2nd Grade:
2.AP.1 The student will apply computational thinking to identify patterns, and design algorithms to compare and contrast objects based on attributes.
a. Compare and contrast multiple ways to sort a set of objects.
b. Create a table of features to organize objects.
c. Design an algorithm to sort objects into categories based on multiple
attributes.
2.AP.2 The student will plan and implement algorithms that consists of events and loops using a block-based programming language.
a. Plan and create a design document to guide the construction of a
program using plain language or pseudocode.
b. Identify a section of repeated actions within an algorithm and replace it
with a Loop.
c. Construct step-by-step instructions that include events and repetition.
2.AP.3 The student will use the iterative design process to create, test, and debug a program containing events and loops in a block-based programming tool.
a. Define program.
b. Read and interpret a program expressed in a block-based programming
Language.
c. Analyze and describe the results of a program.
d. Create and test a program that uses events and loops.
e. Revise and improve a program to produce desired outcomes.
Computing Systems (CSY)
2.CSY.1 The student will describe the characteristics of computing systems including hardware, software, input, and output.
a. Describe how hardware and software work together to accomplish a
task.
b. Define and categorize components as inputs and outputs.
c. Describe how a computing system receives input and provides output.
d. Discuss how computers use binary to communicate and process
information.
2.CSY.2 The student will demonstrate an understanding of how to troubleshoot simple hardware and software problems that may occur during use.
a. Propose solutions to simple hardware and software issues.
b. Use appropriate steps to perform simple troubleshooting tasks.
Cybersecurity (CYB)
2.CYB.1 The student will model safe and responsible behaviors when using information and computing technologies.
a. Explain the need for safe and responsible uses of computing
technologies.
b. Create a flowchart to illustrate the process for reporting inappropriate
use of technology at school or at home.
c. Demonstrate and model safe and responsible behaviors when using
computing technologies and online communication.
Data and Analysis (DA)
2.DA.1 The student will analyze data to make decisions with or without a computing device.
a. Collect and record numeric and non-numeric data and describe possible
Patterns.
2.DA.2 The student will manipulate data, create representations, and evaluate data to solve a problem.
a. Create charts, graphs, and models using abstraction to represent data.
b. Analyze data visualizations to draw conclusions.
c. Propose and evaluate a solution to a problem or question based on data
and/or data visualization.
Impacts of Computing (IC)
2.IC.1 The student will examine the positive and negative impacts of how using computing technologies has changed the way people live, work, and interact.
a. Identify current uses of computing/emerging technologies and discuss
how they impact society.
b. Compare and contrast appropriate and inappropriate online behaviors
that apply in the physical environment and the online environment.
c. Model healthy habits for using computing technologies.
2.IC.2 The student will explain the need to balance screen time and other activities.
a. Discuss appropriate times and places for screen use.
b. List and describe alternatives to screen time.
3rd Grade:
Algorithms and Programming (AP)
3.AP.1 The student will apply computational thinking to design algorithms to extend patterns, processes, or components of a problem.
a. Identify a pattern in an algorithm, process, or a problem.
b. Decompose a problem or task into a subset of smaller problems.
c. Design an algorithm to extend either a pattern, process, or component
of a problem.
3.AP.2 The student will plan and implement algorithms that consist of events and conditional control structures using a block-based programming language.
a. Describe the concept of a conditional control structure.
b. Create a design document to plan an algorithm using plain language,
pseudocode, or diagrams.
3.AP.3 The student will use the iterative design process to create, test, and debug programs containing events, loops, and conditional structures in a block-based programming tool.
a. Create and test programs that consist of events, loops, and conditional
structures.
b. Analyze and describe program results to assess validity of outcome.
c. Revise and improve programs to resolve errors or produce desired
outcome.
Cybersecurity (CYB)
3.CYB.1 The student will apply safe practices to protect private information.
a. Identify and distinguish personal information that should be private.
b. Describe the importance of using a strong password.
c. Create and use strong passwords to protect private information.
Data and Analysis (DA)
3.DA.1 The student will gather, store, and organize data to evaluate trends and identify patterns using a computing device.
a. Formulate questions that require the collection or acquisition of data.
b. Gather, organize, sort, and store data.
e. Draw conclusions and make predictions based on observed data.
3.DA.2 The student will create and evaluate data representations and conclusions.
b. Analyze data to identify patterns, draw conclusions, and make
predictions.
