K-2.DI.1 |
In order to solve a problem, sort information into a useful order. |
Lessons
|
K-2.DI.2 |
Identify and collect data using digital tools (e.g., take pictures of all blue items, create a document with things that start with “a”). |
Lessons
|
K-2.DI.3 |
Define stored information as data and when appropriate, copy, search, retrieve, modify, and delete it. |
Lessons
|
K-2.DI.4 |
Model that data can be stored and manipulated using numbers or symbols to represent information. |
Lessons
|
K-2.DI.5 |
Organize and present data in different visual formats such as charts, graphs, and symbols, and identify and describe patterns to make predictions. |
Lessons
|
K-2.CD.1 |
Use appropriate terminology in identifying and describing computer hardware. |
Lessons
|
K-2.CD.2 |
Describe and troubleshoot basic hardware and software problems using appropriate terminology. |
Lessons
|
K-2.CD.3 |
Select and operate appropriate software to perform a variety of tasks and recognize that users have different needs and preferences for the technology they use. |
Lessons
|
K-2.PA.1 |
Breakdown the steps needed for a desired outcome and plan the order to accomplish the goal. |
Lessons
|
K-2.PA.2 |
Using age-appropriate vocabulary, explain steps taken and choices made to improve the design of a sequence. |
Lessons
|
K-2.PA.3 |
Develop programs with sequences and simple loops, to express ideas or address a problem. |
Lessons
|
K-2.PA.4 |
Identify and fix (debug) errors in sequences and simple loops. |
Lessons
|
K-2.PA.5 |
Model daily processes by creating and following algorithms (sets of step-by-step instructions) to complete tasks. |
Lessons
|
K-2.PA.6 |
Give attribution when using the ideas and creations of others while developing programs. |
Lessons
|
K-2.NC.1 |
Explain what passwords are, why they are used, and why it is important to develop strong passwords to protect devices and information. |
Lessons
|
K-2.IC.1 |
Practice digital citizenship by giving credit when using the ideas and creations of others. |
Lessons
|
K-2.IC.2 |
Compare and contrast the effects of technology on communities and social interactions. |
Lessons
|
K-2.IC.3 |
Identify expected behaviors for working responsibly with others online. |
Lessons
|
K-2.IC.4 |
Keep login information private, and log off of devices appropriately. |
Lessons
|
K-2.DL.1 |
Use technology to research and create multimedia products that support learning across the curriculum. |
Lessons
|
K-2.DL.2 |
With support, communicate and work collaboratively with peers using technology. |
Lessons
|
K-2.DL.3 |
Use standard input and output devices to operate computers and other technologies. |
Lessons
|