K-12 Computer Science Standards

Ohio 4 Computer Science

37 Standards

1

CS.D.4.a

Explore external components (i.e., parts) of a computing system and their function to understand and describe the role they play in a computer system.

2

CS.HS.4.a

Select and use digital learning tools/devices to support planning, implementing and reflecting upon a defined task.

3

CS.T.4.a

Diagnose problems and select an appropriate solution from a list of problems and solutions to resolve hardware and software issues.

4

NI.N.4.a

Describe how information is broken down to be transmitted over a network to help students gain a better understanding of the internet and networks.

5

NI.N.4.b

Describe network addresses, names and rules (i.e., protocols) to share or receive information from the global community.

6

NI.C.4.a

Describe what information should be protected and the importance of a secure password to protect information.

7

NI.C.4.b

Describe and explain safe usage of various online services such as web, email, video, gaming, cloud services and networked drives.

8

NI.IOT.4.a

Explore how information is transferred to the internet from smart and intelligent devices to recognize how the internet and networks operate.

9

NI.IOT.4.b

Describe how transferred information is tagged using identifiers to transmit information about the user so students begin to learn that no information on the internet is anonymous.

10

DA.DCS.4.a

Gather and organize multiple quantitative data elements using a tool to perform various tasks.

11

DA.DCS.4.b

Identify techniques and formats to store, process and retrieve different types of information.

12

DA.VC.4.a

Organize data into subsets to provide different views or commonalities and present insights gained using visual or other types of representations.

13

DA.IM.4.a

Utilize data to make predictions and discuss whether there is adequate data to make reliable predictions.

14

ATP.A.4.a

Construct and refine an algorithm to accomplish a given task.

15

ATP.VDR.4.a

Identify and use a variable, a placeholder for storing a value, to understand how it works in a multi-step process (i.e., algorithm).

16

ATP.CS.4.a

Create a program using sequences, events, loops and conditionals to solve a problem.

17

ATP.M.4.a

Decompose (i.e., break down) the steps needed or not needed (i.e., abstraction) into precise sequences of instructions to design an algorithm.

18

ATP.PD.4.a

Use a design process to plan and develop a program that addresses a multi-step problem.

19

ATP.PD.4.b

Using guided questions, work through a program to identify errors and discuss possible solutions to repair the program.

20

AI.P.4.a

Describe the difference between analog and digital signals to understand their uses.

21

AI.P.4.b

Give examples of computer perception to understand how it is affected by the environment.

22

AI.RR.4.a

Create a classification system using a tree structure to understand binary solutions.

23

AI.RR.4.b

Describe how AI represents knowledge to make a reasonable answer.

24

AI.ML.4.a

Explain three different machine learning approaches to choose which may be best for a given situation.

25

AI.ML.4.b

Explain how machine learning can create a bias to understand how computers can be biased.

26

AI.ML.4.c

Describe tasks where AI outperforms human tasks and when it does not to describe how humans rely on AI.

27

AI.NI.4.a

Use AI systems that are designed to be inclusive and describe how they affect the humans who use them.

28

AI.NI.4.b

Give examples of bias to demonstrate how it can affect decision-making.

29

AI.SI.4.a

Give examples of bias to demonstrate how it can affect specific groups of people.

30

IC.Cu.4.a

List examples of computing technologies that have changed the global community to express how those technologies influenced and are influenced by cultural practice.

31

IC.Cu.4.b

Identify and anticipate diverse user needs to increase accessibility to all users.

32

IC.SI.4.a

Collaborate and consider diverse perspectives to improve digital artifacts.

33

IC.SLE.4.a

Use public domain or Creative Commons media, and refrain from copying or using material created by others without permission.

34

IC.SLE.4.b

Explain why information should be shared or kept private to protect student identity.

35

IC.SLE.4.c

Communicate the importance of protecting your digital footprint.

36

IC.SLE.4.d

Describe tradeoffs between allowing information to be public and keeping information private and secure.

37

IC.SLE.4.e

Explain the effect of cyber bullying and who to tell if this is happening.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program