ABCDEFGHIJMNOPQRSTUVWXYZAA
1
STANDARDCore ConceptSub-ConceptGrade LevelGrade Level Series in Sub-ConceptPractice 1Practice 2Practice 3IdentifierProviders
2
Model daily processes by creating and following algorithms to complete tasks.Computational Thinking & ProgrammingAlgorithms K-214.41A-CT-A-1Code.org - Fundamentals
Creative Computing With Scratch - CCS K-2
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
URI - ICDS
3
Develop simple programs with sequences and simple repetitionsComputational Thinking & ProgrammingControl Structures K-215.21A-CT-C-1Code.org - Fundamentals
Creative Computing With Scratch - CCS K-2
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Launch
URI - ICDS
4
Develop a plan that describes a what a computational artifact should look like and how it should perform.Computational Thinking & ProgrammingComputational Design K-215.17.21A-CT-CD-1Code.org - Discoveries
Creative Computing With Scratch - CCS K-2
PLTW - Launch
URI - ICDS
5
Identify a task that includes sequences and simple loops.Computational Thinking & ProgrammingComputational Design K-226.21A-CT-CD-2Creative Computing With Scratch - CCS K-2
PLTW - Launch
URI - ICDS
6
Model real-world objects and/or processes that can be represented by various types of data.Computational Thinking & ProgrammingData Structures and Data Types K-214.41A-CT-D-1PLTW - Launch
URI - ICDS
7
Decompose a task into a set of smaller tasks.Computational Thinking & ProgrammingModularity K-213.21A-CT-M-1Creative Computing With Scratch - CCS K-2
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Launch
URI - ICDS
8
Model real-world data and how it is stored.Computational Thinking & ProgrammingVariables K-215.21A-CT-V-1Bootstrap - Data Science
URI - ICDS
9
Identify the inputs and outputs of a computer system.Computing Systems & NetworksHuman-Computer Interfaces K-217.21A-CSN-H-1Code.org - Fundamentals
10
Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware).Computing Systems & NetworksHardware and Software K-217.21A-CSN-HS-1Code.org - Fundamentals
Code.org - Discoveries
11
Describe the Internet as a place to share and find information.Computing Systems & NetworksNetworks and the Internet K-217.21A-CSN-N-1Code.org - Discoveries
URI - ICDS
12
Describe basic hardware and software problems using appropriate terminology.Computing Systems & NetworksTroubleshooting K-216.27.21A-CSN-T-1
13
Compare and refine multiple algorithms for the same task and determine which is more appropriate to complete the task.Computational Thinking & ProgrammingAlgorithms3-513.36.31B-CT-A-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Launch
URI - ICDS
14
Create programs that combine sequences, loops, conditionals, and/or events.Computational Thinking & ProgrammingControl Structures3-515.21B-CT-C-1Code.org - Discoveries
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Launch
URI - ICDS
15
Use an iterative process to plan the development of a computational artifact by including others' perspectives and considering user preferences.Computational Thinking & ProgrammingComputational Design3-511.15.11B-CT-CD-1Code.org - Fundamentals
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Launch
16
Debug errors in an algorithm or program that includes sequences and simple loops.Computational Thinking & ProgrammingComputational Design3-526.21B-CT-CD-2Code.org - Fundamentals
Creative Computing With Scratch - CCS K-2
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Launch
URI - ICDS
17
Describe steps taken and choices made during the process of creating a computational artifact.Computational Thinking & ProgrammingComputational Design3-537.21B-CT-CD-3Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Launch
URI - ICDS
18
Identify real world examples of data structures and data types.Computational Thinking & ProgrammingData Structures and Data Types3-513.11B-CT-D-1Code.org - Discoveries
PLTW - Launch
URI - ICDS
19
