create clearly named variables that represent different data types and perform operations on their values;
1.11 Variables
1.12 User Input
1.13 Parameters
1.16 If Statements
1.17 If/ Else Statements
1.18 While Loops
1.19 Putting Together Control Structures
1.20 Using Data to Refine Game Mechanics
3.4 Variables
CS.AP.6-8.3
develop programs that combine control structures, including nested loops and compound conditionals;
1.14 Using i in For Loops
1.15 Extended Loop Control
1.18 While Loops
1.19 Putting Together Control Structures
1.20 Using Data to Refine Game Mechanics
11.13 Control Structures Example
11.14 More Karel Examples and Testing
11.16 Karel Challenges
15.1 micro:bit Challenges
CS.AP.6-8.4
decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs;
1.8 Functions
1.10 Top Down Design
1.19 Putting Together Control Structures
1.20 Using Data to Refine Game Mechanics
3.3 Comments & Pseudocode
11.4 Functions in Karel
11.5 The Start Function
11.6 Top Down Design and Decomposition in Karel
CS.AP.6-8.5
create procedures with parameters to organize code and make it easier to reuse;
1.13 Parameters
CS.AP.6-8.6
seek and incorporate feedback from team members and users to refine a solution that meets user needs;
1.20 Using Data to Refine Game Mechanics
7.5 Prototype
7.6 Test
CS.AP.6-8.7
incorporate existing code, media, and libraries into original programs, and give attribution;
6.6 Copyright
6.10 Project: Your First Website, Pt 1
6.16 Project: Your First Website, Pt 2
CS.AP.6-8.8
systematically test and refine programs using a range of test cases;
1.20 Using Data to Refine Game Mechanics
11.11 If/Else Statements
11.12 While Loops in Karel
11.13 Control Structures Example
11.14 More Karel Examples and Testing
11.16 Karel Challenges
CS.AP.6-8.9
distribute tasks and maintain a project timeline when collaboratively developing computational artifacts; and
10.1 Project: The Effects of the Internet
15.1 micro:bit Challenges
15.4 Final Project
CS.AP.6-8.10
document programs in order to make them easier to follow, test, and debug.
1.6 Comments
3.3 Comments & Pseudocode
11.7 Commenting Your Code
11.15 How to Indent Your Code
CS.CS.6-8.1
recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices;
7.5 Prototype
7.6 Test
CS.CS.6-8.2
design projects that combine hardware and software components to collect and exchange data; and
3.1 Welcome to micro:bit!
3.2 Setting Up your micro:bit
3.3 Comments & Pseudocode
3.4 Variables
CS.CS.6-8.3
systematically identify and fix problems with computing devices and their components.
2.6 Troubleshooting
CS.DA.6-8.1
collect data using computational tools and transform the data to make it more useful and reliable;
7.2 Empathy
CS.DA.6-8.2
represent data using multiple formats; and
8.1 Intro to Digital Information
8.2 Number Systems
8.3 Encoding Text with Binary
8.4 Pixel Images
8.5 Hexadecimal
8.6 Pixel Colors!
CS.DA.6-8.3
refine computational models based on the data they have generated.
1.20 Using Data to Refine Game Mechanics
CS.IC.6-8.1
compare tradeoffs associated with computing technologies that affect people's everyday activities and career options in Montana and the world, urban, rural, and reservation communities;
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
9.1 Intro to the Internet
9.7 The Impact of the Internet
10.1 Project: The Effects of the Internet
CS.IC.6-8.2
discuss issues of bias and accessibility in the design of existing technologies;
7.1 Intro to Design Thinking
7.2 Empathy
7.3 Define
7.5 Prototype
7.6 Test
CS.IC.6-8.3
collaborate with other contributors when creating a computational artifact; and
7.2 Empathy
7.3 Define
7.5 Prototype
7.6 Test
CS.IC.6-8.4
describe tradeoffs between allowing information, personal or intellectual, to be public and keeping information private and secure.
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
5.2 History of Cryptography
CS.NI.6-8.1
explain how physical and digital security measures protect electronic information;
4.3 Internet Safety
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
CS.NI.6-8.2
apply multiple methods of encryption to demonstrate how to securely transmit information; and
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
CS.NI.6-8.3
demonstrate how information is broken down and transmitted through multiple devices over networks and the internet and reassembled at the destination.