Impacts of Computing (IC)
3.IC.2 The student will discuss and describe strategies to manage screen time.
a. Define and describe screen time.
b. Explain the importance of responsible screen time management.
c. Discuss how screen time choices affect one’s personal health and
interactions with others.
3.IC.3 The student will identify and describe computing technology careers and their impact on society.
a. Research computing technology careers.
b. Describe the impact careers in computing technology have on society.
4th Grade:
Algorithms and Programming (AP)
4.AP.1 The student will apply computational thinking to identify patterns and design algorithms to compare and contrast multiple algorithms used for the same task.
a. Decompose an algorithm, process, or problem into a subset of smaller
problems.
b. Identify multiple algorithms for the same task.
c. Describe patterns within multiple algorithms.
d. Determine which algorithm is most effective for a given task.
4.AP.2 The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and conditional control structures using a block-based programming language.
a. Identify user input and its role in improving a program.
b. Describe the concept of a variable.
c. Read and explain a design document to trace and predict an algorithm
using plain language, pseudocode, or diagrams.
d. Create a design document to plan an algorithm using plain language,
pseudocode, or diagrams.
e. Write programs that initialize, assign values to, name, and modify
variables.
4.AP.3 The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, and conditional control structures in a block-based programming tool.
a. Create and test programs that consist of sequencing, loops, variables,
user inputs, and conditional control structures.
b. Create and use variables to store and process data.
c. Trace and predict the value of variables that change over the course of ,
the program’s runtime.
d. Analyze and describe program results to assess validity of outcomes.
e. Revise and improve programs to resolve errors or produce desired
outcomes.
Computing Systems (CSY)
4.CSY.1 The student will model how a computing system works to accomplish a task.
a. Describe how computing systems perceive the world through sensors
and other inputs.
b. Compare and contrast how humans and computers process information
from inputs.
c. Explain how computing devices may be used to classify and organize
input.
d. Diagram and describe a simple computing system indicating
processors, inputs, and outputs.
Cybersecurity (CYB)
4.CYB.2 The student will identify and investigate best practices to safeguard information shared online and through online platforms.
d. Demonstrate proper use and protection of personal passwords.
Data and Analysis (DA)
4.DA.2 The student will create and evaluate data representations to make predictions and conclusions.
a. Formulate questions that require the collection or acquisition of data.
b. Collect data to create charts and graphs.
c. Recognize and analyze patterns and relationships within data sets.
d. Analyze visual representations to make predictions and draw
conclusions.
5th Grade:
Algorithms and Programming (AP)
5.AP.1 The student will apply computational thinking to identify patterns, make use of decomposition to break down problems or processes into sub-components, and design algorithms.
a. Identify patterns and repeated steps in an algorithm, problem, or
process.
b. Decompose a problem or process into a subset of smaller problems or
groups of sequential instructions.
c. Abstract relevant information to identify essential details.
d. Design an algorithm to solve a problem.
5.AP.2 The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and nested conditional control structures using a block-based programming language.
a. Describe the concept of nested conditional control structure.
b. Create a design document to trace and predict an algorithm using plain
language, pseudocode, or diagrams.
c. Read, write, and interpret nested conditional control structures: “if-else”
and “if-else; if-else" statements.
5.AP.3 The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, nested conditional control structures, and two-way branching conditional control structures in a block-based programming tool.
a. Use accurate terminology to describe and explain the iterative design
process.
b. Create and test programs that consist of sequencing, loops, variables,
user inputs, nested conditional control structures, and two-way
branching conditional control structures.
c. Trace and predict outcomes of programs.
d. Analyze and describe program results to assess validity of outcomes.
e. Revise and improve programs to resolve errors or produce desired
outcomes.
Computing Systems (CSY)
5.CSY.3 The student will evaluate and implement troubleshooting strategies when a computing system is not operational.
a. Identify and use troubleshooting protocols to resolve hardware,
software, and connectivity issues.
b. Apply prior troubleshooting practices to new problems as they arise.
Data and Analysis (DA)
5.DA.2 The student will create multiple data representations to make predictions and conclusions.
c. Analyze data as evidence to draw conclusions and make predictions.
Impacts of Computing (IC)
5.IC.2 The student will explain the potential impact of excessive screen time on academic performance.
a. Analyze data to determine the impact of screen time on academic
performance.
b. Describe how academic behaviors that lead to academic success are
impacted by daily screen time.
c. Differentiate usage of screen time that benefit and hinder academic
performance.
