Please enable JavaScript to use CodeHS

Standards Mapping

for Florida Principles of Computer Science

140

Standards in this Framework

140

Standards Mapped

100%

Mapped to Course

Standard Lessons
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration.
  1. 12.1 Engineering Design Process
SC.912.CC.1.2
Utilize tools within a project environment to communicate.
  1. 12.1 Engineering Design Process
SC.912.CC.1.3
Present information and data using presentation software.
  1. 7.1 Project: Password Authenticator
  2. 10.10 Mini-Project: Findings
  3. 12.7 Showcase Your Creation!
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
  5. 12.7 Showcase Your Creation!
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts.
  1. 12.7 Showcase Your Creation!
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability.
  1. 4.7 Errors and Debugging
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products.
  1. 12.7 Showcase Your Creation!
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
  1. 9.1 Software Engineer
  2. 9.2 QA Engineer
  3. 9.3 Designer
  4. 9.4 Project Manager
SC.912.CO.1.2
Identify and select the file format based on trade-offs.
  1. 3.8 Compatibility
SC.912.CO.1.3
Select and use the correct file type for specific tasks.
  1. 3.8 Compatibility
SC.912.CO.1.4
Describe the relationship between drivers, hardware and operating systems.
  1. 3.1 Internal Components
  2. 3.3 Peripheral Devices
  3. 3.7 Hardware and Software
SC.912.CO.1.5
Describe the organization of a computer and its principal components.
  1. 3.1 Internal Components
  2. 3.3 Peripheral Devices
  3. 3.4 Storage Options
  4. 3.5 Network Devices
SC.912.CO.1.7
Describe the process of protecting computer hardware from exploitation.
  1. 1.7 Cybersecurity Essentials
  2. 1.9 Application Security
  3. 1.11 System Administration
  4. 1.12 Environmental Controls
  5. 1.13 Cryptography and Cryptocurrency
SC.912.CO.1.8
Describe how the Internet facilitates global communication.
  1. 2.1 What is the Internet?
  2. 2.5 Emerging Technologies and Society
  3. 3.6 Network Options
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
  1. 1.4 Can All Information Be Trusted?
  2. 9.1 Software Engineer
  3. 11.5 Who Builds AI?
SC.912.CO.2.3
Discuss the central processing unit (CPU).
  1. 3.1 Internal Components
SC.912.CO.2.4
Explore the role of a power supply unit (PSU) in relation to a computer system.
  1. 3.1 Internal Components
SC.912.CO.2.5
Analyze the purpose of various random-access memory (RAM) speeds and storage sizes.
  1. 3.4 Storage Options
SC.912.CO.2.7
Evaluate various forms of input and output (IO).
  1. 3.3 Peripheral Devices
  2. 4.5 User Input
  3. 10.7 Pandas DataFrames
  4. 10.9 Using Functions
SC.912.CO.2.8
Evaluate the basic components of wired computer networks.
  1. 3.5 Network Devices
SC.912.CO.2.9
Evaluate the basic components of wireless computer networks.
  1. 3.2 Sequential, Parallel & Distributed Computing
  2. 3.5 Network Devices
SC.912.CO.2.10
Explore the components of a data packet.
  1. 2.3 Routing and Packets
SC.912.CO.2.11
Investigate the issues that impact network functionality.
  1. 2.2 IP Addresses
  2. 2.4 How Do Websites Work?
  3. 3.2 Sequential, Parallel & Distributed Computing
  4. 3.5 Network Devices
  5. 3.6 Network Options
SC.912.CO.2.12
Describe common network protocols.
  1. 2.3 Routing and Packets
  2. 2.4 How Do Websites Work?
SC.912.CO.2.16
Describe how devices are identified on a network.
  1. 2.2 IP Addresses
SC.912.CO.2.17
Identify similarities and differences between Internet protocol versions.
  1. 2.2 IP Addresses
SC.912.CO.2.18
Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks.
  1. 3.6 Network Options
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem.
  1. 12.1 Engineering Design Process
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software.
  1. 3.7 Hardware and Software
SC.912.CS.1.1
Identify possible risks to maintaining data confidentiality.
  1. 1.7 Cybersecurity Essentials
  2. 1.9 Application Security
  3. 1.12 Environmental Controls
SC.912.CS.1.2
Describe computer security vulnerabilities.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
  3. 1.9 Application Security
SC.912.CS.1.3
Evaluate computer security vulnerabilities.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
  3. 1.9 Application Security
SC.912.CS.2.1
Analyze security and privacy issues that relate to computer networks and network connected devices.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
  3. 1.9 Application Security
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Personal Data and Collection
  3. 1.4 Can All Information Be Trusted?
  4. 1.6 Personal Data Security
SC.912.CS.3.1
Investigate ransomware attacks.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
