Standards in this Framework
| Standard | Lessons | 
|---|---|
| 5.BT.1 Use proper posture and ergonomics. |  | 
| 5.BT.2 Locate and use letter and number keys with left and right hand placement. |  | 
| 5.BT.3 Locate and use correct finger/hand for spacebar, enter, and shift key. |  | 
| 5.BT.4 Gain proficiency and speed in keyboarding. (Type 5 words per grade level beginning at 2nd grade.) |  | 
| 5.BT.5 Organize files and folders. | 
 File Management and Data Exploration | 
| 5.BT.6 Manage files and save documents. | 
 File Management and Data Exploration | 
| 5.BT.14 Identify major computer components. | 
 Exploring Computing Systems Practicing with Computing Systems | 
| 5.BT.15 Describe the components and functions of computers and networks. | 
 Networks and Protocols Introduction to Computing Systems Exploring Computing Systems Practicing with Computing Systems Modeling Network Connections | 
| 5.BT.16 Apply strategies for identifying and solving routine problems that occur during everyday computer use. | 
 Exploring Computing Systems Practicing with Computing Systems | 
| 5.DM.4 Create media for a variety of audiences and purposes with the use of appropriate transitions and animations to add interest. | 
 Plan a Quest Design an App Punctuation Game State Project Game Design Project Costumes, Backdrops, and Animations | 
| 5.DC.1 Demonstrate compliance of Responsible Use Policy and classroom rules regarding technology use and networks. | 
 Safe and Responsible Use of Technology | 
| 5.DC.2 Explain responsible uses of technology and digital information and describe potential consequences of inappropriate use. | 
 Strong Usernames and Passwords Digital Identity Ethical and Responsible Use of Generative AI AI Products: Ethical and Responsible Choices Safe and Responsible Use of Technology Standing Up to Cyberbullying | 
| 5.DC.4 Demonstrate save e-mail practices and appropriate e-mail etiquette. | 
 | 
| 5.DC.10 Explain the potential risks associated with the use of networked digital environments (internet, cell phones, wireless networks) and sharing personal information. | 
 Cybersecurity Policies and Laws Safe and Responsible Use of Technology | 
| 5.DC.11 Explain fair use guidelines for copyrighted material (images, music, videos, etc.). | 
 Use and Search the Right Way Remixing Programs | 
| 5.CC.4 Evaluate presentations for organization, content, design, and appropriateness of citation. | 
 | 
| 5.CS.3 Collect, analyze, and represent data effectively. | 
 Using Digital Tools to Create Line Graphs Advanced Data and Programming Programming and Data Project Basic Data and Programming Inquiry Project: Survey Bar Graph Inquiry Project: Data Bar Graph Inquiry Project: Line Graph Guided Research Introduction to Research Choice Research What Can Data Tell Us? | 
| 5.CS.4 Demonstrate and understanding of how information is represented, stored, and processed by a computer. | 
 Practicing with Computing Systems File Management and Data File Management and Data Exploration | 
| 5.CS.5 Optimize an algorithm for execution by a computer. | 
 Loops ScratchJr to Scratch: Events and Loops Cue Robot 3 - Loops and Functions Minecraft® Coding Fundamentals - Repeat Loops with Sea Turtles Loops: Catch the Ball Compare and Refine Algorithms |