Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CS.1A.1
Select and operate appropriate software to perform a variety of tasks and recognize that users have different needs and preferences for the technology they use. |
|
CS.1A.2
Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware). |
|
CS.1A.3
Describe basic hardware and software problems using accurate terminology. |
|
NI.1A.1
Explain what passwords are and why we use them. |
|
NI.1A.2
Students should understand that computers connect them to people, places, and things around the world. |
|
DA.1A.1
Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. |
|
DA.1A.2
Collect and present the same data in various visual formats. |
|
DA.1A.3
Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. |
|
AP.1A.1
Model daily processes by creating and following algorithms (sets of step-by-step instructions) to complete tasks. |
|
AP.1A.2
Model the way programs store and manipulate data by using numbers or other symbols to represent information. |
|
AP.1A.3
Develop programs with sequences and simple loops to express ideas or address a problem. |
|
AP.1A.4
Decompose (break down) the steps needed to solve a problem into a precise sequence of instructions. |
|
AP.1A.5
Develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
|
AP.1A.6
Give attribution when using the ideas and creations of others while developing programs. |
|
AP.1A.7
Debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. |
|
AP.1A.8
Using correct terminology, describe steps taken and choices made during the iterative process of program development. |
|
IC.1A.1
Compare how people live and work before and after the implementation or adoption of new computing |
|
IC.1A.2
Work respectfully and responsibly with others online. |
|
IC.1A.3
Keep login information private and log off devices appropriately. |
|