Continually decompose problems into smaller subtasks until each subtask is a managable set of basic operations.Computational Thinking & ProgrammingModularity3-513.21B-CT-M-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Launch
PLTW - CSE
URI - ICDS
20
Create computational artifacts by incorporating existing modules into one's own work to solve a problem.Computational Thinking & ProgrammingModularity3-524.25.31B-CT-M-2Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Launch
URI - ICDS
21
Create programs that use variablesComputational Thinking & ProgrammingVariables3-515.21B-CT-V-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Launch
URI - ICDS
22
Describe how people interact with the various parts of computing systems to accomplish tasks.Computing Systems & NetworksHuman-Computer Interfaces3-517.21B-CSN-H-1PLTW - Launch
23
Model how computer hardware and software work together as a system to accomplish tasks.Computing Systems & NetworksHardware and Software3-514.41B-CSN-HS-1PLTW - Launch
24
Model how information is broken down into smaller pieces of data, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination.Computing Systems & NetworksNetworks and the Internet3-514.41B-CSN-N-1Code.org - Fundamentals
PLTW - Launch
25
Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies.Computing Systems & NetworksTroubleshooting3-516.21B-CSN-T-1Code.org - Fundamentals
26
Describe the risks of sharing personal information, on websites or other public forums. CybersecurityRisks3-518.21B-CY-R-1PLTW - Launch
27
Describe ways personal information can be obtained digitally.CybersecurityRisks3-528.21B-CY-R-2PLTW - Launch
28
Describe the risks of others using one's personal resources or devices.CybersecurityRisks3-538.18.21B-CY-R-3PLTW - Launch
29
Identify and describe unusual data or behaviors of applications and devices that should be reported to a responsible adult.CybersecurityResponse3-518.11B-CY-RP-1Code.org - Discoveries
30
Explain individual actions that protect personal electronic information and devices.CybersecuritySafeguards3-518.11B-CY-S-1Code.org - Discoveries
PLTW - Launch
31
Organize and present collected data to highlight relationships and support a claim.Data & AnalysisCollection, Visualization, Transformation3-514.17.11B-DA-CVT-1Bootstrap - Data Science
PLTW - Launch
URI - ICDS
32
Use data to highlight or propose cause-and-effect relationships, predict outcomes, or communicate an idea.Data & AnalysisInferences and Models3-515.17.11B-DA-IM-1Bootstrap - Data Science
PLTW - Launch
URI - ICDS
33
Store, copy, search, retrieve, modify, and delete data using a computing device.Data & AnalysisStorage3-512.43.21B-DA-ST-1Bootstrap - Data Science
PLTW - Launch
URI - ICDS
34
Use software tools to create and share multimedia artifacts.Digital LiteracyCreation and Use3-518.11B-DL-CU-1Bootstrap - Algebra
PLTW - Launch
URI - ICDS
35
Conduct and refine multi-criteria searches over digital information.Digital LiteracySearching Digital Information3-518.11B-DL-SDI-1URI - ICDS
36
Describe the different high-level tasks that are common to software tools that students use.Digital LiteracyUnderstanding Software Tools3-518.18.31B-DL-US-1PLTW - Launch
URI - ICDS
37
Compare and contrast computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.Responsible Computing & SocietyCulture3-513.11B-RC-CU-1Code.org - Fundamentals
38
Identify ways to improve the accessibility and usability of technology products for the diverse needs and wants of users.Responsible Computing & SocietyCulture3-521.21B-RC-CU-2PLTW - Launch
39
Seek diverse perspectives for the purpose of improving computational artifacts.Responsible Computing & SocietySocial Interactions3-511.11B-RC-SI-1PLTW - Launch
40
Incorporate public domain or creative commons media into a digital artifact, and refrain from copying or using material created by others without permission.Responsible Computing & SocietySafety, Law & Ethics3-517.31B-RC-SLE-1Code.org - Fundamentals
41
