K-12 Computer Science Standards

NY CS K-6 [Archived]

97 Standards

1

K-1.IC.1

Identify and discuss how tasks are accomplished with and without computing technology.

2

K-1.IC.2

Identify and explain classroom and home rules related to computing technologies.

3

K-1.IC.3

Identify computing technologies in the classroom, home, and community.

4

K-1.IC.4

Identify public and private spaces in our daily lives.

5

K-1.IC.6

With teacher support, identify different ways people interact with computers and computing devices.

6

K-1.IC.7

Identify multiple jobs that use computing technologies.

7

K-1.CT.1

Identify and describe one or more patterns (found in nature or designed), and examine the patterns to find similarities and make predictions.

8

K-1.CT.2

Identify different kinds of data that can be collected from everyday life.

9

K-1.CT.3

Identify ways to visualize data, and collaboratively create a visualization of data.

10

K-1.CT.4

Identify a problem or task and discuss ways to break it into multiple smaller steps.

11

K-1.CT.5

Recognize that the same task can be described at different levels of detail.

12

K-1.CT.6

Follow an algorithm to complete a task.

13

K-1.CT.7

Identify terms that refer to different concrete values over time.

14

K-1.CT.8

Identify a task consisting of steps that are repeated, and recognize which steps are repeated.

15

K-1.CT.9

Identify and fix (debug) errors within a simple algorithm.

16

K-1.CT.10

Collaboratively create a plan that outlines the steps needed to complete a task.

17

K-1.NSD.1

Identify ways people provide input and get output from computing devices.

18

K-1.NSD.2

Identify basic hardware components that are found in computing devices.

19

K-1.NSD.3

Identify basic hardware and/or software problems.

20

K-1.NSD.4

Identify how protocols/rules help people share information over long distances.

21

K-1.NSD.5

Identify physical devices that can store information.

22

K-1.CY.1

Identify reasons for keeping information private.

23

K-1.CY.2

Identify simple ways to help keep accounts secure.

24

K-1.CY.4

Decode a word or short message using a simple code.

25

K-1.CY.5

Identify when it is appropriate to open and/or click on links or files.

26

K-1.DL.1

Identify and explore the keys on a keyboard.

27

K-1.DL.2

Communicate and work with others using digital tools.

28

K-1.DL.3

Conduct a basic search based on a provided keyword.

29

K-1.DL.4

Use a least one digital tool to create a digital artifact.

30

K-1.DL.7

Identify actions that promote good digital citizenship and those that do not.

31

2-3.IC.1

Identify and analyze how computing technology has changed the way people live and work.

32

2-3.IC.2

Compare and explain rules related to computing technologies and digital information.

33

2-3.IC.3

Discuss and explain how computing technology can be used in society and the world.

34

2-3.IC.4

Identify public and private digital spaces.

35

2-3.IC.5

Identify and discuss how computers are programmed to make decisions without direct human input in daily life.

36

2-3.IC.6

Identify and discuss factors that make a computing device or software application easier or more difficult to use.

37

2-3.IC.7

Identify a diverse range of roles and skills in computer science.

38

2-3.CT.1

Create a model of an object or process in order to identify patterns and essential elements of the object or process.

39

2-3.CT.2

Identify and describe data-collection tools from everyday life.

40

2-3.CT.3

Present the same data in multiple visual formats in order to tell a story about the data.

41

2-3.CT.4

Identify multiple ways that the same problem could be decomposed into smaller steps.

42

2-3.CT.5

Identify the essential details needed to perform a general task in different settings or situations.

43

2-3.CT.6

Create two or more algorithms for the same task.

44

2-3.CT.7

Name/label key pieces of information in a set of instructions, noting whether each name/label refers to a fixed or changing value.

45

2-3.CT.8

Identify steps within a task that should only be carried out under certain precise conditions.

46

2-3.CT.9

Identify and debug errors within an algorithm or program that includes sequencing or repetition.

47

2-3.CT.10

Develop and document a plan that outlines specific steps taken to complete a project.

48

2-3.NSD.1

Describe and demonstrate several ways a computer program can receive data and instructions (input) and can present results (output).

49

2-3.NSD.2

Explain the function of software in computing systems, using descriptive/precise language.

