K-2.CS.1 |
Select and operate computing devices that perform a variety of tasks accurately and quickly based on user needs and preferences. |
Lessons
|
K-2.CS.2 |
Explain the functions of common hardware and software components of computing systems. |
Lessons
|
K-2.CS.3 |
Describe basic hardware and software problems using accurate terminology. |
Lessons
|
K-2.NI.4 |
Model and describe how people connect to other people, places, information and ideas through a network. |
Lessons
|
K-2.NI.5 |
Explain why people use passwords. |
Lessons
|
K-2.NI.6 |
Create patterns to communicate a message. |
Lessons
|
K-2.DA.7 |
Store, copy, search, retrieve, modify, and delete information using a computing device, and define the information stored as data. |
Lessons
|
K-2.DA.8 |
Collect and present data in various visual formats. |
Lessons
|
K-2.DA.9 |
Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. |
Lessons
|
K-2.AP.10 |
Model daily processes by creating and following algorithms to complete tasks. |
Lessons
|
K-2.AP.11 |
Model the way programs store data. |
Lessons
|
K-2.AP.12 |
Create programs with sequences of commands and simple loops, to express ideas or address a problem. |
Lessons
|
K-2.AP.13 |
Decompose the steps needed to solve a problem into a sequence of instructions. |
Lessons
|
K-2.AP.14 |
Develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
Lessons
|
K-2.AP.15 |
Give attribution when using the ideas and creations of others while developing programs. |
Lessons
|
K-2.AP.16 |
Debug errors in an algorithm or program that includes sequences and simple loops. |
Lessons
|
K-2.AP.17 |
Describe the steps taken and choices made during the iterative process of program development. |
Lessons
|
K-2.IC.18 |
Compare how people lived and worked before and after the adoption of new computing technologies. |
Lessons
|
K-2.IC.19 |
Work respectfully and responsibly with others when communicating electronically. |
Lessons
|
K-2.IC.20 |
Describe approaches and rationales for keeping login information private, and for logging off of devices appropriately. |
Lessons
|
3-5.CS.1 |
Describe how computing devices connect to other components to form a system. |
Lessons
|
3-5.CS.2 |
Demonstrate how computer hardware and software work together as a system to accomplish tasks. |
Lessons
|
3-5.CS.3 |
Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. |
Lessons
|
3-5.NI.4 |
Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination. |
Lessons
|
3-5.NI.5 |
Describe physical and digital security measures for protecting personal information. |
Lessons
|
3-5.NI.6 |
Create patterns to protect information from unauthorized access. |
Lessons
|
3-5.DA.7 |
Explain that the amount of space required to store data differs based on the type of data and/or level of detail. |
Lessons
|
3-5.DA.8 |
Organize and present collected data visually to highlight relationships and support a claim. |
Lessons
|
3-5.DA.9 |
Use data to highlight and/or propose relationships, predict outcomes, or communicate ideas. |
Lessons
|
3-5.AP.10 |
Compare and refine multiple algorithms for the same task and determine which is the most appropriate. |
Lessons
|
3-5.AP.11 |
Create programs that use variables to store and modify data. |
Lessons
|
3-5.AP.12 |
Create programs that include events, loops, and conditionals. |
Lessons
|
3-5.AP.13 |
Decompose problems into smaller, manageable tasks which may themselves be decomposed. |
Lessons
|
3-5.AP.14 |
Create programs by incorporating smaller portions of existing programs, to develop something new or add more advanced features. |
Lessons
|
3-5.AP.15 |
Use an iterative process to plan and develop a program by considering the perspectives and preferences of others. |
Lessons
|
3-5.AP.16 |
Observe intellectual property rights and give appropriate attribution when creating, remixing, or combining programs. |
Lessons
|
3-5.AP.17 |
Test and debug a program or algorithm to ensure it accomplishes the intended task. |
Lessons
|
3-5.AP.18 |
Perform different roles when collaborating with peers during the design, implementation, and review stages of program development. |
Lessons
|
3-5.AP.19 |
Describe choices made during program development using code comments, presentations, and demonstrations. |
Lessons
|
3-5.IC.20 |
Discuss computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices. |
Lessons
|
3-5.IC.21 |
Propose ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. |
Lessons
|
3-5.IC.22 |
Seek and explain the impact of diverse perspectives for the purpose of improving computational artifacts. |
Lessons
|
3-5.IC.23 |
Describe reasons creators might limit the use of their work. |
Lessons
|