| K-1.IC.1 | 
                Identify and discuss how tasks are accomplished with and without computing technology. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.IC.2 | 
                Identify and explain classroom and home rules related to computing technologies. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.IC.3 | 
                Identify computing technologies in the classroom, home, and community.  | 
                
                    Lessons
                 | 
            
            
            
                | K-1.IC.4 | 
                Identify public and private spaces in our daily lives. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.IC.6 | 
                With teacher support, identify different ways people interact with computers and computing devices. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.IC.7 | 
                Identify multiple jobs that use computing technologies. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.1 | 
                Identify and describe one or more patterns (found in nature or designed), and examine the patterns to find similarities and make predictions. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.2 | 
                Identify different kinds of data that can be collected from everyday life. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.3 | 
                Identify ways to visualize data, and collaboratively create a visualization of data. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.4 | 
                Identify a problem or task and discuss ways to break it into multiple smaller steps. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.5 | 
                Recognize that the same task can be described at different levels of detail.   | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.6 | 
                Follow an algorithm to complete a task. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.7 | 
                Identify terms that refer to different concrete values over time. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.8 | 
                Identify a task consisting of steps that are repeated, and recognize which steps are repeated. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.9 | 
                Identify and fix (debug) errors within a simple algorithm. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CT.10 | 
                Collaboratively create a plan that outlines the steps needed to complete a task.  | 
                
                    Lessons
                 | 
            
            
            
                | K-1.NSD.1 | 
                Identify ways people provide input and get output from computing devices.  | 
                
                    Lessons
                 | 
            
            
            
                | K-1.NSD.2 | 
                Identify basic hardware components that are found in computing devices.    | 
                
                    Lessons
                 | 
            
            
            
                | K-1.NSD.3 | 
                Identify basic hardware and/or software problems.  | 
                
                    Lessons
                 | 
            
            
            
                | K-1.NSD.4 | 
                Identify how protocols/rules help people share information over long distances. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.NSD.5 | 
                Identify physical devices that can store information. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CY.1 | 
                Identify reasons for keeping information private. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CY.2 | 
                Identify simple ways to help keep accounts secure. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CY.4 | 
                Decode a word or short message using a simple code. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.CY.5 | 
                Identify when it is appropriate to open and/or click on links or files. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.DL.1 | 
                Identify and explore the keys on a keyboard. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.DL.2 | 
                Communicate and work with others using digital tools. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.DL.3 | 
                Conduct a basic search based on a provided keyword. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.DL.4 | 
                Use a least one digital tool to create a digital artifact. | 
                
                    Lessons
                 | 
            
            
            
                | K-1.DL.7 | 
                Identify actions that promote good digital citizenship and those that do not. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.1 | 
                Identify and analyze how computing technology has changed the way people live and work. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.2 | 
                Compare and explain rules related to computing technologies and digital information.  | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.3 | 
                Discuss and explain how computing technology can be used in society and the world. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.4 | 
                Identify public and private digital spaces. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.5 | 
                Identify and discuss how computers are programmed to make decisions without direct human input in daily life.  | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.6 | 
                Identify and discuss factors that make a computing device or software application easier or more difficult to use. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.IC.7 | 
                Identify a diverse range of roles and skills in computer science. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.1 | 
                Create a model of an object or process in order to identify patterns and essential elements of the object or process. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.2 | 
                Identify and describe data-collection tools from everyday life. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.3 | 
                Present the same data in multiple visual formats in order to tell a story about the data. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.4 | 
                Identify multiple ways that the same problem could be decomposed into smaller steps. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.5 | 
                Identify the essential details needed to perform a general task in different settings or situations. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.6 | 
                Create two or more algorithms for the same task. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.7 | 
                Name/label key pieces of information in a set of instructions, noting whether each name/label refers to a fixed or changing value. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.8 | 
                Identify steps within a task that should only be carried out under certain precise conditions.   | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.9 | 
                Identify and debug errors within an algorithm or program that includes sequencing or repetition. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CT.10 | 
                Develop and document a plan that outlines specific steps taken to complete a project. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.NSD.1 | 
                Describe and demonstrate several ways a computer program can receive data and instructions (input) and can present results (output). | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.NSD.2 | 
                Explain the function of software in computing systems, using descriptive/precise language. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.NSD.3 | 
                Describe and attempt troubleshooting steps to solve a simple technology problem. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.NSD.4 | 
                Recognize that information can be communicated using different representations that satisfy different rules.  | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.NSD.5 | 
                Describe and navigate to various locations where digital information can be stored. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CY.1 | 
                Compare reasons why an individual should keep information private or make information public. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CY.2 | 
                Compare and contrast behaviors that do and do not keep information secure. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CY.3 | 
                Identify why someone might choose to share an account, app access, or devices. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CY.4 | 
                Encode and decode a short message or phrase. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.CY.5 | 
                Identify unusual activity of applications and devices that should be reported to a responsible adult. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.DL.1 | 
                Locate and use the main keys on a keyboard to enter text independently.   | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.DL.2 | 
                Communicate and work with others using digital tools to share knowledge and convey ideas. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.DL.3 | 
                Conduct basic searches based on student-identified keywords. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.DL.4 | 
                Use a variety of digital tools and resources to create digital artifacts. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.DL.6 | 
                Describe ways that information may be shared online. | 
                
