (programs/apps) communicate in a special language that the computing system can understand. |
Lessons
|
3.CS.HS.2 |
Recognize that hardware (devices) can only accomplish the specific tasks the software (programs/apps) is designed to accomplish. |
Lessons
|
3.CS.T.1 |
Identify and use common troubleshooting strategies to solve simple hardware and software problems. |
Lessons
|
3.NI.C.1 |
Identify real-world cybersecurity problems and how personal information can be protected. |
Lessons
|
3.NI.NCO.1 |
Model how information flows in a physical or wireless path to travel to be sent and received is sent and received through a physical or wireless path. |
Lessons
|
3.DA.CVT.1 |
Select tools from a specified list to collect, organize, and present data visually to highlight relationships and support a claim. |
Lessons
|
3.DA.S.1 |
Recognize different file extensions. |
Lessons
|
3.DA.IM.1 |
Use a computational tool to draw conclusions, make predictions, and answer questions utilizing a specified data set. |
Lessons
|
3.AP.A.1 |
Recognize and compare multiple algorithms for the same task and determine which are effective. |
Lessons
|
3.AP.V.1 |
Create programs that use variables to store and modify data. |
Lessons
|
3.AP.C.1 |
Create programs that include sequences, events, loops, and/or conditionals. |
Lessons
|
3.AP.M.1 |
Decompose problems into smaller, manageable subproblems to facilitate the program development process. |
Lessons
|
3.AP.PD.1 |
With teacher guidance, use an iterative process to plan the development of a program by including others' perspectives and considering user preferences. |
Lessons
|
3.AP.PD.2 |
Observe intellectual property rights and give appropriate attribution when creating or remixing programs. |
Lessons
|
3.AP.PD.3 |
Test and debug (identify and fix errors) a program or algorithm to ensure it runs as intended. |
Lessons
|
3.AP.PD.4 |
With teacher guidance, students take on varying roles, when collaborating with peers during the design, implementation, and review stages of program development. |
Lessons
|
3.AP.PD.5 |
Describe choices made during program (procedure) development using code comments, presentations, and/or demonstrations. |
Lessons
|
3.IC.C.1 |
Identify computing technologies that have changed the world. |
Lessons
|
3.IC.C.2 |
With teacher guidance, brainstorm ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
Lessons
|
3.IC.SI.1 |
Seek opportunities for local collaboration to facilitate communication and innovation. |
Lessons
|
3.IC.SLE.1 |
Use material that is publicly available and/or permissible to use. |
Lessons
|
4.CS.D.1 |
With teacher guidance, model how internal and external parts of computing connect multiple devices in a computing system. |
Lessons
|
4.CS.HS.1 |
Recognize that bits serve as the basic unit of data in computing systems and can represent a variety of information. |
Lessons
|
4.CS.HS.2 |
Recognize that a single piece of hardware can accomplish different tasks depending on its software. |
Lessons
|
4.CS.T.1 |
Develop and apply simple troubleshooting strategies to solve simple hardware and software problems. |
Lessons
|
4.NI.C.1 |
Discuss real-world cybersecurity problems and how personal information can be protected. |
Lessons
|
4.NI.NCO.1 |
Model how information is decomposed, transmitted as packets through multiple devices over networks and reassembled at the destination. |
Lessons
|
4.DA.CVT.1 |
Select tools to collect, organize, and present data visually to highlight relationships and support a claim. |
Lessons
|
4.DA.S.1 |
Recognize different file extensions and the different amounts of storage required for each type. |
Lessons
|
4.DA.IM.1 |
Use a computational tool to manipulate data to draw conclusions, make predictions, and answer questions. |
Lessons
|
4.AP.A.1 |
Compare and refine multiple algorithms for the same task and determine which is the most effective. |
Lessons
|
4.AP.V.1 |
Create programs that use variables to store and modify data |
Lessons
|
4.AP.C.1 |
Create programs that include sequences, events, loops, and/or conditionals. |
Lessons
|
4.AP.M.1 |
Decompose problems into smaller, manageable subproblems to facilitate the program development process. |
Lessons
|
4.AP.M.2 |