6th Grade:
Algorithms and Programming (AP)
6.AP.1 The student will apply computational thinking to identify patterns, make use of decomposition to break down problems or processes into sub-components, and design algorithms.
a. Identify patterns and repeated steps in an algorithm, problem, or
process.
b. Decompose an algorithm, problem, or process into sub-components.
c. Abstract relevant information to identify essential details.
d. Design algorithms using abstraction to accomplish a task or express a
computational process.
6.AP.2 The student will plan and implement algorithms that include conditional control structures and collection of numeric data using a block-based or text-based tool.
a. Create a decision tree diagram to illustrate the decision-making process.
b. Read and write programs that initialize Boolean, integer, and decimal
number variables.
c. Read and write programs that collect numeric data from users.
d. Read and write programs that contain nested conditional control
structures.
e. Predict the results of logic expressions that use Boolean operators: and,
or, and not; including expressions that use relational expressions as one
or more operands.
6.AP.3 The student will use the iterative design process to create, test, and debug programs using a block-based or text-based programming language.
a. Create and test programs that uses multiple conditional control
structures.
b. Incorporate existing code, media, or libraries into original programs.
c. Trace and predict outcomes of programs.
d. Analyze and describe program results to assess validity of outcomes.
e. Analyze the outcomes of programs to identify logic and syntax errors.
f. Incorporate feedback from others to refine program.
g. Revise and improve programs to resolve errors and produce desired
outcomes.
6.AP.4 The student will demonstrate proper attribution when incorporating ideas and works of others.
a. Identify and give proper attribution of information and assets from the
internet and other sources.
Computing Systems (CSY)
6.CSY.2 The student will identify and explain hardware, software, and connectivity problems and troubleshooting solutions.
a. Identify and explain hardware, software, and connectivity problems and
solutions with accurate terminology.
b. Identify resources for troubleshooting hardware, software, and
connectivity-related problems.
Cybersecurity (CYB)
6.CYB.1 The student will evaluate the risks and benefits associated with sharing personal and public resources or artifacts.
a. Identify and explain the difference between personal and public
information.
b. Discuss the consequences of sharing personal and confidential
information online.
c. Evaluate risks and benefits associated with sharing information online.
Data and Analysis (DA)
6.DA.3 The student will make predictions and draw conclusions from data visualizations.
a. Visualize data using appropriate graphs, charts, and data visualization
techniques to enhance understanding and communicate findings
effectively.
b. Use computational tools to analyze patterns within data sets and
identify trends.
c. Draw conclusions and make predictions based on the analysis and
interpretation of the data visualization.
d. Utilize simulations and models to formulate, refine, and test
hypotheses.
Impacts of Computing (IC)
6.IC.1 The student will assess the impact of computing technologies on local society.
a. Explain how computing impacts innovation and describe the
development of new computing technologies in communication,
entertainment, and business.
b. Discuss how computing technologies have influenced various industries
and sectors locally.
c. Research simple and complex problems that computing systems can be
used to solve.
d. Analyze the implications of emerging technologies and potential real-
world impact in the local community.
6.IC.2 The student will analyze the impact of screen time on physical and mental health.
a. Analyze and describe the impact of excessive technology usage may
have on one’s physical health.
b. Examine the impact of blue light on sleep patterns and regulations.
c. Propose strategies that provide alternatives of technology usage to
promote physical activity.
d. Discuss the potential impact the use of social media may have on self-
identity and mental health.
e. Define cyberbullying and its impact on one’s health and well-being.
f. Discuss the possible effects of cyberbullying.
g. Identify ways to report illegal or psychologically maladaptive online
behavior.
6.IC.3 The student will explore career pathways and identify how computer science and computational thinking practices align with these pathways.
a. Investigate a career of interest and determine how computer science and
computational thinking practices are used in the chosen career.
6.IC.4 The student will identify copyrighted and licensed software material.
a. Identify the role of software licenses, including open-source, and why
they are used.
b. Compare and contrast the positives and negatives of various software
licenses.
6.IC.5 The student will describe the impacts of computing network architecture, including the role of the Internet in society.
a. Discuss ethical issues and laws related to accessibility, censorship,
privacy, access, and safety while using the Internet.
b. Explain the role broadband connectivity has in social life, culture, and
global economy.
6.IC.6 The student will investigate and analyze the impact of the progression and advancement of AI technologies on industries.
a. Discuss the type of industries that may be impacted by the use and
integration of Artificial Intelligence (AI).
b. Compare and contrast the evolving nature of work across diverse
industries because of the progression and advancement of Artificial
intelligence.
