3-5.NI.4 Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the internet, and reassembled at the destination.
3-5.NI.6 Create patterns to protect information from unauthorized access.
3-5.IC.20 Discuss computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.
3-5.DA.8 Organize and present collected data visually to highlight relationships and support a claim.
3-5.AP.11 Create programs that use variables to store and modify data.
3-5.AP.12 Create Programs that include events, loops, and conditionals.