North Dakota 3 Computer Science and Cybersecurity
28 Standards
3.NI.1
3 LessonsRecognize that information is sent and received over physical or wireless paths.
Aligned Lessons
3.HS.1
6 LessonsIdentify the components and the basic functions of a computer system including peripherals and external storage features.
Aligned Lessons
3.HS.2
10 LessonsIndependently use a computing device to perform a variety of tasks.
Aligned Lessons
3.HS.3
5 LessonsRecognize users have different technology needs and preferences.
Aligned Lessons
3.T.1
4 LessonsWith guidance, apply basic troubleshooting strategies.
Aligned Lessons
3.PSA.1
62 LessonsSolve a task by breaking it into smaller pieces.
Aligned Lessons
3.PSA.2
106 LessonsDebug a program that includes sequencing.
Aligned Lessons
3.DCA.1
9 LessonsCollect and organize data in various visual formats.
Aligned Lessons
3.DD.1
211 LessonsIndependently or collaboratively create programs that use sequencing and looping.
Aligned Lessons
3.DD.2
4 LessonsConvert an algorithm into code.
Aligned Lessons
3.A.1
6 LessonsUse basic search strategies with teacher-selected online sources.
Aligned Lessons
3.E.1
5 LessonsWith guidance, compare and contrast resources based on content and the author’s purpose.
Aligned Lessons
3.C.1
17 LessonsIndependently or collaboratively, create a digital product.
Aligned Lessons
3.IP.1
4 LessonsDefine copyright.
Aligned Lessons
3.IP.2
4 LessonsWith guidance, identify the elements of a citation.
Aligned Lessons
3.IP.3
Explain piracy and plagiarism.
3.IC.1
5 LessonsIdentify technologies that have changed the world.
Aligned Lessons
3.SI.1
1 LessonRecognize that there are various collaborative technologies.
Aligned Lessons
3.SI.2
With guidance, use collaborative technology to seek out diverse perspectives.
3.SE.1
1 LessonIdentify problems that relate to inappropriate use of computing devices and networks. (CYSEC)
Aligned Lessons
3.SE.2
2 LessonsKeep authentication methods confidential and be proactive if they are compromised. (CYSEC)
Aligned Lessons
3.SE.3
1 LessonRecognize that data-collection technology can be used to track navigation online. (CYSEC)
Aligned Lessons
3.SE.4
3 LessonsIdentify the difference between public and private information. (CYSEC)
Aligned Lessons
3.RU.1
11 LessonsIdentify and discuss positive and negative uses of technology and information and their impact.
Aligned Lessons
3.RU.2
1 LessonRecognize similarities and differences between in-person bullying and cyberbullying.
Aligned Lessons
3.RU.3
2 LessonsDevelop a code of conduct, explain, and practice appropriate behavior and responsibilities while participating in an online community.
Aligned Lessons
3.RU.4
4 LessonsComply with Acceptable Use Policies.
Aligned Lessons
3.DI.1
1 LessonRecognize the permanence of their actions in the digital world.