Use diagrams and/or pseudocode to plan, analyze, solve and/or code complex problems as algorithms.Computational Thinking & ProgrammingAlgorithms6-814.14.42-CT-A-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Gateway
URI - ICDS
42
Design programs that combine control structures, including nested loops and compound conditionals.Computational Thinking & ProgrammingControl Structures6-815.15.22-CT-C-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Gateway
43
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.Computational Thinking & ProgrammingComputational Design6-811.12.32-CT-CD-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - Gateway
44
Test and debug a program to ensure it runs as intended.Computational Thinking & ProgrammingComputational Design6-826.16.22-CT-CD-2Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Gateway
URI - ICDS
45
Describe choices made during development of computational artifacts.Computational Thinking & ProgrammingComputational Design6-837.22-CT-CD-3Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Gateway
URI - ICDS
46
Organize data into an appropriate data structure in a program.Computational Thinking & ProgrammingData Structures and Data Types6-815.12-CT-D-1PLTW - Gateway
URI - ICDS
47
Decompose computational problems to facilitate the design and implementation of programs.Computational Thinking & ProgrammingModularity6-813.35.12-CT-M-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Gateway
URI - ICDS
48
Create procedures with parameters to organize code and make it easier to reuse.Computational Thinking & ProgrammingModularity6-824.14.32-CT-M-2Code.org - Discoveries
Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Gateway
URI - ICDS
49
Create clearly named variables that represent different data. Perform operations on data stored in variables.Computational Thinking & ProgrammingVariables6-815.15.22-CT-V-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - Gateway
URI - ICDS
50
Identify improvements to the design of computing devices, based on an analysis of how users interact with the devices.Computing Systems & NetworksHuman-Computer Interfaces6-811.12-CSN-H-1PLTW - Gateway
51
Design projects that combine hardware and software components to collect and use data to perform a function.Computing Systems & NetworksHardware and Software6-815.12-CSN-HS-1PLTW - Gateway
52
Model the role of protocols in transmitting data across networks and the Internet.Computing Systems & NetworksNetworks and the Internet6-814.42-CSN-N-1PLTW - Gateway
53
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.Computing Systems & NetworksTroubleshooting6-816.22-CSN-T-1Code.org - Discoveries
PLTW - Gateway
54
Describe tradeoffs between allowing information to be public and keeping information private and secure.CybersecurityRisks6-818.22-CY-R-1PLTW - Gateway
55
Describe social engineering attacks and the potential risks associated with them.CybersecurityRisks6-828.22-CY-R-2
56
Describe risks of using free and open services.CybersecurityRisks6-838.22-CY-R-3
57
Describe which actions to take and not to take when an application or device reports a problem or behaves unexpectedly.CybersecurityResponse6-818.22-CY-RP-1PLTW - Gateway
58
Explain physical and digital security measures that protect electronic information.CybersecuritySafeguards6-818.28.32-CY-S-1PLTW - Gateway
59
Demonstrate how multiple methods of encryption provide secure transmission of information.CybersecuritySafeguards6-828.22-CY-S-2
60
Collect data using computational tools or online sources and transform the data to make it more useful and reliable.Data & AnalysisCollection, Visualization, Transformation6-816.26.32-DA-CVT-1Bootstrap - Data Science
PLTW - Gateway
URI - ICDS
61
Create and refine computational models based on generated or gathered data.Data & AnalysisInferences and Models6-814.45.36.12-DA-IM-1URI - ICDS
62
