ABCDEFGHIJKLMN
1
Grade BandStandard IdentifierConceptSubconcept StandardClarifying StatementUnit 1Unit 2Unit 3Unit 4Unit 5Unit 6AUnit 6BUnit 7
2
4-64-6.CT.4Computational ThinkingAbstraction and DecompositionDecompose a problem into smaller named tasks, some of which can themselves be decomposed into smaller steps. The focus is on identifying smaller steps that solve a larger problem, recognizing that some of those steps must be broken down further until each step is manageable. ✔️✔️
3
4-64-6.CT.6Computational ThinkingAlgorithms and ProgrammingCompare two or more algorithms and discuss the advantages and disadvantages of each for a specific task.Tasks can be unplugged or related to a computer program and reflect a task with a specific result that can be checked.✔️
4
4-64-6.CT.9Computational ThinkingAlgorithms and ProgrammingExplain each step of an algorithm or program that includes repetition and conditionals for the purposes of debugging. Debugging frequently involves stepping or tracing through a program as if you were the computer to reveal errors.✔️
5
4-64-6.CT.10Computational ThinkingAlgorithms and ProgrammingDescribe the steps taken and choices made to design and develop a solution using an iterative design process.An iterative design process involves defining the problem or goal, developing a solution or prototype, testing the solution or prototype, and repeating the process until the problem is solved or desired result is achieved. Describing can include speaking or writing.✔️
6
4-64-6.CY.1CybersecurityRisksExplain why different types of information might need to be protected.The emphasis is on discussing different reasons that adversaries may want to obtain, compromise, or leverage different types of information. At this stage, students should be focused on general concepts.✔️
7
4-64-6.CY.2CybersecuritySafeguardsDescribe common safeguards for protecting personal information. The emphasis is on describing common safeguards such as protecting devices and accounts with strong passwords, keeping software updated, and not sending sensitive information over SMS. ✔️
8
4-64-6.CY.3CybersecuritySafeguardsDescribe trade-offs between allowing information to be public and keeping information private and secure.The focus is on considering the trade-offs of data sharing in different contexts.✔️✔️
9
4-64-6.CY.4CybersecuritySafeguardsModel and explain the purpose of simple cryptographic methods.The focus is on using ciphers to encrypt and decrypt messages as a means of safeguarding data.✔️
10
4-64-6.DL.2Digital LiteracyDigital UseSelect appropriate digital tools to communicate and collaborate while learning with others. Students progress from understanding that people use digital tools to communicate and collaborate to how they use the tools. Communication and collaboration should be purposeful and, when possible and appropriate, with an authentic audience.✔️✔️
11
4-64-6.DL.4Digital LiteracyDigital UseUse a variety of digital tools and resources to create and revise digital artifacts.The focus is on understanding the editing process when creating digital artifacts on multiple platforms.✔️✔️✔️✔️✔️✔️
12
4-64-6.IC.1Impacts of ComputingSocietyDescribe computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.The focus should be on how computing technologies both influence and are influenced by society and culture.✔️
13
4-64-6.IC.2Impacts of ComputingSocietyExplain how laws impact the use of computing technologies and digital information.  The focus is on how laws regulate the use of computing technologies and what might happen if those laws did not exist.  ✔️
14
4-64-6.NSD.2Networks and Systems DesignHardware and SoftwareModel how computer hardware and software work together as a system to accomplish tasks.A model should only include the basic elements of a computer system, including input, output, processor, and storage. ✔️
15
7-87-8.CT.2Computational ThinkingData Analysis and VisualizationCollect and use digital data in a computational artifact.The emphasis is on designing and following collection protocols. Data sources include, but are not limited to, sensors, surveys, and polls. ✔️✔️✔️
16
7-87-8.CT.3Computational ThinkingData Analysis and VisualizationRefine and visualize a data set in order to persuade an audience. Refining includes, but is not limited to, identifying relevant subsets of a data set, deleting unneeded data, and sorting and organizing data to highlight trends.✔️✔️✔️
17
7-87-8.CT.4Computational ThinkingAbstraction and DecompositionWrite a program using functions or procedures whose names or other documentation convey their purpose within the larger task.The focus is on identifying where there is potential to use a function or procedure to create a reusable computation. ✔️✔️✔️✔️
18
7-87-8.CT.5Computational ThinkingAbstraction and DecompositionIdentify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences.The focus is on identifying similar expressions or sequences in code and abstracting them into functions that generalize over the similarities.✔️✔️✔️✔️✔️✔️✔️
19
7-87-8.CT.6Computational ThinkingAlgorithms and ProgrammingDesign, compare, and refine algorithms for a specific task or within a program.Algorithms can be represented in a range of formats, including flowcharts, pseudocode, or written steps. Planning the output of a program, such as with a storyboard or wireframe, is not sufficient on its own.✔️✔️✔️✔️✔️✔️✔️
