North Dakota 5 Computer Science and Cybersecurity
28 Standards
5.NI.1
Understand that information is sent and received across physical or wireless paths.
5.HS.1
Compare and contrast physical and virtual systems.
5.HS.2
Independently use a computing device to perform a variety of tasks [Continued growth].
5.HS.3
Recognize users have different technology needs and preferences [Continued growth].
5.T.1
With guidance, apply basic troubleshooting strategies [Continued growth].
5.PSA.1
Create a sequence of instructions from a previous decomposed task.
5.PSA.2
Debug a program that includes sequencing, loops, or conditionals.
5.PSA.3
Work collaboratively to explore multiple solutions to a task.
5.DCA.1
Organize and present collected data to highlight comparisons and support a claim.
5.DD.1
Independently and collaboratively create programs that use sequencing, loops, and conditionals [Continued growth].
5.DD.2
Create solutions to problems using a design method.
5.A.1
Refine your keyword search to improve your results.
5.E.1
With guidance, use a strategy to evaluate information for research purposes [Continued growth].
5.C.1
Independently or collaboratively, create a digital product using two or more tools.
5.IP.1
With guidance, demonstrate an understanding of ethical issues in copyright and fair use.
5.IP.2
With guidance, create a citation [Continued growth].
5.IP.3
With guidance, use strategies to avoid piracy and plagiarism [Continued growth].
5.IC.1
Explain how technologies can change the future.
5.SI.1
With guidance, use collaborative technology to compare and contrast diverse perspectives.
5.SE.1
Recognize that there are real-world cybersecurity problems (i.e., hacking) when interacting online. (CYSEC)
5.SE.2
Create secure authentication to ensure privacy [Continued growth].
5.SE.3
Recognize that data-collection technology can be used to track navigation online [Continued growth].
5.SE.4
Apply strategies to keep your private information safe online. (CYSEC)
5.RU.1
Demonstrate an understanding of the appropriate use of technology and information and the consequences of inappropriate use.
5.RU.2
Use strategies that prevent and deal responsibly with cyberbullying and inappropriate behavior.
5.RU.3
Develop a code of conduct, explain, and practice appropriate behavior and responsibilities while participating in an online community [Continued growth].
5.RU.4
Comply with Acceptable Use Policies.
5.DI.1
Explain the importance of your digital identity [Continued growth].