Discuss potential visible biases that could exist in a dataset and how these biases could affect analysis conclusions.Data & AnalysisInferences and Models6-821.37.12-DA-IM-2Code.org - Discoveries
Bootstrap - Data Science
URI - ICDS
63
Store, retrieve, and share data to collaborate, using a cloud-based system.Data & AnalysisStorage6-812.45.32-DA-S T-1URI - ICDS
64
Describe various low-level data transformations and identify which result in a loss of informationData & AnalysisStorage6-824.14.32-DA-ST-2URI - ICDS
65
Use software tools to create artifacts that engage users over time.Digital LiteracyCreation and Use6-818.12-DL-CU-1PLTW - Gateway
URI - ICDS
66
Conduct searches over multiple types of digital information.Digital LiteracySearching Digital Information6-818.18.22-DL-SDI-1PLTW - Gateway
URI - ICDS
67
Describe the different types of software components that support common tasks in software tools.Digital LiteracyUnderstanding Software Tools6-818.18.32-DL-US-1PLTW - Gateway
URI - ICDS
68
Compare and contrast tradeoffs associated with computing technologies that affect people's everyday activities and career options.Responsible Computing & SocietyCulture6-817.22-RC-CU-1PLTW - Gateway
69
Discuss issues of bias and accessibility in the design of existing technologies.Responsible Computing & SocietyCulture6-821.22-RC-CU-2PLTW - Gateway
70
Collaborate and strategize with many online contributors when creating a computational or digital artifact.Responsible Computing & SocietySocial Interactions6-812.45.22-RC-SI-1
71
Discuss how laws control use and access to intellectual property, and mandate broad access to information technologies.Responsible Computing & SocietySafety, Law & Ethics6-817.32-RC-SLE-1PLTW - Gateway
72
Create computational artifacts that use algorithms to solve computational problems by leveraging prior knowledge and personal interests.Computational Thinking & ProgrammingAlgorithms9-1215.23-CT-A-1Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
PLTW - AP CSP
PLTW - CSE
URI - ICDS
Code.org - AP CSP
73
Create and justify the selection of specific control structures when tradeoffs involve code organization, readability, and program performance and explain the benefits and drawbacks of choices made.Computational Thinking & ProgrammingControl Structures9-1215.23-CT-C-1PLTW - AP CSP
PLTW - CSE
URI - ICDS
Code.org - AP CSP
74
Systematically design and implement computational artifacts for targeted audiences by incorporating feedback from users.Computational Thinking & ProgrammingComputational Design9-1215.13-CT-CD-1PLTW - AP CSP
PLTW - CSE
Code.org - AP CSP
75
Systematically test and refine programs using a range of test cases.Computational Thinking & ProgrammingComputational Design9-1226.13-CT-CD-2Bootstrap - Algebra
Bootstrap - Data Science
PLTW - CSA
76
Document computational artifcacts in order to make them easier to follow, test, and debug.Computational Thinking & ProgrammingComputational Design9-1237.23-CT-CD-3Creative Computing With Scratch - CCS 3-8: BootUp Curriculum
Bootstrap - Algebra
Bootstrap - Data Science
PLTW - AP CSP
PLTW - CSE
PLTW - Cyber Security 3A
URI - ICDS
Code.org - AP CSP
77
Create a program that processes a collection of data.Computational Thinking & ProgrammingData Structures and Data Types9-1215.23-CT-D-1Bootstrap - Data Science
PLTW - AP CSP
PLTW - CSE
URI - ICDS
Code.org - AP CSP
78
Identify existing computational artifacts that can be used for the subtasks of a decomposed problem.Computational Thinking & ProgrammingModularity9-1213.23-CT-M-1Bootstrap - Algebra
PLTW - AP CSP
PLTW - CSE
URI - ICDS
Code.org - AP CSP
79
Create computational artifacts by incorporating pre-defined procedures, self-defined procedures and external artifacts.Computational Thinking & ProgrammingModularity9-1225.25.33-CT-M-2Bootstrap - Data Science
PLTW - AP CSP
PLTW - CSE
URI - ICDS
Code.org - AP CSP
80
Explain the role of a variable within a program, and the scope in which its name and value can be used.Computational Thinking & ProgrammingVariables9-1214.13-CT-V-1URI - ICDS