20
7-87-8.CT.7Computational ThinkingAlgorithms and ProgrammingDesign or remix a program that uses a variable to maintain the current value of a key piece of information.The focus is on understanding that variables can be used to track the value of a concept in a program as it changes over time. ✔️✔️✔️✔️✔️
21
7-87-8.CT.8Computational ThinkingAlgorithms and ProgrammingDevelop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem.The focus is on having students combine control structures, such as conditionals and loops, in such a way that they work together to achieve an outcome that could not be achieved using only one of them.✔️✔️✔️✔️✔️
22
7-87-8.CT.10Computational ThinkingAlgorithms and ProgrammingDocument the iterative design process of developing a computational artifact that incorporates user feedback and preferences.At this level, the emphasis is on using the iterative design process to create a solution or prototype with the end-user in mind and to document the steps taken by the student to gather and incorporate information about the end-user into the computational artifact.✔️✔️✔️✔️✔️✔️✔️✔️
23
7-87-8.CY.2CybersecuritySafeguardsDescribe tradeoffs among physical, digital, and behavioral safeguards that can be employed in different situations. The emphasis is on recommending different types of security measures including physical, digital, and behavioral, for a given situation.✔️
24
7-87-8.DL.2Digital LiteracyDigital UseCommunicate and collaborate with others using a variety of digital tools to create and revise a collaborative product.Students connect with others (students, teachers, families, the community, and/or experts) to further their learning for a specific purpose, give and receive feedback, and create a shared product.✔️✔️✔️✔️✔️✔️✔️✔️
25
7-87-8.IC.1Impacts of ComputingSocietyCompare and contrast tradeoffs associated with computing technologies that affect individuals and society. Topics that could be addressed include, but are not limited to, free speech, communication, and automation. ✔️✔️✔️
26
7-87-8.IC.5Impacts of ComputingEthicsAnalyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals.  The focus is on understanding different factors that introduce bias into an AI system and how those biases affect people.  ✔️✔️✔️✔️✔️
27
7-87-8.NSD.1Networks and Systems DesignHardware and SoftwareDesign a user interface for a computing technology that considers usability, accessibility, and desirability. The emphasis is on designing (but not necessarily creating) a user interface. Designs could include things such as written descriptions, drawings, and/or 3D prototypes.✔️✔️✔️
28
7-87-8.NSD.2Networks and Systems DesignHardware and SoftwareDesign a project that combines hardware and software components. The focus is on designing (but not necessarily creating) a system that involves collecting and exchanging data, including input, output, storage, and processing.✔️✔️✔️✔️
29
7-87-8.NSD.3Networks and Systems DesignHardware and SoftwareIdentify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.The focus is on identifying the source of a problem by using a structured process such as a checklist or flowchart to systematically try solutions that may fix the problem. ✔️✔️
30
9-129-12.CT.1Computational ThinkingModeling and SimulationCreate a simple digital model that makes predictions of outcomes.The focus is on using data to build alternative numerical models that can best represent a data set.✔️
31
9-129-12.CT.2Computational ThinkingData Analysis and VisualizationCollect and evaluate data from multiple sources for use in a computational artifact.The emphasis is on designing and following collection protocols. Data sources include, but are not limited to, sensors, web or database scrapers, and human input.✔️
32
9-129-12.CT.3Computational ThinkingData Analysis and VisualizationRefine and visualize complex data sets to tell different stories with the same data set.The emphasis is on refining large data sets to create multiple narratives depending upon the audience. Large data sets require use of a software tool or app to cross-reference, analyze, refine, and visualize subsets of the data.✔️
33
9-129-12.CT.9Computational ThinkingAlgorithms and ProgrammingSystematically test and refine programs using a range of test cases, based on anticipating common errors and user behavior.The emphasis is on perseverance and the ability to use different test cases on their programs and identify what issues are being tested in each case. ✔️✔️✔️✔️✔️✔️✔️
34
9-129-12.IC.1Impacts of ComputingSocietyEvaluate the impact of computing technologies on equity, access, and influence in a global society.The focus should be on how computing technologies can both perpetuate inequalities and help to bring about equity in society. ✔️
35
9-129-12.IC.2Impacts of ComputingSocietyDebate laws and regulations that impact the development and use of computing technologies and digital information.  The focus is on developing and defending a claim about how a specific law related to computing technologies impacts different stakeholders.✔️
36
9-129-12.IC.3Impacts of ComputingEthicsDebate issues of ethics related to real-world computing technologies. The focus is on developing and defending a claim about a specific ethical dilemma related to computing technologies.   ✔️