Standards in this Framework
Standard | Description |
---|---|
1A-AP-08 | Model daily processes by creating and following algorithms (sets of step-by-step instructions) to complete tasks. |
1A-AP-09 | Model the way programs store and manipulate data by using numbers or other symbols to represent information. |
1A-AP-10 | Develop programs with sequences and simple loops, to express ideas or address a problem. |
1A-AP-11 | Decompose (break down) the steps needed to solve a problem into a precise sequence of instructions. |
1A-AP-12 | Develop plans that describe a program’s sequence of events, goals, and expected outcomes. |
1A-AP-13 | Give attribution when using the ideas and creations of others while developing programs. |
1A-AP-14 | Debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. |
1A-AP-15 | Using correct terminology, describe steps taken and choices made during the iterative process of program development. |
1A-CS-01 | Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. |
1A-CS-02 | Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware). |
1A-CS-03 | Describe basic hardware and software problems using accurate terminology. |
1A-DA-05 | Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. |
1A-DA-06 | Collect and present the same data in various visual formats. |
1A-DA-07 | Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. |
1A-IC-16 | Compare how people live and work before and after the implementation or adoption of new computing technology. |
1A-IC-17 | Work respectfully and responsibly with others online. |
1A-IC-18 | Keep login information private, and log off of devices appropriately. |
1A-NI-04 | Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. |