Standards in this Framework
Standard | Description |
---|---|
8.1.8.AP.1 | Design and illustrate algorithms that solve complex problems using flowcharts and/or pseudocode. |
8.1.8.AP.2 | Create clearly named variables that represent different data types and perform operations on their values. |
8.1.8.AP.3 | Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
8.1.8.AP.4 | Decompose problems and sub-problems into parts to facilitate the design, implementation, and review of programs. |
8.1.8.AP.5 | Create procedures with parameters to organize code and make it easier to reuse. |
8.1.8.AP.6 | Refine a solution that meets users’ needs by incorporating feedback from team members and users. |
8.1.8.AP.7 | Design programs, incorporating existing code, media, and libraries, and give attribution |
8.1.8.AP.8 | Systematically test and refine programs using a range of test cases and users. |
8.1.8.AP.9 | Document programs in order to make them easier to follow, test, and debug. |
8.1.8.CS.1 | Recommend improvements to computing devices in order to improve the ways users interact with the devices. |
8.1.8.CS.2 | Design a system that combines hardware and software components to process data. |
8.1.8.CS.3 | Justify design decisions and explain potential system trade-offs. |
8.1.8.CS.4 | Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems. |
8.1.8.DA.1 | Organize and transform data collected using computational tools to make it usable for a specific purpose. |
8.1.8.DA.2 | Explain the difference between how the computer stores data as bits and how the data is displayed. |
8.1.8.DA.3 | Identify the appropriate tool to access data based on its file format. |
8.1.8.DA.4 | Transform data to remove errors and improve the accuracy of the data for analysis. |
8.1.8.DA.5 | Test, analyze, and refine computational models |
8.1.8.DA.6 | Analyze climate change computational models and propose refinements. |
8.1.8.IC.1 | Compare the trade-offs associated with computing technologies that affect individual’s everyday activities and career options. |
8.1.8.IC.2 | Describe issues of bias and accessibility in the design of existing technologies. |
8.1.8.NI.1 | Model how information is broken down into smaller pieces, transmitted as addressed packets through multiple devices over networks and the Internet, and reassembled at the destination. |
8.1.8.NI.2 | Model the role of protocols in transmitting data across networks and the Internet and how they enable secure and errorless communication. |
8.1.8.NI.3 | Explain how network security depends on a combination of hardware, software, and practices that control access to data and systems. |
8.1.8.NI.4 | Explain how new security measures have been created in response to key malware events. |