7th Grade:
Algorithms and Programming (AP)
7.AP.1 The student will apply computational thinking to design programs to accomplish a task as a means of creative expression or scientific exploration.
a. Identify patterns and repeated steps in an algorithm, problem, or process.
b. Decompose an algorithm, problem, or process into sub-components.
c. Abstract relevant information to identify essential details.
d. Contrast various algorithms to solve reasoning problems when
accomplishing a task.
7.AP.2 The student will plan and implement algorithms that include sequencing, loops, variables, user input, conditional control structures, and functions using a block-based or text-based programming tool.
a. Describe the concept of functions for use in a computer program.
b. Plan an algorithm using plain language, pseudocode, or diagrams.
c. Read and write programs that collect and use numeric and text data
from users.
d. Read and write programs that contain nested conditionals and nested
loops.
7.AP.3 The student will use the iterative design process to create, test, and debug programs using a block-based or text-based programming language.
a. Create and test programs that contain multiple control structures.
b. Trace and predict outcomes of programs.
c. Analyze the outcomes of programs to identify logic and syntax errors.
d. Analyze and describe the results of a program to assess validity of
outcomes.
e. Revise and improve an algorithm to resolve errors or produce desired
outcomes.
7.AP.4 The student will apply proper attribution when incorporating other sources into original work.
a. Apply proper methods of attribution when using work from the Internet
and other sources.
b. Incorporate information or assets from the Internet into a program with
proper attribution.
Computing Systems (CSY)
7.CSY.1 The student will design projects that use computing devices to collect and exchange data.
a. Apply project management skills to distribute tasks and maintain
project timeline.
b. Generate ideas combining hardware and software components that can
be used to collect and exchange data.
c. Describe how hardware and software can be used together to collect and
exchange data.
d. Evaluate the usability of hardware and software to collect and exchange
data.
e. Select the hardware and software components for project designs by
considering factors such as functionality, cost, size, speed, accessibility,
and aesthetics.
7.CSY.2 The student will apply computational thinking to troubleshoot and document hardware and software-related problems.
a. Apply systematic processes to resolve hardware, software, and
connectivity-related problems.
b. Compile and record successful methods used to resolve problems for
common hardware, software, and connectivity-related problems.
Cybersecurity (CYB)
7.CYB.1 The student will differentiate physical and digital security measures that protect electronic information.
a. Compare and contrast physical and digital security measures.
b. Research and synthesize the tradeoffs between usability and security.
c. Identify common threats and vulnerabilities associated with Internet use
and internet-based systems.
d. Identify potential solutions to address common threats and
vulnerabilities.
Data and Analysis (DA)
7.DA.1 The student will utilize computational tools to visualize and evaluate data to draw conclusions and make predictions.
a. Develop computational models that simulate real-world phenomena,
considering relevant variables and relationships.
b. Refine and modify computational models based on observed data and
feedback, ensuring alignment with empirical evidence.
c. Analyze patterns and trends within observed data, comparing them
with the predictions made by computational models.
d. Evaluate the effectiveness and accuracy of computational models in
capturing and explaining the observed data.
7.DA.2 The student will explain the process and application of computational thinking in machine learning.
a. Explain how supervised, unsupervised, and/or reinforcement learning
methods utilize decomposition, pattern recognition, abstraction, and
algorithms to learn from and make decisions.
b. Explore neural networks and its role in machine learning and artificial
intelligence.
Impacts of Computing (IC)
7.IC.1 The student will assess the national and global impact of computing technologies.
a. Discuss specific examples of how computing technologies have
influenced various national and global industries and sectors.
b. Analyze the implications of emerging technologies and potential real-
world impact nationally and globally.
c. Evaluate the environmental impact of computing technologies
nationally and globally.
7.IC.2 The student will describe and explain the impact of screen time on interactions with others.
a. Describe the positive and negative impact of social media on
socialization.
b. Research the type of data collected on social media and online
platforms that monitor social interactions.
c. Describe and explain the evolution of screen time and the impact it has
had on social interactions.
d. Create a social media usage plan that demonstrates safe practices,
meaningful use, and a balanced approach.
7.IC.3 The student will identify individual preferences, skillset, and experiences and determine how these relate to a chosen computer science career field.
a. Use a career interest assessment to identify and categorize preferences,
skillsets, and experiences.
b. Evaluate and connect personal skillsets, interests, talents, and values to a
computer science career.
7.IC.4 The student will identify and apply strategies to prevent personal and public works from being pirated and plagiarized.
a. Discuss and describe intellectual property protections.
b. Research and list safeguards used to prevent intellectual property
infringement.
