for New York 4-6 Computer Science and Digital Fluency — Mix and Match Middle School Course
Total Standards: 34Mapped: 31Completion: 91%
4-6.CT.1
Develop a computational model of a system that shows changes in output when there are changes in inputs.
2.2 A Day at the Park
3.4 Under the Sea
4-6.CT.10
Describe the steps taken and choices made to design and develop a solution using an iterative design process.
2.3 Karel Adventures: Evaluation
3.5 Tracy Adventures 1: Evaluation
5.9 Karel Challenges
4-6.CT.2
Collect digital data related to a reallife question or need.
12.7 Project: Statistical Questions
12.8 Project: Data Storytelling
4-6.CT.3
Visualize a simple data set in order to highlight relationships and persuade an audience.
12.8 Project: Data Storytelling
12.9 Project: Tell Your Story
4-6.CT.4
Decompose a problem into smaller named tasks, some of which can themselves be decomposed into smaller steps.
2.2 A Day at the Park
5.4 Multiple Functions
5.9 Karel Challenges
4-6.CT.5
Identify and name a task within a problem that gets performed multiple times while solving that problem, but with slightly different concrete details each time.
2.1 Quest for the Rosetta Stone
2.2 A Day at the Park
3.4 Under the Sea
5.5 For Loops
5.6 Conditional Statements
5.7 If/Else Statements
5.8 While Loops
5.9 Karel Challenges
4-6.CT.6
Compare two or more algorithms and discuss the advantages and disadvantages of each for a specific task.
1.3 The Rabbit Chase
2.2 A Day at the Park
5.9 Karel Challenges
4-6.CT.7
Identify pieces of information that might change as a program or process runs.
3.4 Under the Sea
8.3 Variables
9.5 Variables
4-6.CT.8
Develop algorithms or programs that use repetition and conditionals for creative expression or to solve a problem.
1.4 Lost in Space
2.1 Quest for the Rosetta Stone
2.2 A Day at the Park
5.5 For Loops
5.6 Conditional Statements
5.7 If/Else Statements
5.8 While Loops
5.9 Karel Challenges
4-6.CT.9
Explain each step of an algorithm or program that includes repetition and conditionals for the purposes of debugging.
1.4 Lost in Space
2.1 Quest for the Rosetta Stone
2.2 A Day at the Park
5.5 For Loops
5.6 Conditional Statements
5.7 If/Else Statements
5.8 While Loops
5.9 Karel Challenges
4-6.CY.1
Explain why different types of information might need to be protected.
6.4 Cybersecurity
6.6 Encryption
7.4 Privacy & Security
4-6.CY.2
Describe common safeguards for protecting personal information.
6.4 Cybersecurity
7.4 Privacy & Security
4-6.CY.3
Describe trade-offs between allowing information to be public and keeping information private and secure.
6.4 Cybersecurity
7.1 Digital Footprint and Reputation
7.3 Internet Safety
7.4 Privacy & Security
4-6.CY.4
Model and explain the purpose of simple cryptographic methods.
6.6 Encryption
6.7 Project: Steganography
4-6.CY.5
Explain suspicious activity of applications and devices.
6.4 Cybersecurity
4-6.DL.1
Type on a keyboard while demonstrating proper keyboarding technique.
4-6.DL.2
Select appropriate digital tools to communicate and collaborate while learning with others.
4.3 Hardware
4.8 Project: Design the Computer of Tomorrow
7.8 Project: Public Service Announcement
12.9 Project: Tell Your Story
4-6.DL.3
Conduct and refine advanced multicriteria digital searches to locate content relevant to varied learning goals.
7.5 Information Literacy
4-6.DL.4
Use a variety of digital tools and resources to create and revise digital artifacts.
1.3 The Rabbit Chase
1.4 Lost in Space
2.1 Quest for the Rosetta Stone
2.2 A Day at the Park
5.9 Karel Challenges
6.7 Project: Steganography
7.8 Project: Public Service Announcement
10.9 Complete Your Homepage
12.9 Project: Tell Your Story
4-6.DL.5
Identify common features of digital technologies.
4.1 History of Computing
4.2 Software
4.3 Hardware
4-6.DL.6
Describe persistence of digital information and explain how actions in online spaces can have consequences.
7.1 Digital Footprint and Reputation
4-6.DL.7
Identify and describe actions in online spaces that could potentially be unsafe or harmful.
7.3 Internet Safety
4-6.IC.1
Describe computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.
4.1 History of Computing
4-6.IC.2
Explain how laws impact the use of computing technologies and digital information.
4.6 Ethics and Legal Considerations
7.6 Creative Credit & Copyright
4-6.IC.3
Explain current events that involve computing technologies.
4.4 Cloud Computing
4.5 Internet of Things
4.7 The Future of Computing
4-6.IC.4
Explain who has access to data in different digital spaces.
6.5 The CIA Triad
7.4 Privacy & Security
4-6.IC.5
Explain how computer systems play a role in human decision-making
12.1 Your World in Numbers
12.5 Visualizing Data
12.6 Models
4-6.IC.6
Identify and explain ways to improve the accessibility and usability of a computing device or software application for the diverse needs and wants of users.
4.3 Hardware
4.8 Project: Design the Computer of Tomorrow
4-6.IC.7
Identify a diverse range of role models in computer science.
4-6.NSD.1
Propose improvements to the design of a computing technology based on an analysis of user interactions with that technology.
4.3 Hardware
4-6.NSD.2
Model how computer hardware and software work together as a system to accomplish tasks.
4.2 Software
4.3 Hardware
4-6.NSD.3
Determine potential solutions to solve hardware and software problems using common troubleshooting strategies.
4.3 Hardware
4-6.NSD.4
Model how data is structured to transmit through a network.
4-6.NSD.5
Describe that data can be stored locally or remotely in a network.