Please enable JavaScript to use CodeHS

TX K-5 CS Framework

Standards

Standard Description
K.1.B Identify simple patterns and make predictions based on the patterns. Lessons
K.1.C Identify algorithms (step-by-step instructions) using a sequential process such as first, next, then, and last. Lessons
K.2 Create a sequence of code with or without technology such as solving a maze using drag-and-drop programming or creating step-by-step directions for student movement to a specific location Lessons
K.3.A Practice personal skills, including following directions, needed to successfully implement design processes. Lessons
K.3.B Use a design process with components such as asking questions, brainstorming, or storyboarding to identify and solve authentic problems with adult assistance Lessons
K.4.A Communicate an understanding that data is information collected about people, events, or objects such as computer searches and weather patterns. Lessons
K.4.B Communicate with adult assistance the idea that digital devices can search for and retrieve information. Lessons
K.5 Identify and demonstrate responsible behavior within a digital environment. Lessons
K.6.A Demonstrate acceptable use of digital resources and devices as outlined in local policies or acceptable use policy (AUP). Lessons
K.6.B Communicate an understanding that all digital content has owners. Lessons
K.7.A Identify ways to keep a user account safe, including not sharing login information and logging off accounts and devices. Lessons
K.7.B Identify and discuss what information is safe to share online such as hobbies and likes and dislikes and what information is unsafe such as identifying information. Lessons
K.8.A Use a variety of applications, devices, and online learning environments to engage with content. Lessons
K.8.B Identify basic computer hardware, including a variety of input and output devices, and software using accurate terminology. Lessons
K.8.C Perform software application functions such as opening an application and modifying, printing, and saving digital artifacts using a variety of developmentally appropriate digital tools and resources. Lessons
K.8.D Practice ergonomically correct keyboarding techniques and developmentally appropriate hand and body positions. Lessons
K.8.E Identify, locate, and practice using keys on the keyboard, including letters, numbers, and special keys such as space bar and backspace. Lessons
1.1.A Identify and discuss a problem or task and break down (decompose) the solution into sequential steps. Lessons
1.1.B Identify the simple patterns found in the solutions to everyday problems or tasks. Lessons
1.1.C Create a simple algorithm (step-by-step instructions) for an everyday task. Lessons
1.2 Create a sequence of code that solves a simple problem with or without technology. Lessons
1.3.A Practice personal skills and behaviors, including following directions and mental agility, needed to implement a design process successfully. Lessons
1.3.B Use a design process with components such as asking questions, brainstorming, or storyboarding to identify and solve authentic problems with adult assistance. Lessons
1.4 Identify examples of how technology has impacted different communities. Lessons
1.5.A Explore and collect many types of data such as preferences or daily routines of people, events, or objects. Lessons
1.5.B Conduct a basic search using provided keywords and digital sources with adult assistance. Lessons
1.6 Describe and demonstrate respectful behavior within a digital environment. Lessons
1.7.A Explain and demonstrate the importance of acceptable use of digital resources and devices as outlined in local policies or acceptable use policy (AUP). Lessons
1.7.B Communicate an understanding that all digital content has owners and explain the importance of respecting others' belongings as they apply to digital content and information. Lessons
1.8.A Identify ways to keep a user account safe, including not sharing login information and logging off accounts and devices. Lessons
1.8.B Identify and discuss what information is safe to share online such as hobbies and likes and dislikes and what information is unsafe such as identifying information. Lessons
1.8.C Discuss and define cyberbullying with teacher support and guidance. Lessons
1.9.A Select and use a variety of applications, devices, and online learning environments to create an original product. Lessons
1.9.B Describe basic computer hardware, including a variety of input and output devices, and software using accurate terminology Lessons
1.9.C Perform software application functions such as file management, collaboration, and the creation and revision of digital artifacts using a variety of developmentally appropriate digital tools and resources. Lessons
1.9.D Practice ergonomically correct keyboarding techniques and developmentally appropriate hand and body positions Lessons
