K-12 Computer Science Standards

Indiana K-2 Academic Standards for Computer Science

17 Standards

1

K-2.DI.1

Identify and collect data using digital tools (e.g., take pictures of all blue items, create a document with things that start with “a”).

2

K-2.DI.2

Define stored information as data and when appropriate, copy, search, retrieve, modify, and delete it.

3

K-2.DI.3

Model that data can be stored and manipulated using numbers or symbols to represent information.

4

K-2.DI.4

Organize and present data in different visual formats such as charts, graphs, and symbols, and identify and describe patterns to make predictions. (E)

5

K-2.CD.1

Use appropriate terminology in identifying and describing computer hardware. (E)

6

K-2.CD.2

Describe and troubleshoot basic hardware and software problems using appropriate terminology.

7

K-2.CD.3

Select and operate appropriate software to perform a variety of tasks and recognize that users have different needs and preferences for the technology they use.

8

K-2.PA.1

Breakdown and plan the order of the steps needed for a desired outcome to accomplish the goal. (E)

9

K-2.PA.2

Using age-appropriate vocabulary, explain steps taken and choices made to improve the design of a sequence.

10

K-2.PA.3

Develop programs with sequences and simple loops to express ideas or address a problem. (E)

11

K-2.PA.4

Identify and fix (debug) errors in sequences and simple loops.

12

K-2.PA.5

Model daily processes by creating and following algorithms (i.e., sets of step-by-step instructions) to complete tasks. (E)

13

K-2.PA.6

Give attribution when using the ideas and creations of others while developing programs.

14

K-2.NI.1

Explain what passwords are, why they are used, and why it is important to develop strong passwords to protect devices and information. (E)

15

K-2.IC.1

Compare and contrast the effects of technology on communities and social interactions.

16

K-2.IC.2

Identify expected behaviors for working responsibly with others online. (E)

17

K-2.IC.3

Describe how to keep login information private and log off of devices appropriately.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program