50

2-3.NSD.3

Describe and attempt troubleshooting steps to solve a simple technology problem.

51

2-3.NSD.4

Recognize that information can be communicated using different representations that satisfy different rules.

52

2-3.NSD.5

Describe and navigate to various locations where digital information can be stored.

53

2-3.CY.1

Compare reasons why an individual should keep information private or make information public.

54

2-3.CY.2

Compare and contrast behaviors that do and do not keep information secure.

55

2-3.CY.3

Identify why someone might choose to share an account, app access, or devices.

56

2-3.CY.4

Encode and decode a short message or phrase.

57

2-3.CY.5

Identify unusual activity of applications and devices that should be reported to a responsible adult.

58

2-3.DL.1

Locate and use the main keys on a keyboard to enter text independently.

59

2-3.DL.2

Communicate and work with others using digital tools to share knowledge and convey ideas.

60

2-3.DL.3

Conduct basic searches based on student-identified keywords.

61

2-3.DL.4

Use a variety of digital tools and resources to create digital artifacts.

62

2-3.DL.6

Describe ways that information may be shared online.

63

2-3.DL.7

Understand what it means to be part of a digital community and describe ways to keep it a safe, respectful space.

64

4-6.IC.1

Describe computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.

65

4-6.IC.2

Explain how laws impact the use of computing technologies and digital information.

66

4-6.IC.3

Explain current events that involve computing technologies.

67

4-6.IC.4

Explain who has access to data in different digital spaces.

68

4-6.IC.5

Explain how computer systems play a role in human decision-making.

69

4-6.IC.6

Identify and explain ways to improve the accessibility and usability of a computing device or software application for the diverse needs and wants of users.

70

4-6.IC.7

Identify a diverse range of role models in computer science.

71

4-6.CT.1

Develop a computational model of a system that shows changes in output when there are changes in inputs.

72

4-6.CT.2

Collect digital data related to a real-life question or need.

73

4-6.CT.3

Visualize a simple data set in order to highlight relationships and persuade an audience.

74

4-6.CT.4

Decompose a problem into smaller named tasks, some of which can themselves be decomposed into smaller steps.

75

4-6.CT.5

Identify and name a task within a problem that gets performed multiple times while solving that problem, but with slightly different concrete details each time.

76

4-6.CT.6

Compare two or more algorithms and discuss the advantages and disadvantages of each for a specific task.

77

4-6.CT.7

Identify pieces of information that might change as a program or process runs.

78

4-6.CT.8

Develop algorithms or programs that use repetition and conditionals for creative expression or to solve a problem.

79

4-6.CT.9

Explain each step of an algorithm or program that includes repetition and conditionals for the purposes of debugging.

80

4-6.CT.10

Describe the steps taken and choices made to design and develop a solution using an iterative design process.

81

4-6.NSD.1

Propose improvements to the design of a computing technology based on an analysis of user interactions with that technology.

82

4-6.NSD.2

Model how computer hardware and software work together as a system to accomplish tasks.

83

4-6.NSD.3

Determine potential solutions to solve hardware and software problems using common troubleshooting strategies.

84

4-6.NSD.4

Model how data is structured to transmit through a network.

85

4-6.NSD.5

Describe that data can be stored locally or remotely in a network.

86

4-6.CY.1

Explain why different types of information might need to be protected.

87

4-6.CY.2

Describe common safeguards for protecting personal information.

88

4-6.CY.3

Describe trade-offs between allowing information to be public and keeping information private and secure.

89

4-6.CY.4

Model and explain the purpose of simple cryptographic methods.

90

4-6.CY.5

Explain suspicious activity of applications and devices.

91

4-6.DL.1

Type on a keyboard while demonstrating proper keyboarding technique.

92

4-6.DL.2

Select appropriate digital tools to communicate and collaborate while learning with others.

93

4-6.DL.3

Conduct and refine advanced multi-criteria digital searches to locate content relevant to varied learning goals.

94

4-6.DL.4

Use a variety of digital tools and resources to create and revise digital artifacts.

95

4-6.DL.5

Identify common features of digital technologies.

96

4-6.DL.6

Describe persistence of digital information and explain how actions in online spaces can have consequences.

97

4-6.DL.7

Identify and describe actions in online spaces that could potentially be unsafe or harmful.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program