1.9.E Identify, locate, and practice using keys on the keyboard, including upper- and lower-case letters, numbers, and special keys such as space bar, shift, and backspace. Lessons
2.1.A Identify and communicate a problem or task and break down (decompose) multiple solutions into sequential steps. Lessons
2.1.B Identify complex patterns and make predictions based on the pattern. Lessons
2.1.C Analyze a plan with adult assistance that outlines the steps needed to complete a task. Lessons
2.1.D Create and troubleshoot simple algorithms (step-by-step instructions) that include conditionals such as if-then statements as they apply to an everyday task. Lessons
2.2.A Identify and explore what a variable is in a sequence of code. Lessons
2.2.B Use a design process to create a sequence of code that includes loops to solve a simple problem with or without technology. Lessons
2.3.A Demonstrate personal skills and behaviors, including effective communication, following directions, and mental agility, needed to implement a design process successfully. Lessons
2.3.B Apply a design process with components such as testing and reflecting to create new and useful solutions to identify and solve for authentic problems. Lessons
2.4 The student demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to identify and analyze how technology impacts different communities. Lessons
2.5.A Identify and collect non-numerical data, such as weather patterns, preferred reading genres, and holidays. Lessons
2.5.B Conduct a basic search independently using provided keywords and digital sources. Lessons
2.6 The student communicates data through the use of digital tools. The student is expected to use a digital tool to individually or collaboratively create and communicate data visualizations such as pictographs and bar graphs. Lessons
2.7 The student identifies appropriate ways to communicate in various digital environments. The student is expected to participate in digital environments to develop responsible and respectful interactions. Lessons
2.8.A Explain and demonstrate the importance of acceptable use of digital resources and devices as outlined in local policies or acceptable use policy (AUP). Lessons
2.8.B Communicate an understanding that all digital content has owners and explain the importance of respecting others' belongings as they apply to digital content and information. Lessons
2.9.A Demonstrate account safety, including creating a strong password and logging off accounts and devices. Lessons
2.9.B Compare and contrast private and public information and discuss what is safe to be shared online and with whom. Lessons
2.9.C Discuss cyberbullying and identify examples. Lessons
2.10.A Select and use a variety of applications, devices, and online learning environments to create and share content. Lessons
2.10.B Identify, compare, and describe the function of basic computer hardware, including a variety of input and output devices, and software applications using accurate terminology. Lessons
2.10.C Operate a variety of developmentally appropriate digital tools and resources to perform software application functions such as reviewing digital artifacts and designing solutions to problems. Lessons
2.10.D Practice ergonomically correct keyboarding techniques and developmentally appropriate hand and body positions. Lessons
2.10.E Identify, locate, and practice using keys on the keyboard, including secondary actions of different keys such as "@," "#," "$," and "?". Lessons
3.1.A decompose story problems into smaller, manageable subproblems and identify a solution to the problems Lessons
3.1.B identify simple and complex patterns in story problems; Lessons
3.1.C develop a plan collaboratively and document a plan that outlines specific steps taken to complete a project; and Lessons
3.1.D debug simple algorithms (set of procedures) by identifying and removing errors Lessons
3.2.A use variables within a program to store data; and Lessons
3.2.B use a design process to create programs that include sequences, loops, and conditionals to express ideas or address a problem. Lessons
3.3.A explain the importance of and demonstrate personal skills and behaviors, including metacognition, effective communication, following directions, and mental agility, needed to implement the design process successfully Lessons
3.3.B apply an appropriate design process using components such as peer and teacher feedback to create new and useful solutions to authentic problems Lessons
3.4 demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to define emerging technologies. Lessons
3.5.A identify and collect numerical data such as the price of goods or temperature Lessons
3.5.B use various search strategies with adult assistance Lessons
3.6 analyze data in graphs to identify and discuss trends and inferences. Lessons
