6-8.CS.01 |
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices. |
-
2.3 Software
-
2.4 Hardware
-
3.1 Computer Model
|
6-8.CS.02 |
Design projects that combine hardware and software components to collect and exchange data. |
|
6-8.CS.03 |
Systematically identify and fix problems with computing devices and their components. |
|
6-8.NI.04 |
Model the role of protocols in transmitting data across networks and the Internet. |
-
7.1 Intro to the Internet
-
7.2 Internet Hardware
-
7.3 Internet Addresses
-
7.4 DNS
-
7.5 Routing
-
7.6 Packets and Protocols
|
6-8.NI.05 |
Explain how physical and digital security measures protect electronic information. |
-
9.3 Internet Safety
-
9.4 Privacy & Security
-
10.1 Project: Public Service Announcement
-
15.2 What is Cybersecurity?
-
15.3 Impact of Cybersecurity
-
15.4 The CIA Triad
|
6-8.NI.06 |
Apply multiple methods of encryption to model the secure transmission of information. |
-
6.3 Encoding Text with Binary
-
15.2 What is Cybersecurity?
|
6-8.DA.07 |
Represent data using multiple encoding schemes. |
-
6.3 Encoding Text with Binary
-
6.5 Hexadecimal
-
6.6 Pixel Colors!
|
6-8.DA.08 |
Collect data using computational tools and transform the data to make it more useful and reliable. |
|
6-8.DA.09 |
Refine computational models based on the data they have generated. |
|
6-8.DA.10 |
Evaluate the misuse of data and impact of distorted outcomes. |
-
9.1 Digital Footprint and Reputation
-
9.2 Cyberbullying
-
9.4 Privacy & Security
-
9.5 Information Literacy
-
9.6 Creative Credit & Copyright
-
15.2 What is Cybersecurity?
-
15.3 Impact of Cybersecurity
-
15.4 The CIA Triad
|
6-8.AP.11 |
Use flowcharts or pseudocode to address complex problems as algorithms. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
13.10 Top Down Design
-
13.19 Putting Together Control Structures
|
6-8.AP.12 |
Perform operations on student-created variables that possess descriptive names and represent different data types. |
-
13.7 Naming Guidelines
-
13.11 Variables
|
6-8.AP.13 |
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
-
1.9 For Loops
-
1.10 If Statements
-
1.11 If/Else Statements
-
1.12 While Loops in Karel
-
1.16 Karel Challenges
-
13.14 Using i in For Loops
-
13.15 Extended Loop Control
-
13.16 If Statements
-
13.17 If/ Else Statements
-
13.18 While Loops
-
13.19 Putting Together Control Structures
|
6-8.AP.14 |
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.16 Karel Challenges
-
13.10 Top Down Design
|
6-8.AP.15 |
Create procedures with parameters to organize code and make it easier to reuse. |
-
1.4 Functions in Karel
-
1.5 The Start Function
-
13.8 Functions
-
13.13 Parameters
|
6-8.AP.16 |
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
-
5.1 Project: Your First Website
-
14.9 Final Touches
-
14.10 Make a Game!
|
6-8.AP.17 |
Incorporate existing code, media, and libraries into original programs and give attribution. |
-
9.6 Creative Credit & Copyright
|
6-8.AP.18 |
Systematically test and refine programs using a range of test cases. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.10 If Statements
-
1.11 If/Else Statements
-
1.12 While Loops in Karel
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
13.10 Top Down Design
-
14.9 Final Touches
-
14.10 Make a Game!
|
6-8.AP.19 |
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
|
6-8.AP.20 |
Document programs to make them easier to follow, test, and debug. |
-
1.7 Commenting Your Code
-
1.15 How to Indent Your Code
-
13.6 Comments
-
13.7 Naming Guidelines
|
6-8.IC.21 |
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. |
-
2.1 History of Computers
-
2.2 Computer Organization
-
2.5 Future of Computing
-
7.7 The Impact of the Internet
|
6-8.IC.22 |
Discuss issues of bias and accessibility in the design of existing technologies. |
|
6-8.IC.23 |
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. |
|
6-8.IC.24 |
Describe tradeoffs between allowing information to be public and keeping information private and secure. |
-
7.7 The Impact of the Internet
-
9.1 Digital Footprint and Reputation
-
9.3 Internet Safety
-
9.4 Privacy & Security
-
9.5 Information Literacy
|
6-8.ET.A |
Explain that the field of emerging technologies will be evolving and rapidly growing. |
-
2.1 History of Computers
-
2.5 Future of Computing
-
3.1 Computer Model
-
7.7 The Impact of the Internet
|
6-8.ET.B |
Compare existing and emerging technologies, ideas, and concepts. |
-
2.1 History of Computers
-
2.5 Future of Computing
-
7.1 Intro to the Internet
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
6-8.ET.C |
Describe how emerging technologies are influencing current events at a local and global scale. |
-
2.5 Future of Computing
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
6-8.ET.D |
Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate. |
-
2.5 Future of Computing
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
6-8.ET.E |
Create new or original work by applying emerging technologies. |
|