Standards in this Framework
Standard | Description |
---|---|
CS.AP.6-8.1 | use algorithms to address complex problems; |
CS.AP.6-8.2 | create clearly named variables that represent different data types and perform operations on their values; |
CS.AP.6-8.3 | develop programs that combine control structures, including nested loops and compound conditionals; |
CS.AP.6-8.4 | decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs; |
CS.AP.6-8.5 | create procedures with parameters to organize code and make it easier to reuse; |
CS.AP.6-8.6 | seek and incorporate feedback from team members and users to refine a solution that meets user needs; |
CS.AP.6-8.7 | incorporate existing code, media, and libraries into original programs, and give attribution; |
CS.AP.6-8.8 | systematically test and refine programs using a range of test cases; |
CS.AP.6-8.9 | distribute tasks and maintain a project timeline when collaboratively developing computational artifacts; and |
CS.AP.6-8.10 | document programs in order to make them easier to follow, test, and debug. |
CS.CS.6-8.1 | recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices; |
CS.CS.6-8.2 | design projects that combine hardware and software components to collect and exchange data; and |
CS.CS.6-8.3 | systematically identify and fix problems with computing devices and their components. |
CS.DA.6-8.1 | collect data using computational tools and transform the data to make it more useful and reliable; |
CS.DA.6-8.2 | represent data using multiple formats; and |
CS.DA.6-8.3 | refine computational models based on the data they have generated. |
CS.IC.6-8.1 | compare tradeoffs associated with computing technologies that affect people's everyday activities and career options in Montana and the world, urban, rural, and reservation communities; |
CS.IC.6-8.2 | discuss issues of bias and accessibility in the design of existing technologies; |
CS.IC.6-8.3 | collaborate with other contributors when creating a computational artifact; and |
CS.IC.6-8.4 | describe tradeoffs between allowing information, personal or intellectual, to be public and keeping information private and secure. |
CS.NI.6-8.1 | explain how physical and digital security measures protect electronic information; |
CS.NI.6-8.2 | apply multiple methods of encryption to demonstrate how to securely transmit information; and |
CS.NI.6-8.3 | demonstrate how information is broken down and transmitted through multiple devices over networks and the internet and reassembled at the destination. |