2-AP-10 |
Use flowcharts and/or pseudocode to address complex problems as algorithms. |
-
1.10 Top Down Design
-
3.3 Comments & Pseudocode
-
11.4 Functions in Karel
-
11.5 The Start Function
-
11.6 Top Down Design and Decomposition in Karel
-
11.7 Commenting Your Code
-
11.16 Karel Challenges
|
2-AP-11 |
Create clearly named variables that represent different data types and perform operations on their values. |
-
1.7 Naming Guidelines
-
1.11 Variables
-
1.12 User Input
-
1.13 Parameters
-
1.16 If Statements
-
1.17 If/ Else Statements
-
1.18 While Loops
-
1.19 Putting Together Control Structures
-
3.4 Variables
-
12.1 Extra Karel Puzzles
|
2-AP-12 |
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
-
11.12 While Loops in Karel
-
11.13 Control Structures Example
-
12.1 Extra Karel Puzzles
-
14.1 For Loops
-
14.2 While Loops
-
14.4 If/Else Statements
-
15.1 micro:bit Challenges
|
2-AP-13 |
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. |
-
1.11 Variables
-
1.14 Using i in For Loops
-
1.15 Extended Loop Control
-
1.16 If Statements
-
1.17 If/ Else Statements
-
1.18 While Loops
-
3.3 Comments & Pseudocode
-
11.16 Karel Challenges
|
2-AP-14 |
Create procedures with parameters to organize code and make it easier to reuse. |
-
1.16 If Statements
-
1.17 If/ Else Statements
-
11.16 Karel Challenges
-
12.1 Extra Karel Puzzles
-
14.5 Functions
|
2-AP-15 |
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
-
1.20 Using Data to Refine Game Mechanics
-
7.5 Prototype
-
15.4 Final Project
|
2-AP-16 |
Incorporate existing code, media, and libraries into original programs, and give attribution. |
-
6.6 Copyright
-
6.10 Project: Your First Website, Pt 1
-
6.16 Project: Your First Website, Pt 2
-
7.7 Build Your Website!
|
2-AP-17 |
Systematically test and refine programs using a range of test cases. |
-
1.20 Using Data to Refine Game Mechanics
-
11.10 If Statements
-
11.11 If/Else Statements
-
11.12 While Loops in Karel
-
11.13 Control Structures Example
-
11.14 More Karel Examples and Testing
-
11.16 Karel Challenges
-
14.1 For Loops
-
14.2 While Loops
-
14.3 Operators
-
14.4 If/Else Statements
-
14.5 Functions
-
15.1 micro:bit Challenges
|
2-AP-18 |
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
-
1.6 Comments
-
10.1 Project: The Effects of the Internet
-
15.1 micro:bit Challenges
-
15.4 Final Project
|
2-AP-19 |
Document programs in order to make them easier to follow, test, and debug. |
-
1.6 Comments
-
3.3 Comments & Pseudocode
-
11.16 Karel Challenges
-
12.1 Extra Karel Puzzles
|
2-CS-01 |
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices. |
-
7.5 Prototype
-
15.4 Final Project
|
2-CS-02 |
Design projects that combine hardware and software components to collect and exchange data. |
-
3.2 Setting Up your micro:bit
-
3.3 Comments & Pseudocode
-
3.4 Variables
-
14.3 Operators
-
14.4 If/Else Statements
-
14.5 Functions
|
2-CS-03 |
Systematically identify and fix problems with computing devices and their components. |
-
2.6 Troubleshooting
|
2-DA-07 |
Represent data using multiple encoding schemes. |
-
8.1 Intro to Digital Information
-
8.2 Number Systems
-
8.3 Encoding Text with Binary
-
8.4 Pixel Images
-
8.5 Hexadecimal
-
8.6 Pixel Colors!
|
2-DA-08 |
Collect data using computational tools and transform the data to make it more useful and reliable. |
-
7.2 Empathy
|
2-DA-09 |
Refine computational models based on the data they have generated. |
-
1.20 Using Data to Refine Game Mechanics
|
2-IC-20 |
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. |
-
2.1 History of Computers
-
2.5 Future of Computing
-
4.1 Digital Footprint and Reputation
-
4.2 Cyberbullying
-
4.3 Internet Safety
-
4.4 Privacy & Security
-
4.5 Project: Public Service Announcement
-
5.1 Cryptography, Cryptology, Cryptanalysis
-
5.2 History of Cryptography
-
9.1 Intro to the Internet
-
9.7 The Impact of the Internet
-
13.1 Module Overview - Cybersecurity
-
13.2 What is Cybersecurity?
-
13.3 Impact of Cybersecurity
|
2-IC-21 |
Discuss issues of bias and accessibility in the design of existing technologies. |
-
4.2 Cyberbullying
-
4.5 Project: Public Service Announcement
-
7.3 Define
-
7.5 Prototype
-
7.6 Test
|
2-IC-22 |
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. |
-
7.3 Define
-
7.5 Prototype
-
7.6 Test
|
2-IC-23 |
Describe tradeoffs between allowing information to be public and keeping information private and secure. |
-
4.1 Digital Footprint and Reputation
-
4.2 Cyberbullying
-
4.3 Internet Safety
-
4.4 Privacy & Security
-
4.5 Project: Public Service Announcement
-
5.2 History of Cryptography
-
9.1 Intro to the Internet
-
9.7 The Impact of the Internet
-
13.2 What is Cybersecurity?
-
13.3 Impact of Cybersecurity
-
13.4 The CIA Triad
|
2-NI-04 |
Model the role of protocols in transmitting data across networks and the Internet. |
-
6.9 Viewing Websites
-
9.1 Intro to the Internet
-
9.2 Internet Hardware
-
9.3 Internet Addresses
-
9.4 DNS
-
9.5 Routing
-
9.6 Packets and Protocols
|
2-NI-05 |
Explain how physical and digital security measures protect electronic information. |
-
4.3 Internet Safety
-
4.4 Privacy & Security
-
4.5 Project: Public Service Announcement
-
5.1 Cryptography, Cryptology, Cryptanalysis
-
5.2 History of Cryptography
|
2-NI-06 |
Apply multiple methods of encryption to model the secure transmission of information. |
-
5.3 Basic Crypto Systems: Caesar Cipher
-
5.4 Basic Crypto Systems: Cracking Caesar
-
5.5 Basic Crypto Systems: Vigenere Cipher
|