81
Analyze a computing system and explain how abstractions simplify the underlying implementation details embedded in everyday objects.Computing Systems & NetworksHuman-Computer Interfaces9-1214.13-CSN-H-1PLTW - AP CSP
PLTW - CSE
Code.org - AP CSP
82
Compare levels of abstraction and interactions between application software, system software, and hardware layers.Computing Systems & NetworksHardware and Software9-1214.13-CSN-HS-1PLTW - AP CSP
PLTW - CSE
PLTW - Cyber Security 3A
Code.org - AP CSP
83
Identify the various elements of a network and describe how they function and interact to transfer information.Computing Systems & NetworksNetworks and the Internet9-1217.23-CSN-N-1PLTW - CSA
PLTW - Cyber Security 3B
84
Develop and communicate troubleshooting strategies others can use to identify and fix errors.Computing Systems & NetworksTroubleshooting9-1216.23-CSN-T-1PLTW - CSE
85
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.CybersecurityRisks9-1218.33-CY-R-1PLTW - AP CSP
Code.org - AP CSP
86
Analyze an existing or proposed application to identify the potential ways it could be used to obtain sensitive information.CybersecurityRisks9-1223.18.28.33-CY-R-2PLTW - AP CSP
PLTW - CSE
PLTW - Cyber Security 3A
Code.org - AP CSP
87
Explain how the digital security of an organization may be affected by the actions of its employees.CybersecurityRisks9-1238.13-CY-R-3
88
Describe the appropriate actions to take in response to detected security breaches.CybersecurityResponse9-1218.33-CY-RP-1
89
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.CybersecuritySafeguards9-1218.33-CY-S-1PLTW - AP CSP
PLTW - CSE
PLTW - Cyber Security 3A
Code.org - AP CSP
90
Explain tradeoffs when selecting and implementing cybersecurity recommendations.CybersecuritySafeguards9-1228.33-CY-S-2Code.org - Fundamentals
Code.org - Discoveries
PLTW - AP CSP
PLTW - CSE
PLTW - Cyber Security 3A
Code.org - AP CSP
91
Select appropriate data-collection tools and presentation techniques for different types of data.Data & AnalysisCollection, Visualization, Transformation9-1214.17.23-DA-CVT-1Bootstrap - Data Science
URI - ICDS
92
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.Data & AnalysisInferences and Models9-1214.45.15.23-DA-IM-1Code.org - Discoveries
PLTW - AP CSP
PLTW - Cyber Security 3A
URI - ICDS
Code.org - AP CSP
93
Discuss potential hidden biases that could be introduced while collecting a dataset and how these biases could affect analysis conclusions.Data & AnalysisInferences and Models9-1221.11.37.13-DA-IM-2Code.org - Discoveries
Bootstrap - Data Science
URI - ICDS
94
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.Data & AnalysisInferences and Models9-1234.46.33-DA-IM-3Bootstrap - Data Science
PLTW - CSA
URI - ICDS
95
Explain tradeoffs between storing data locally or in central, cloud-based systems.Data & AnalysisStorage9-1212.45.13-DA-ST-1
96
Translate data for various real-world phenomena, such as characters, numbers, and images, into bits.Data & AnalysisStorage9-1224.13-DA-ST-2PLTW - AP CSP
PLTW - Cyber Security 3A
Code.org - AP CSP
97
Select appropriate software tools or resources to create a significant artifact or solve a problem.Digital LiteracyCreation and Use9-1218.18.33-DL-CU-1Code.org - Fundamentals
PLTW - CSA
URI - ICDS
98
Decompose a complex problem into multiple questions, identify which can be explored through digital sources, and synthesize query results using a variety of software tools.Digital LiteracySearching Digital Information9-1218.18.33-DL-SDI-1Code.org - Discoveries
URI - ICDS
99
Describe different kinds of computations that software tools perform to tailor a system to individual users.Digital LiteracyUnderstanding Software Tools9-1218.18.33-DL-US-1
100
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.Responsible Computing & SocietyCulture9-1211.23-RC-CU-1PLTW - AP CSP
PLTW - CSE
PLTW - Cyber Security 3A
Code.org - AP CSP