SC.912.CS.3.2
Explore access control rules.
  1. 1.11 System Administration
SC.912.CS.3.3
Analyze the limitations of a program’s temporary storage and the security vulnerabilities.
  1. 1.10 Dev Tools Capture the Flag
SC.912.CS.3.4
Trace the social engineering attack cycle.
  1. 1.8 Common Cyber Attacks and Prevention
SC.912.DC.2.1
Differentiate between a digital currency and a security.
  1. 1.13 Cryptography and Cryptocurrency
SC.912.DC.2.2
Discuss the risks associated with digital currencies.
  1. 1.13 Cryptography and Cryptocurrency
SC.912.ET.1.1
Describe the emerging features of mobile devices, smart devices and vehicles.
  1. 1.7 Cybersecurity Essentials
SC.912.ET.1.2
Describe the physical and cognitive challenges faced by users when learning to use computer interfaces.
  1. 9.3 Designer
  2. 12.2 Research and Analyze
  3. 12.6 Test
SC.912.ET.1.4
Examine device-to-device interactions that exclude human input.
  1. 1.7 Cybersecurity Essentials
SC.912.ET.1.5
Explore the concepts of virtual and augmented reality.
  1. 2.5 Emerging Technologies and Society
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
  1. 1.2 Social Media Impacts
  2. 2.5 Emerging Technologies and Society
SC.912.ET.2.1
Explore the history of Artificial Intelligence (AI).
  1. 11.1 Human & Artificial Intelligence
  2. 11.2 Generative vs. Predictive AI
  3. 11.5 Who Builds AI?
SC.912.ET.2.5
Describe major applications of artificial intelligence (AI) and machine learning.
  1. 11.2 Generative vs. Predictive AI
  2. 11.3 Large Language Models
  3. 11.6 Intro to Machine Learning
SC.912.ET.2.6
Describe how predictive Artificial Intelligence (AI) can be used to solve problems.
  1. 11.2 Generative vs. Predictive AI
  2. 11.3 Large Language Models
  3. 11.6 Intro to Machine Learning
SC.912.ET.3.2
Examine how robotics are used to address human challenges.
  1. 2.5 Emerging Technologies and Society
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online.
  1. 1.2 Social Media Impacts
  2. 1.3 Personal Data and Collection
  3. 1.6 Personal Data Security
SC.912.HS.1.2
Evaluate the consequences of cyberbullying.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.5 Cyber Ethics and Laws
SC.912.HS.1.3
Determine the consequences of inaction when witnessing unsafe Internet practices.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.5 Cyber Ethics and Laws
  3. 1.8 Common Cyber Attacks and Prevention
SC.912.HS.1.4
Examine the positive outcomes when someone reports suspicious behavior on the Internet.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.5 Cyber Ethics and Laws
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet.
  1. 1.3 Personal Data and Collection
  2. 1.6 Personal Data Security
  3. 1.8 Common Cyber Attacks and Prevention
SC.912.HS.1.6
Describe the impact of permissible privacy and security.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.6 Personal Data Security
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.2.1
Prioritize regulating screen time and the use of electronic devices for mental and physical well-being.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.2.2
Investigate the correlation between sedentary behavior and digital device use.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.2.3
Assess the role of digital health trackers in promoting healthy behaviors.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.2.4
Analyze the relationship between eye strain related to use of technology and exposure to increased blue light.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.1
Discuss the permanency of data on the Internet.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Social Media Impacts
SC.912.PE.1.1
Write code segments.
  1. 4.3 Printing in Python
  2. 4.5 User Input
  3. 5.1 Booleans
  4. 5.2 If Statements
  5. 5.4 Logical Operators
  6. 8.1 Functions
  7. 8.5 Functions and Return Values
  8. 10.9 Using Functions
SC.912.PE.1.2
Create iterative and non-iterative structures within a program.
  1. 5.2 If Statements
  2. 5.4 Logical Operators
  3. 6.1 While Loops
  4. 6.2 For Loops
  5. 6.4 Nested Control Structures
SC.912.PE.1.3
Create selection structures within a program.
  1. 5.2 If Statements
  2. 5.4 Logical Operators
  3. 10.8 Selecting Columns
SC.912.PE.1.5
Write a non-void function that will return a value.
  1. 8.5 Functions and Return Values
SC.912.PE.1.6
Create a nested array to aggregate data.
  1. 10.3 Exploring Data Using Python
SC.912.PE.1.10
Write programs that validate user input.
  1. 7.1 Project: Password Authenticator
SC.912.PE.1.11
Compare the differences in execution of interpreted and compiled languages.
  1. 4.1 The Language of Computers
SC.912.PE.1.12
Classify programming languages.
  1. 4.1 The Language of Computers
  2. 8.2 Functions and Parameters