8th Grade:
Algorithms and Programming (AP)
8.AP.1 The student will apply computational thinking to construct programs to accomplish a task as a means of creative expression or scientific exploration.
a. Identify patterns and repeated steps in an algorithm, problem, or process.
b. Decompose an algorithm, problem, or process into sub-components.
c. Abstract relevant information to identify essential details.
d. Use pseudocode, decision trees, or flowcharts to illustrate complex
problems as algorithms.
8.AP.2 The student will plan and implement algorithms that include sequencing, loops, variables, user input, conditional control structures, functions, and various data types.
a. Describe the concept of input and output of various data types for use
in a computer program.
b. Plan an algorithm using plain language, pseudocode, or diagrams.
c. Write and test algorithms expressed using block-based or text-based
programming languages.
8.AP.3 The student will use the iterative design process to create, test, and debug programs using a block-based or text-based programming language.
a. Create and test programs that contain multiple control structures.
b. Trace and predict outcomes of programs.
c. Analyze the outcomes of programs to identify logic and syntax errors.
d. Analyze and describe the results of a program to assess validity of
outcomes.
e. Revise and improve an algorithm to resolve errors or produce desired
outcomes.
8.AP.4 The student will incorporate work from others into programs and projects.
a. Explain the role of Creative Commons licensing for the use and
modification or “remixing” of information.
b. Utilize Creative Commons assets in a programming project.
c. Use and remix code from other projects within a programming project
and provide proper attribution.
Computing Systems (CSY)
8.CSY.1 The student will recommend and design improvements to computing devices based on the needs of various users.
a. Analyze existing computing devices for advantages and limitations.
b. Recommend and design improvements to computing devices based on
user interactions.
8.CSY.2 The student will apply computational thinking to troubleshoot and document hardware and software-related problems.
a. Apply systematic processes to resolve hardware, software, and
connectivity-related problems.
b. Design an end-user document/guide to resolve hardware, software, and
connectivity-related problems.
Cybersecurity (CYB)
8.CYB.1 The student will investigate and describe ways to protect sensitive data from malware and other attacks.
a. Identify impacts of hacking, ransomware, scams, phishing, fake
vulnerability scans and the ethical and legal concerns.
b. Describe how cyber-attacks can affect a computing system.
c. Compare and contrast safe and unsafe computing practices.
d. Explore how industries and emerging technologies are addressing cyber
Solutions.
e. Model common prevention practices for cyber-attacks.
8.CYB.2 The student will investigate and explain how physical and digital security measures can protect electronic information for businesses, governments, and organizations.
a. Investigate and explain how physical and digital security measures are
used to safeguard electronic information.
b. Research the advantages and limitations of different security measures
in protecting users against security threats.
c. Explore how emerging technologies may affect methods to safeguard
personal and public data.
Data and Analysis (DA)
8.DA.1 The student will create computational models to simulate events or represent phenomena.
a. Compare and contrast the use of computational models and simulations
to analyze patterns and replicate phenomena.
b. Design and create complex computational models that simulate dynamic
systems (abstraction), incorporating multiple variables and
interactions.
c. Refine computational models based on generated outcomes.
8.DA.2 The student will evaluate computational models to analyze patterns and make recommendations or predictions.
a. Define data biases within a dataset and the unintended consequences
that may impact data reliability and final analysis.
b. Analyze patterns and interpret data generated by computational models
and simulations, identifying meaningful patterns and relationships.
c. Utilize data visualization techniques to communicate and present
findings derived from computational models and simulations.
Impacts of Computing (IC)
8.IC.1 The student will assess the social impacts and ethical considerations of computing technologies.
a. Analyze the impact of sharing data through computing technologies.
b. Critique the role the Internet plays in social life, the global economy,
and culture.
c. Evaluate online and print sources for credibility and reliability.
d. Research and discuss factors that impact access and availability to
computing technologies.
e. Discuss ethical issues around cybersecurity and networks: censorship,
privacy, safety, and access.
8.IC.2 The student will analyze and evaluate the ramifications of screen time in one’s life.
a. Analyze scenarios or case studies to assess the impact of screen time on
one’s physical and mental health.
8.IC.3 The student will identify opportunities for education, training, and preparation to enter into a chosen computer science career field.
a. Identify an education and training plan for a chosen computer science
career.
b. Outline the use of computer science skills required in a chosen career.
c. Develop short-and long-term goals for a chosen career.
d. Research emerging trends in a chosen career path.