Please enable JavaScript to use CodeHS

Elementary Standards Mapping

for Colorado 3 Computer Science Standards

12

Standards in this Framework

Standard Lessons
CS.3.1.1a
Students can refine multiple algorithms (step-by-step instructions) for the same task.
    Multiple Algorithms
    Dash® Robot 1 - Movement
    Cue Robot 1 - Movement
    Creating Algorithms
    Loops: Falling Objects
    KA1.2.3a - The Rabbit Chase: Riley's Escape Part 1
    KA1.2.3b - The Rabbit Chase: Riley's Escape Part 2
    KA1.2.6 - The Rabbit Chase: Help
CS.3.2.1a
Students can discuss real-world cybersecurity problems and how personal information can be protected.
    Strong Usernames and Passwords
    Scout's Cybersecurity Adventure: Part 1
    Scout's Cybersecurity Adventure: Part 2
    Cybersecurity Policies and Laws
    Scout's Cybersecurity Mission
    Scout’s Cryptography Escape Room
CS.3.2.1b
Students can demonstrate safe cloud computing practices.
CS.3.2.1c
Students can explain the vulnerabilities of connecting devices.
    Networks, Packets, and the Internet
    Networks Part 2: Network Protocols
CS.3.4.1a
Students can define personally identifiable information (PII).
    Strong Usernames and Passwords
    Digital Identity
CS.3.5.1a
Students can describe how AI-powered services are used in daily life.
    Training AI Using Data
    Program an AI Chatbot
    Ethical and Responsible Use of Generative AI
    AI Products: Ethical and Responsible Choices
    Humans Vs. Machines
    How Machines Learn
    AI Chatbots
CS.3.5.1b
Students can identify changes in how sectors of society operate due to the introduction of AI.
    AI Products: Ethical and Responsible Choices
CS.3.5.1c
Students can describe how a job will change due to the introduction of AI or robotic technologies.
CS.3.6.1a
Students can discuss and provide examples of cyberbullying and methods of age-appropriate intervention.
    Our Words Have Power (Cyberbullying)
CS.3.6.1b
Students can describe the concept of a digital footprint.
    Digital Identity
CS.3.6.1c
Students can recognize the different motivations that influence appropriate and inappropriate online behaviors.
    Internet Positivity (Unplugged)
    Our Words Have Power (Cyberbullying)
    Safe and Responsible Use of Technology
CS.3.6.1d
Students can discuss examples of cyber-attacks.
    Scout's Cybersecurity Adventure: Part 1
    Scout's Cybersecurity Adventure: Part 2
    Cybersecurity Policies and Laws
    Scout's Cybersecurity Mission
    Scout’s Cryptography Escape Room