K-5 TUESDAY - COUNTING GAME
I can log myself into the computer.
I can log myself into the computer.
Click to set custom HTML
1. Find the letters on the keyboard.
2. Build the puzzle
3. Play Koala Karts
4. Teach Your Monster to Read
CSS K-2
1A-CS-01 Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. Subconcept: Devices; Practice 1.1
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. Subconcept: Cybersecurity; Practice 7.3
1A-CS-01 Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. Subconcept: Devices; Practice 1.1
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. Subconcept: Cybersecurity; Practice 7.3