K-4 WEDNESDAY
I can log myself into the computer.
I can log myself into the computer.
1. Find the letters on the keyboard.
2. Count the fish
3. Build the puzzle.
4. Teach Your Monster to Read
CSS K-2
1A-CS-01 Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. Subconcept: Devices; Practice 1.1
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. Subconcept: Cybersecurity; Practice 7.3
1A-CS-01 Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. Subconcept: Devices; Practice 1.1
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. Subconcept: Cybersecurity; Practice 7.3