Modify, remix, or incorporate portions of an existing program into one's own work to add more advanced features. |
Lessons
|
4.AP.PD.1 |
Use an iterative process to plan the development of a program by including others' perspectives and considering user preferences. |
Lessons
|
4.AP.PD.2 |
Observe intellectual property rights and give appropriate attribution when creating or remixing programs. |
Lessons
|
4.AP.PD.3 |
Test and debug (identify and fix errors) a program/app or algorithm to ensure it runs as intended. |
Lessons
|
4.AP.PD.4 |
With teacher guidance, students take on varying roles when collaborating with peers during the design, implementation, and review stages of program development. |
Lessons
|
4.AP.PD.5 |
Describe choices made during program development using code comments, presentations, and/or demonstrations. |
Lessons
|
4.IC.C.1 |
Identify and discuss computing technologies that have changed the world. |
Lessons
|
4.IC.C.2 |
Brainstorm ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
Lessons
|
4.IC.SI.1 |
Seek opportunities for local and nationally collaboration to facilitate communication and innovation. |
Lessons
|
4.IC.SLE.1 |
Use material that is publicly available and/or permissible to use. |
Lessons
|
5.CS.D.1 |
Analyze and model how internal and external parts of computing devices communicate as a system. |
Lessons
|
5.CS.D.2 |
Explain how computing devices affect humans in positive and negative ways. |
Lessons
|
5.CS.HS.1 |
Model how information is transformed into binary digits to be stored or processed. |
Lessons
|
5.CS.HS.2 |
Demonstrate and explain how hardware can accomplish different tasks depending on the software. |
Lessons
|
5.CS.T.1 |
Apply potential solutions and solve simple hardware and software problems using common troubleshooting strategies. |
Lessons
|
5.NI.C.1 |
Identify solutions to real-world cybersecurity problems and how personal information can be protected. |
Lessons
|
5.NI.NCO.1 |
Analyze the advantages and disadvantages of various network types. |
Lessons
|
5.DA.CVT.1 |
Select tools to collect, organize, manipulate, and present data visually through multiple representations to highlight relationships and support a claim. |
Lessons
|
5.DA.S.1 |
Discuss different file extensions and how they are stored and retrieved on a computing device. |
Lessons
|
5.DA.IM.1 |
Use data to propose cause-and-effect relationships, predict outcomes, or communicate an idea. |
Lessons
|
5.AP.A.1 |
Compare, test, and refine multiple algorithms for the same task and determine which is the most effective. |
Lessons
|
5.AP.V.1 |
Recognizing that the data type determines the values that can be stored and the operations that can be performed on the data. |
Lessons
|
5.AP.C.1 |
Create programs that include sequences, events, loops, and conditionals. |
Lessons
|
5.AP.M.1 |
Decompose problems into manageable subproblems to facilitate the program development process. |
Lessons
|
5.AP.M.2 |
Modify, remix, or incorporate portions of an existing program into one's own work, to develop something new or add more advanced features. |
Lessons
|
5.AP.PD.1 |
Use an iterative process to plan the development of a program by including others' perspectives and considering user preferences. |
Lessons
|
5.AP.PD.2 |
Observe intellectual property rights and give appropriate attribution when creating or remixing programs. |
Lessons
|
5.AP.PD.3 |
Test and debug (identify and fix errors) a program or algorithm to ensure it runs as intended. |
Lessons
|
5.AP.PD.4 |
Take on varying roles when collaborating with peers during the design, implementation, and review stages of program development. |
Lessons
|
5.AP.PD.5 |
Describe choices made during program development using code comments, presentations, and demonstrations. |
Lessons
|
5.IC.C.1 |
Discuss computing technologies that have changed the world. |
Lessons
|
5.IC.C.2 |
Design ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
Lessons
|
5.IC.SI.1 |
Seek opportunities for local and global collaboration to facilitate communication and innovation. |
Lessons
|
5.IC.SLE.1 |
Use public domain or creative commons media, and refrain from copying or using material created by others without permission. |
Lessons
|