K-12 Computer Science Standards

Ohio 5 Computer Science

36 Standards

1

CS.D.5.a

Explore the internal parts of the computing system and their function to understand and describe the role they play in a computer system.

2

CS.HS.5.a

Evaluate digital learning tools/devices to support planning, implementing and reflecting across curricular areas.

3

CS.T.5.a

Diagnose problems and develop strategies to resolve technology issues.

4

NI.N.5.a

Model how information is broken down to be transmitted and then reassembled to help students gain a better understanding of the internet and networks.

5

NI.N.5.b

Apply knowledge of network addresses, names and rules (i.e., protocols) to discuss real-world scenarios.

6

NI.C.5.a

Demonstrate password creation techniques to develop and use a strong password used on personal accounts.

7

NI.C.5.b

Explore and utilize safe online services such as web, email, video, gaming, cloud services and network attached storage devices.

8

NI.IOT.5.a

Learn and model how information is broken down to be transmitted by smart devices to help students visualize how information transfers over the internet.

9

NI.IOT.5.b

Explore the benefits of the IoT with regards to convenience, safety and health to gain an appreciation of the risks involved in using devices, including data theft, identity theft, tracking and other forms of criminality.

10

DA.DCS.5.a

Gather and organize multiple quantitative data elements using a tool to perform various tasks.

11

DA.DCS.5.b

Compare and contrast file formats to demonstrate the advantages and disadvantages of each.

12

DA.VC.5.a

Organize and present collected data using visual or other types of representations to highlight relationships and support a claim.

13

DA.IM.5.a

Utilize data to propose cause and effect relationships and predict outcomes.

14

ATP.A.5.a

Evaluate a multi-step process to diagram the proper steps to solve a problem.

15

ATP.VDR.5.a

Create a variable, a placeholder for storing a value, to understand how it is used in a multi-step process (i.e., algorithm).

16

ATP.CS.5.a

Create a program using sequences, events, loops and conditionals to solve a problem.

17

ATP.M.5.a

Decompose (i.e., break down) the steps needed or not needed (i.e., abstraction) into precise sequences of instructions to design an algorithm.

18

ATP.M.5.b

With grade appropriate complexity, modify, remix or incorporate portions of an existing program into one's own work, to develop something new or add more advanced features.

19

ATP.PD.5.a

Use a design process to plan and develop a program that includes multiple steps and end user preferences.

20

ATP.PD.5.b

Using guided questions, work through a program to identify errors and discuss possible solutions to repair the program.

21

AI.P.5.a

Describe how sensor inputs are converted as analog or digital signals to describe their uses.

22

AI.P.5.b

Demonstrate a limitation of computer perception to understand how computers interact with humans.

23

AI.RR.5.a

Create a classification system using a tree structure to demonstrate binary solutions.

24

AI.RR.5.b

Describe how AI representations support reasoning to answer questions.

25

AI.ML.5.a

Compare three different machine learning approaches to solve a problem.

26

AI.ML.5.b

Describe how algorithms and machine learning can exhibit biases to be aware of how humans introduce bias into algorithms and machine learning.

27

AI.ML.5.c

Describe tasks where AI outperforms human tasks and when it does not and propose possible ways to have AI perform more human tasks.

28

AI.NI.5.a

Describe ways that AI systems can be designed to support inclusivity.

29

AI.SI.5.a

Explore how data is influenced by bias and how it affects decision-making to defend arguments in AI.

30

IC.Cu.5.a

Explain how computing technologies have changed the global community and express how those technologies influence and are influenced by cultural practices.

31

IC.Cu.5.b

Develop, test and refine digital artifacts to improve accessibility and usability.

32

IC.SI.5.a

Collaborate and consider diverse perspectives to improve digital artifacts.

33

IC.SLE.5.a

Use public domain or Creative Commons media, and refrain from copying or using material created by others without permission

34

IC.SLE.5.b

Communicate the effects of sharing personal information on the safety of student identity to determine how to protect students.

35

IC.SLE.5.c

Evaluate the need to keep personal information secure and protect the digital footprint.

36

IC.SLE.5.d

Analyze different forms of cyberbullying and identify strategies to stop cyberbullying.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program