Please enable JavaScript to use CodeHS

IN CS 3-5 Framework

Standards

Standard Description
3-5.DI.1 Decompose problems and subproblems into parts as a means to solving complex problems. Lessons
3-5.DI.2 Organize and present collected data visually to highlight relationships and support a claim. Lessons
3-5.DI.3 Demonstrate how variables can represent data, and are used to store and modify information. Lessons
3-5.DI.4 Describe that data can be represented in different forms understandable by people, including words, symbols, and digital displays of color. Lessons
3-5.DI.5 Use data to highlight or propose cause-and-effect relationships, predict outcomes, or communicate an idea. Lessons
3-5.CD.1 Model how computer hardware and software work together to accomplish tasks. Lessons
3-5.CD.2 Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. Lessons
3-5.CD.3 Describe how internal and external parts of computing devices function to form a system. Lessons
3-5.CD.4 Describe what distinguishes humans from machines focusing on human intelligence versus machine intelligence. Lessons
3-5.PA.1 Collaborate with peers to implement problem solving steps to create a variety of programming solutions. Lessons
3-5.PA.2 Using age-appropriate vocabulary, explain steps taken and choices made to improve the design of a sequence. Lessons
3-5.PA.3 Design programs that incorporate sequences, events, loops, and conditionals. Lessons
3-5.PA.4 Test and debug (identify and fix errors) a program or algorithm to ensure it runs as intended. Lessons
3-5.PA.5 Construct and analyze solutions to problems using the basic steps of algorithmic problem solving. Lessons
3-5.PA.6 Observe intellectual property rights and give appropriate attribution when creating or remixing programs. Lessons
3-5.PA.7 Describe choices made during program development using code comments, presentations, and demonstrations. Lessons
3-5.NC.1 Discuss real-world cybersecurity problems and how personal information can be protected. Lessons
3-5.NC.2 Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the internet, and reassembled at the destination. Lessons
3-5.IC.1 Assess the responsible use of technology as well as the consequences of how inappropriate use can negatively impact society, cyber security, and one's own personal life. Lessons
3-5.IC.2 Describe the positive and negative impacts of technology on one’s personal life, society, and our culture. Lessons
3-5.IC.3 Seek diverse perspectives for the purpose of improving computational artifacts. Lessons
3-5.IC.4 Identify which information should be kept private and which information can be shared. Lessons
3-5.IC.5 Critique computing technologies that have changed the world. Analyze how those technologies influence and/or are influenced by cultural practices and societal biases. Lessons
3-5.DL.1 Working in a group, select the appropriate tool from a menu of options for general purpose productivity, skill remediation, written communication, and publishing activities. Lessons
3-5.DL.2 Collaborate to iteratively develop computational artifacts (e.g., videos, computer programs). Lessons
3-5.DL.3 Demonstrate proficiency with keyboards and other input and output devices. Lessons
3-5.DL.2 Collaborate to iteratively develop computational artifacts (e.g., videos, computer programs). Lessons
3-5.DL.3 Demonstrate proficiency with keyboards and other input and output devices. Lessons