CS.AP.6-8.1 |
use algorithms to address complex problems; |
Lessons
|
CS.AP.6-8.2 |
create clearly named variables that represent different data types and perform operations on their values; |
Lessons
|
CS.AP.6-8.3 |
develop programs that combine control structures, including nested loops and compound conditionals; |
Lessons
|
CS.AP.6-8.4 |
decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs; |
Lessons
|
CS.AP.6-8.5 |
create procedures with parameters to organize code and make it easier to reuse; |
Lessons
|
CS.AP.6-8.6 |
seek and incorporate feedback from team members and users to refine a solution that meets user needs; |
Lessons
|
CS.AP.6-8.7 |
incorporate existing code, media, and libraries into original programs, and give attribution; |
Lessons
|
CS.AP.6-8.8 |
systematically test and refine programs using a range of test cases; |
Lessons
|
CS.AP.6-8.9 |
distribute tasks and maintain a project timeline when collaboratively developing computational artifacts; and |
Lessons
|
CS.AP.6-8.10 |
document programs in order to make them easier to follow, test, and debug. |
Lessons
|
CS.CS.6-8.1 |
recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices; |
Lessons
|
CS.CS.6-8.2 |
design projects that combine hardware and software components to collect and exchange data; and |
Lessons
|
CS.CS.6-8.3 |
systematically identify and fix problems with computing devices and their components. |
Lessons
|
CS.DA.6-8.1 |
collect data using computational tools and transform the data to make it more useful and reliable; |
Lessons
|
CS.DA.6-8.2 |
represent data using multiple formats; and |
Lessons
|
CS.DA.6-8.3 |
refine computational models based on the data they have generated. |
Lessons
|
CS.IC.6-8.1 |
compare tradeoffs associated with computing technologies that affect people's everyday activities and career options in Montana and the world, urban, rural, and reservation communities; |
Lessons
|
CS.IC.6-8.2 |
discuss issues of bias and accessibility in the design of existing technologies; |
Lessons
|
CS.IC.6-8.3 |
collaborate with other contributors when creating a computational artifact; and |
Lessons
|
CS.IC.6-8.4 |
describe tradeoffs between allowing information, personal or intellectual, to be public and keeping information private and secure. |
Lessons
|
CS.NI.6-8.1 |
explain how physical and digital security measures protect electronic information; |
Lessons
|
CS.NI.6-8.2 |
apply multiple methods of encryption to demonstrate how to securely transmit information; and |
Lessons
|
CS.NI.6-8.3 |
demonstrate how information is broken down and transmitted through multiple devices over networks and the internet and reassembled at the destination. |
Lessons
|