                    Lessons
                 | 
            
            
            
                | 2-3.DL.7 | 
                Understand what it means to be part of a digital community and describe ways to keep it a safe, respectful space. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.1 | 
                Describe computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.2 | 
                Explain how laws impact the use of computing technologies and digital information.   | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.3 | 
                Explain current events that involve computing technologies.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.4 | 
                Explain who has access to data in different digital spaces.   | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.5 | 
                Explain how computer systems play a role in human decision-making.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.6 | 
                Identify and explain ways to improve the accessibility and usability of a computing device or software application for the diverse needs and wants of users. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.IC.7 | 
                Identify a diverse range of role models in computer science. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.1 | 
                Develop a computational model of a system that shows changes in output when there are changes in inputs. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.2 | 
                Collect digital data related to a real-life question or need. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.3 | 
                Visualize a simple data set in order to highlight relationships and persuade an audience.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.4 | 
                Decompose a problem into smaller named tasks, some of which can themselves be decomposed into smaller steps.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.5 | 
                Identify and name a task within a problem that gets performed multiple times while solving that problem, but with slightly different concrete details each time. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.6 | 
                Compare two or more algorithms and discuss the advantages and disadvantages of each for a specific task. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.7 | 
                Identify pieces of information that might change as a program or process runs. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.8 | 
                Develop algorithms or programs that use repetition and conditionals for creative expression or to solve a problem. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.9 | 
                Explain each step of an algorithm or program that includes repetition and conditionals for the purposes of debugging.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CT.10 | 
                Describe the steps taken and choices made to design and develop a solution using an iterative design process. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.NSD.1 | 
                Propose improvements to the design of a computing technology based on an analysis of user interactions with that technology. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.NSD.2 | 
                Model how computer hardware and software work together as a system to accomplish tasks. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.NSD.3 | 
                Determine potential solutions to solve hardware and software problems using common troubleshooting strategies. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.NSD.4 | 
                Model how data is structured to transmit through a network. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.NSD.5 | 
                Describe that data can be stored locally or remotely in a network. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CY.1 | 
                Explain why different types of information might need to be protected. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CY.2 | 
                Describe common safeguards for protecting personal information.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CY.3 | 
                Describe trade-offs between allowing information to be public and keeping information private and secure. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CY.4 | 
                Model and explain the purpose of simple cryptographic methods. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.CY.5 | 
                Explain suspicious activity of applications and devices. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.1 | 
                Type on a keyboard while demonstrating proper keyboarding technique. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.2 | 
                Select appropriate digital tools to communicate and collaborate while learning with others.  | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.3 | 
                Conduct and refine advanced multi-criteria digital searches to locate content relevant to varied learning goals. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.4 | 
                Use a variety of digital tools and resources to create and revise digital artifacts. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.5 | 
                Identify common features of digital technologies. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.6 | 
                Describe persistence of digital information and explain how actions in online spaces can have consequences. | 
                
                    Lessons
                 | 
            
            
            
                | 4-6.DL.7 | 
                Identify and describe actions in online spaces that could potentially be unsafe or harmful. | 
                
                    Lessons
                 |