SC.912.PE.1.13
Describe and identify types of programming errors.
  1. 4.7 Errors and Debugging
SC.912.PE.1.14
Design and implement variables in a program using global and local scope
  1. 8.3 Namespaces in Functions
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used.
  1. 10.3 Exploring Data Using Python
  2. 10.7 Pandas DataFrames
  3. 10.8 Selecting Columns
SC.912.PE.1.17
Examine the building blocks of algorithms.
  1. 4.2 How to Think Like a Programmer
  2. 8.4 Recursion
SC.912.PE.1.18
Develop a computer program.
  1. 7.1 Project: Password Authenticator
  2. 10.2 Gathering Data
  3. 10.3 Exploring Data Using Python
  4. 10.8 Selecting Columns
  5. 12.3 Define
SC.912.PE.1.19
Review a computer program to verify program functionality, programming styles, program usability and adherence to common programming standards.
  1. 4.7 Errors and Debugging
  2. 9.1 Software Engineer
  3. 9.2 QA Engineer
  4. 12.6 Test
SC.912.PE.1.20
Write programs that use standard logic operators.
  1. 5.4 Logical Operators
SC.912.PE.1.21
Use Boolean logic to perform logical operations.
  1. 5.1 Booleans
  2. 5.4 Logical Operators
SC.912.PE.1.23
Compile, run, test and debug a digital artifact.
  1. 4.7 Errors and Debugging
  2. 7.1 Project: Password Authenticator
SC.912.PE.2.3
Compare techniques for analyzing massive data collections.
  1. 10.3 Exploring Data Using Python
  2. 10.4 Modules, Packages & Libraries
  3. 10.7 Pandas DataFrames
SC.912.PE.3.1
Evaluate arithmetic expressions using operator precedence.
  1. 4.6 Mathematical Operators
SC.912.PE.3.2
Decompose a problem by defining new code segments.
  1. 4.2 How to Think Like a Programmer
  2. 6.3 Break and Continue
  3. 6.4 Nested Control Structures
  4. 7.1 Project: Password Authenticator
SC.912.PE.3.4
Evaluate algorithms by their efficiency, correctness and clarity.
  1. 4.3 Printing in Python
  2. 4.4 Variables and Types
  3. 4.8 String Operators
  4. 5.1 Booleans
  5. 5.2 If Statements
  6. 12.6 Test
SC.912.PE.3.8
Describe the concept of parallel processing as a strategy to solve large problems.
  1. 3.2 Sequential, Parallel & Distributed Computing
SC.912.PE.3.10
Simplify a complex problem by using abstraction to manage complexity using functions and parameters, classes and methods.
  1. 8.2 Functions and Parameters
SC.912.PE.3.11
Perform advanced searches to locate information and design a data-collection approach to gather original data.
  1. 1.4 Can All Information Be Trusted?
  2. 10.2 Gathering Data
  3. 12.2 Research and Analyze
SC.912.PE.3.14
Analyze data by identifying patterns through modeling and simulation of real-world data.
  1. 10.5 Series and Central Tendency
  2. 10.6 Measures of Spread
  3. 12.2 Research and Analyze
SC.912.PE.3.15
Test the accuracy of scientific hypotheses using computer models and simulations.
  1. 10.5 Series and Central Tendency
  2. 10.10 Mini-Project: Findings
SC.912.PE.3.16
Design a representation of a computer program.
  1. 9.1 Software Engineer
  2. 12.1 Engineering Design Process
  3. 12.4 Ideate
  4. 12.5 Prototype
  5. 12.6 Test
  6. 12.7 Showcase Your Creation!
SC.912.PE.3.18
Explain the principles of cryptography.
  1. 1.13 Cryptography and Cryptocurrency
SC.912.PE.4.2
Develop a software artifact according to a common software development methodology.
  1. 10.2 Gathering Data
  2. 10.10 Mini-Project: Findings
  3. 12.3 Define
SC.912.PE.4.3
Identify the tools required to develop a program.
  1. 9.1 Software Engineer
  2. 10.3 Exploring Data Using Python
  3. 10.4 Modules, Packages & Libraries
SC.912.PE.4.5
Define user prompts for clarity and usability within a program.
  1. 4.5 User Input
SC.912.PE.4.6
Write a program that utilizes both input and output.
  1. 4.5 User Input
SC.912.PE.4.7
Use internal documentation to collaboratively design a program according to accepted standards.
  1. 12.1 Engineering Design Process
  2. 12.2 Research and Analyze
  3. 12.3 Define
  4. 12.4 Ideate
  5. 12.5 Prototype
  6. 12.6 Test
SC.912.TI.1.1
Analyze historical trends in hardware and software.
  1. 1.13 Cryptography and Cryptocurrency
  2. 3.7 Hardware and Software
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.3
Analyze the impact of digital media.
  1. 1.4 Can All Information Be Trusted?
  2. 2.5 Emerging Technologies and Society
  3. 10.2 Gathering Data
SC.912.TI.1.4
Analyze the impact of digital media on culture and persona.
  1. 1.2 Social Media Impacts
  2. 2.5 Emerging Technologies and Society
SC.912.TI.1.5
Describe the impact of computing on business and commerce.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.6
Describe how technology impacts personal life.
  1. 1.7 Cybersecurity Essentials
  2. 2.5 Emerging Technologies and Society
SC.912.TI.1.7
