28

Standards in this Framework

Standards Mapped

57%

Mapped to Course

Standard Lessons
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
1. 2.5 Future of Computing
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
1. 5.3 Basic Crypto Systems: Caesar Cipher
2. 5.5 Basic Crypto Systems: Vigenere Cipher
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
1. 5.4 Basic Crypto Systems: Cracking Caesar
3B-AP-12
Compare and contrast fundamental data structures and their uses.
1. 1.13 Parameters
2. 1.14 Using i in For Loops
3. 1.16 If Statements
4. 1.17 If/ Else Statements
5. 1.18 While Loops
6. 12.1 Extra Karel Puzzles
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
1. 1.10 Top Down Design
2. 5.3 Basic Crypto Systems: Caesar Cipher
3. 5.5 Basic Crypto Systems: Vigenere Cipher
4. 11.3 Karel Can't Turn Right
5. 11.4 Functions in Karel
6. 11.5 The Start Function
7. 11.6 Top Down Design and Decomposition in Karel
9. 11.8 Super Karel
10. 11.9 For Loops
11. 11.10 If Statements
12. 11.11 If/Else Statements
13. 11.12 While Loops in Karel
14. 11.13 Control Structures Example
15. 11.14 More Karel Examples and Testing
16. 11.15 How to Indent Your Code
17. 11.16 Karel Challenges
18. 12.1 Extra Karel Puzzles
19. 14.5 Functions
20. 15.1 micro:bit Challenges
21. 15.4 Final Project
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
1. 1.1 Intro to Python with Tracy the Turtle
2. 1.2 Tracy's Grid World
3. 1.3 Turning Tracy
4. 1.4 For Loops
5. 1.5 Turning Tracy Using Angles
6. 1.8 Functions
7. 1.9 Artistic Effects
8. 1.15 Extended Loop Control
9. 15.1 micro:bit Challenges
10. 15.4 Final Project
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
1. 11.1 Introduction to Programming With Karel
2. 11.2 More Basic Karel
3. 11.3 Karel Can't Turn Right
4. 11.4 Functions in Karel
5. 11.5 The Start Function
6. 11.6 Top Down Design and Decomposition in Karel
8. 11.8 Super Karel
9. 11.9 For Loops
10. 11.10 If Statements
11. 11.11 If/Else Statements
12. 11.12 While Loops in Karel
13. 11.13 Control Structures Example
14. 11.14 More Karel Examples and Testing
15. 11.15 How to Indent Your Code
16. 12.1 Extra Karel Puzzles
17. 14.5 Functions
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
1. 4.5 Project: Public Service Announcement
2. 5.1 Cryptography, Cryptology, Cryptanalysis
3. 5.2 History of Cryptography
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
1. 15.1 micro:bit Challenges
2. 15.4 Final Project
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
1. 5.3 Basic Crypto Systems: Caesar Cipher
2. 5.5 Basic Crypto Systems: Vigenere Cipher
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
3B-CS-01
Categorize the roles of operating system software.
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
1. 15.3 Follow a Step-by-Step Project
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
1. 4.3 Internet Safety
2. 4.4 Privacy & Security
3. 4.5 Project: Public Service Announcement
4. 5.2 History of Cryptography
5. 13.3 Impact of Cybersecurity
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
1. 4.3 Internet Safety
2. 4.5 Project: Public Service Announcement
3. 13.3 Impact of Cybersecurity
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
1. 2.5 Future of Computing
2. 4.3 Internet Safety
3. 4.4 Privacy & Security
4. 4.5 Project: Public Service Announcement
5. 5.1 Cryptography, Cryptology, Cryptanalysis
6. 5.2 History of Cryptography
7. 13.2 What is Cybersecurity?
8. 13.3 Impact of Cybersecurity
10. 15.4 Final Project
3B-IC-28
Debate laws and regulations that impact the development and use of software.
1. 4.2 Cyberbullying
2. 4.4 Privacy & Security
3. 4.5 Project: Public Service Announcement
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.
1. 4.1 Digital Footprint and Reputation
2. 4.4 Privacy & Security
3. 4.5 Project: Public Service Announcement
4. 5.2 History of Cryptography