Ohio 3 Computer Science
35 Standards
CS.D.3.a
Explore common components (i.e., parts) of a computing system and their function to understand and describe the role they play in a computer system.
CS.HS.3.a
Identify and use digital learning tools/devices to support planning, implementing and reflecting upon a defined task.
CS.T.3.a
Apply troubleshooting strategies given problems and solutions to resolve hardware and software problems.
NI.N.3.a
Describe how communication occurs when information is sent and received over physical or wireless paths to explain communication systems (e.g., sending an email or visiting a website).
NI.N.3.b
Recognize that every device on a network has a unique identification to share or receive information from the global community.
NI.C.3.a
Explore digital safety concepts in order to explain that information can be both public and private, to determine what information can safely be shared and to know how to use passwords to protect information.
NI.C.3.b
Explore and explain grade-appropriate examples of unsafe content, such as pop-ups and malicious links.
NI.IOT.3.a
Describe how devices send and receive information over physical or wireless paths to identify how information is transmitted.
NI.IOT.3.b
Define intelligent devices and describe the difference between smart devices and intelligent devices to identify the difference in their capabilities.
DA.DCS.3.a
Collect quantitative data over time from multiple sources to perform various tasks.
DA.DCS.3.b
Identify different types of information to store in different formats.
DA.VC.3.a
Create a chart or graph to inform a target audience about observations and data collected.
DA.IM.3.a
Utilize data to make predictions and discuss whether there is adequate data to make reliable predictions.
ATP.A.3.a
Construct and reflect on errors in an algorithm to accomplish a given task.
ATP.VDR.3.a
Define and identify a variable, a placeholder for storing a value, to understand how it is used in a multi-step process (i.e., algorithm).
ATP.CS.3.a
Create a program using sequences, events, loops and conditionals to solve a problem.
ATP.M.3.a
Decompose (i.e., break down) the steps needed or not needed (i.e., abstraction) into precise sequences of instructions to design an algorithm.
ATP.PD.3.a
Use a design process to plan the development of a program that solves problems.
ATP.PD.3.b
Using a given program known to contain errors, identify and debug errors to ensure it works.
AI.P.3.a
Use different sensors, analog and digital, and discuss the difference between them.
AI.P.3.b
Describe what computer perception is and how it affects computers to see how it compares to human perception.
AI.RR.3.a
With guidance and support, create a classification system using a tree structure to understand how computers think.
AI.RR.3.b
Use AI to answer questions and describe how the answer is reasonable.
AI.ML.3.a
Label three different machine learning approaches to identify them to see different approaches.
AI.ML.3.b
Give examples of bias to understand what it is and how it affects machine learning.
AI.ML.3.c
Identify tasks that use AI to perform human tasks to understand how humans rely on AI.
AI.NI.3.a
Locate AI systems that are designed to help everyone have equal access.
AI.SI.3.a
Define what a bias is to understand how it can influence humans.
IC.Cu.3.a
Identify computing technologies that have changed the world and express how those technologies influence and are influenced by cultural practice.
IC.Cu.3.b
Identify how computing devices have built-in features to increase accessibility to all users.
IC.SI.3.a
Collaborate and consider diverse perspectives to improve digital artifacts.
IC.SLE.3.a
Use public domain or Creative Commons media, and refrain from copying or using material created by others without permission.
IC.SLE.3.b
Determine whether information should be shared or kept private to protect student identity.
IC.SLE.3.c
Communicate the importance of information security to protect one's own digital footprint.
IC.SLE.3.d
Explain why different types of information might need to be protected, describing common safeguards for protecting personal information.