Evaluate ways in which technology may improve accessibility for the varying needs of learners, including students with disabilities (SWD).
  1. 2.5 Emerging Technologies and Society
  2. 9.3 Designer
  3. 12.2 Research and Analyze
SC.912.TI.1.8
Explain how economic and societal factors are affected by access to critical information.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.10
Analyze technology-related career paths.
  1. 9.1 Software Engineer
  2. 9.2 QA Engineer
  3. 9.3 Designer
  4. 9.4 Project Manager
SC.912.TI.1.12
Examine the history of networking devices.
  1. 3.5 Network Devices
SC.912.TI.1.13
Examine the historical impact of social media.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Social Media Impacts
SC.912.TI.2.1
Research how social media and technology can be used to distort, exaggerate or misrepresent information.
  1. 1.2 Social Media Impacts
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points.
  1. 3.5 Network Devices
SC.912.TI.2.4
Explore the legal ramifications of technology use.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
  1. 3.9 Software Licenses
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property.
  1. 3.9 Software Licenses
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.11
Utilize citation tools when using digital information.
  1. 1.5 Cyber Ethics and Laws
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
  1. 10.2 Gathering Data
  2. 12.1 Engineering Design Process
  3. 12.4 Ideate
  4. 12.5 Prototype
  5. 12.6 Test
  6. 12.7 Showcase Your Creation!
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
  1. 4.2 How to Think Like a Programmer
  2. 12.3 Define
SC.K12.CTR.3.1
Complete tasks with digital fluency.
  1. 4.5 User Input
  2. 10.2 Gathering Data
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
SC.K12.CTR.4.1
Express solutions as computational steps.
  1. 10.2 Gathering Data
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
  1. 7.1 Project: Password Authenticator
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
  1. 12.2 Research and Analyze
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
  1. 7.1 Project: Password Authenticator
  2. 10.2 Gathering Data
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
  1. 7.1 Project: Password Authenticator
  2. 10.2 Gathering Data
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
  1. 10.1 What is Data Science?
  2. 10.7 Pandas DataFrames
  3. 10.10 Mini-Project: Findings
  4. 12.2 Research and Analyze
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
  1. 4.5 User Input
  2. 4.6 Mathematical Operators
  3. 10.5 Series and Central Tendency
  4. 10.6 Measures of Spread
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
  1. 4.3 Printing in Python
  2. 4.4 Variables and Types
  3. 4.7 Errors and Debugging
  4. 4.8 String Operators
  5. 5.1 Booleans
  6. 5.2 If Statements
  7. 12.1 Engineering Design Process
  8. 12.2 Research and Analyze
  9. 12.3 Define
  10. 12.4 Ideate
  11. 12.5 Prototype
  12. 12.6 Test
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
  1. 10.5 Series and Central Tendency
  2. 10.6 Measures of Spread
  3. 10.7 Pandas DataFrames
  4. 12.2 Research and Analyze
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
  1. 7.1 Project: Password Authenticator
  2. 10.5 Series and Central Tendency
  3. 10.10 Mini-Project: Findings
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. 4.6 Mathematical Operators
  2. 7.1 Project: Password Authenticator
  3. 10.5 Series and Central Tendency
  4. 10.6 Measures of Spread
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
  1. 10.2 Gathering Data
  2. 10.9 Using Functions
  3. 10.10 Mini-Project: Findings
  4. 12.2 Research and Analyze
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
  1. 9.2 QA Engineer
  2. 11.3 Large Language Models
ELA.K12.EE.3.1
Make inferences to support comprehension.
  1. 10.1 What is Data Science?
  2. 10.2 Gathering Data
  3. 10.9 Using Functions
  4. 10.10 Mini-Project: Findings
  5. 12.2 Research and Analyze
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
  1. 12.1 Engineering Design Process
  2. 12.2 Research and Analyze
  3. 12.3 Define
  4. 12.4 Ideate
  5. 12.5 Prototype
  6. 12.6 Test
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
  1. 7.1 Project: Password Authenticator
  2. 10.10 Mini-Project: Findings
  3. 12.1 Engineering Design Process
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
  1. 7.1 Project: Password Authenticator
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
ELD.K12.ELL.SI.1
English language learners communicate for social and instructional purposes within the school setting.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Personal Data and Collection
  3. 4.1 The Language of Computers
  4. 4.2 How to Think Like a Programmer
  5. 12.3 Define