Indiana 3-5 Academic Standards for Computer Science
19 Standards
3-5.DI.1
73 LessonsDecompose problems and subproblems into parts as a means to solving complex problems. (E)
Aligned Lessons
3-5.DI.2
7 LessonsOrganize and present collected data visually to highlight relationships and support a claim.
Aligned Lessons
3-5.DI.3
58 LessonsDemonstrate how variables can represent data and are used to store and modify information.
Aligned Lessons
3-5.DI.4
8 LessonsDescribe that data can be represented in different forms understandable by people, including words, symbols, and digital displays of color.
Aligned Lessons
3-5.DI.5
13 LessonsUse data to highlight or propose cause-and-effect relationships, predict outcomes, or communicate an idea. (E)
Aligned Lessons
3-5.CD.1
19 LessonsModel how computer hardware and software work together to accomplish tasks.
Aligned Lessons
3-5.CD.2
6 LessonsDetermine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. (E)
Aligned Lessons
3-5.CD.3
19 LessonsDescribe how internal and external parts of computing devices function to form a system.
Aligned Lessons
3-5.CD.4
2 LessonsDescribe what distinguishes humans from machines, focusing on human intelligence versus machine intelligence.
Aligned Lessons
3-5.PA.1
4 LessonsCollaborate with peers to implement problem-solving steps to create a variety of programming solutions. (E)
Aligned Lessons
3-5.PA.2
190 LessonsDesign programs that incorporate sequences, events, loops, and conditionals. (E)
Aligned Lessons
3-5.PA.3
112 LessonsTest and debug (i.e., identify and fix errors) a program or algorithm to ensure it runs as intended.
Aligned Lessons
3-5.PA.4
4 LessonsObserve intellectual property rights and give appropriate attribution when creating or remixing programs. (E)
Aligned Lessons
3-5.PA.5
10 LessonsDescribe choices made during program development using code comments, presentations, and demonstrations. (E)
Aligned Lessons
3-5.NI.1
9 LessonsDiscuss real-world cybersecurity problems and how personal information can be protected. (E)
Aligned Lessons
3-5.NI.2
2 LessonsModel how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the internet, and reassembled at the destination.
Aligned Lessons
3-5.IC.1
11 LessonsDescribe the positive and negative impacts of technology on one’s personal life, society, and our culture. (E)
Aligned Lessons
3-5.IC.2
9 LessonsSeek diverse perspectives for the purpose of improving computational artifacts.
Aligned Lessons
3-5.IC.3
11 LessonsCritique computing technologies that have changed the world. Analyze how those technologies influence and/or are influenced by cultural practices and societal biases.