3.7 communicates data through the use of digital tools to inform an audience. The student is expected to use digital tools to communicate and publish results to inform an intended audience. Lessons
3.8.A define digital footprint Lessons
3.8.B define digital etiquette Lessons
3.8.C define digital collaboration Lessons
3.9.A demonstrate adherence to local acceptable use policy (AUP) that reflects positive social behavior in the digital environment Lessons
3.9.B communicate the purpose of copyright law and identify appropriate and inappropriate uses of digital content and information Lessons
3.9.C identify the required elements of citations for digital forms of media Lessons
3.10.A demonstrate account safety, including creating a strong password and logging off accounts and devices Lessons
3.10.B describe ways to employ safe practices such as protecting digital identity and avoid online dangers such as accessing unsafe websites or clicking on suspicious links Lessons
3.10.C discuss cyberbullying and explain how to respond to cyberbullying Lessons
3.11.A compare and contrast applications such as word processor, spreadsheet, and presentation tools for relevance to an assigned task Lessons
3.11.B perform software application functions such as inserting or deleting text, inserting images, and formatting page layout and margins Lessons
3.12.A communicate an understanding of terminology related to operating systems and network systems such as internet, intranet, wireless network, short-range wireless technology, and learning management systems Lessons
3.12.B identify where and how to save files such as using appropriate naming conventions and effective file management strategies Lessons
3.12.C demonstrate proper touch keyboarding techniques with accuracy and ergonomic strategies such as correct hand and body positions Lessons
3.12.D identify and practice using keyboard or other input device shortcuts for actions such as copy, paste, undo, or closing windows Lessons
3.12.E identify minor technical problems with hardware and software and solve the issues with assistance Lessons
4.1.A Decompose story problems into smaller, manageable subproblems and discuss and document various solutions to the problems. Lessons
4.1.B Identify patterns in story problems and make predictions based on the pattern. Lessons
4.1.C Communicate design plans and solutions using a variety of options. Lessons
4.1.D Debug algorithms (set of procedures) by identifying and removing errors. Lessons
4.2.A Use variables within a program to modify data. Lessons
4.2.B Use a design process to create programs that include sequences, loops, and conditionals to express ideas or address a proble Lessons
4.3.A Explain the importance of and demonstrate personal skills and behaviors, including problem solving and questioning, effective communication, following directions, mental agility, and metacognition, that are needed to implement a design process successfully Lessons
4.3.B Apply an appropriate design process that includes components to improve processes and refine original products for authentic problems. Lessons
4.4 Identify examples of emerging technologies. Lessons
4.5.A Classify numerical and non-numerical data. Lessons
4.5.B Identify and collect data by using various search strategies, including two or more keywords within specific parameters. Lessons
4.6 Use digital tools to transform and make inferences about data to answer a question. Lessons
4.7 Use digital tools to communicate results of an inquiry to inform an intended audience. Lessons
4.8.A Describe how information retained online creates a permanent digital footprint. Lessons
4.8.B Describe appropriate digital etiquette for various forms of digital communication such as text, email, and online chat. Lessons
4.8.C Demonstrate appropriate digital etiquette for various forms of digital collaboration such as shared documents, video conferencing, and other platforms. Lessons
4.9.A Demonstrate adherence to local acceptable use policy (AUP) and explain the importance of responsible and ethical technology use. Lessons
4.9.B Describe the rights and responsibilities of a creator, define copyright law, and explain how copyright law applies to creative work. Lessons
4.9.C Create citations for digital forms of media with assistance. Lessons
4.10.A demonstrate account safety, including creating a strong password and logging off devices, and explain the importance of these practices Lessons
4.10.B identify and discuss types of data collection tools such as cookies, pop-ups, smart devices, and unsecured networks and explain why it is important to maintain digital privacy Lessons
4.10.C discuss and explain how to respond to cyberbullying, including advocating for self and others Lessons
4.11.A evaluate and choose applications for relevance to an assigned task Lessons
4.11.B perform software application functions such as outline options, bulleting, and numbering lists, and perform editing functions such as finding and replacing Lessons
4.12.A communicate an understanding of terminology related to virtual systems such as video conferencing, augmented reality, and virtual reality environments Lessons
4.12.B evaluate where and how to save, including the use of appropriate naming conventions and effective file management strategies and folder structures Lessons
4.12.C demonstrate proper touch keyboarding techniques with speed and accuracy and ergonomic strategies such as correct hand and body positions Lessons
4.12.D identify and practice using cross-curricular symbols or other input device shortcuts on a keyboard Lessons
4.12.E use troubleshooting strategies to solve minor technical problems with hardware and software such as restarting software or rebooting hardware Lessons
5.1.A decompose a real-world problem into smaller, manageable subproblems using graphic organizers such as learning maps, concept maps, or other representations of data; Lessons
5.1.B identify patterns in real-world problems and make predictions based on the pattern Lessons
5.1.C design and create an outline collaboratively that documents a problem, possible solutions, and an expected timeline for the development of a coded solution Lessons
5.1.D compare multiple algorithms for the same task and determine which algorithm is the most appropriate for that task Lessons
5.2.A use variables within a program to store and modify data; Lessons
5.2.B use a design process to create block-based programs that include sequences, loops, conditionals, and events to solve an everyday problem Lessons
5.2.C analyze a code and how the code may be reused to develop new or improved programs Lessons
5.3.A takes an active role in learning by using a design process to solve authentic problems for a local or global audience, using a variety of technologies Lessons
5.3.B apply an appropriate design process that includes components to generate multiple solutions for an authentic problem and develop original products Lessons
5.4.A demonstrates an understanding that technology is dynamic and impacts different communities. The student is expected to predict how emerging technologies may impact different communities Lessons
5.5.A identify and collect quantitative and qualitative data with digital tools Lessons
5.5.B identify keyword(s), Boolean operators, and limiters within provided search strategies Lessons
5.6.A uses data to answer questions. The student is expected to use digital tools to analyze and transform data and make inferences to answer questions. Lessons
5.7.A communicates data through the use of digital tools to inform an audience. The student is expected to use digital tools to communicate and display data using appropriate visualization to inform an intended audience. Lessons
5.8.A identify the components of a digital footprint such as online activity, game use, or social media platforms Lessons
5.8.B describe appropriate digital etiquette for addressing different audiences such as peers, teachers, and other adults Lessons
5.8.C apply appropriate digital etiquette for collaborating with different audiences such as peers, teachers, and other adults Lessons
5.9.A demonstrate adherence to local acceptable use policy (AUP) and explain the importance of responsible and ethical technology Lessons
5.9.B describe the purpose of copyright law and the possible consequences for inappropriate use of digital content Lessons
5.9.C create citations for digital forms of media with assistance Lessons
5.10.A discuss cybersecurity strategies such as using a secured internet connection to protect digital information Lessons
5.10.B discuss how data collection technology is used to track online navigation and identify strategies to maintain digital privacy and security Lessons
5.10.C discuss and identify how interactions can escalate online and explain ways to stand up to cyberbullying, including advocating for self and others Lessons
5.11.A identify file types for text, graphics, and multimedia files Lessons
5.11.B perform software application functions, including inserting or deleting text and images and formatting tools or options. Lessons
5.12.A describe and evaluate operating systems, learning management systems, virtual systems, and network systems such as internet, intranet, wireless network, and short-range wireless technology Lessons
5.12.B organize files using appropriate naming conventions and folder structures Lessons
5.12.C demonstrate proper touch keyboarding techniques with increasing speed and accuracy and ergonomic strategies such as correct hand and body positions Lessons
5.12.D demonstrate keyboard or other input device shortcuts with fluency Lessons
5.12.E use help sources to research application features and solve software issues Lessons