6-8.AP.A.1 |
Use flowcharts and/or pseudocode to address complex problems as algorithms. |
-
3.10 Top Down Design
-
3.19 Putting Together Control Structures
-
8.6 Top Down Design and Decomposition in Karel
-
8.13 Control Structures Example
-
8.16 Karel Challenges
|
6-8.AP.V.1 |
Create clearly named variables that represent different data types and perform operations on their values. |
-
3.11 Variables
-
3.12 User Input
-
3.13 Parameters
-
3.16 If Statements
-
3.17 If/ Else Statements
-
3.18 While Loops
-
3.19 Putting Together Control Structures
|
6-8.AP.C.1 |
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
-
3.19 Putting Together Control Structures
-
8.11 If/Else Statements
-
8.12 While Loops in Karel
-
8.13 Control Structures Example
-
8.14 More Karel Examples and Testing
-
8.16 Karel Challenges
|
6-8.AP.M.1 |
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. |
-
3.10 Top Down Design
-
3.19 Putting Together Control Structures
-
8.6 Top Down Design and Decomposition in Karel
-
8.13 Control Structures Example
-
8.16 Karel Challenges
|
6-8.AP.M.2 |
Create procedures with parameters to organize code and make it easier to reuse. |
-
3.13 Parameters
|
6-8.AP.PD.1 |
Design meaningful solutions for others, incorporating data from collaborative team members and the end user, to meet the end user’s needs. |
-
2.1 Project: Public Service Announcement
-
5.1 Project: Your First Website
-
7.1 Project: Secure the Company's Network
-
12.1 Project: Classic Cipher Newscast
|
6-8.AP.PD.2 |
Incorporate existing code, media, and libraries into original programs, and give attribution. |
-
1.6 Creative Credit & Copyright
-
5.1 Project: Your First Website
-
12.1 Project: Classic Cipher Newscast
|
6-8.AP.PD.3 |
Systematically test and refine programs using a range of test cases. |
-
3.17 If/ Else Statements
-
3.18 While Loops
-
3.19 Putting Together Control Structures
-
8.14 More Karel Examples and Testing
|
6-8.AP.PD.4 |
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
-
3.19 Putting Together Control Structures
|
6-8.AP.PD.5 |
Document programs (throughout the design, development, troubleshooting, and user experience phases) in order to make them easier to follow, test, and debug by others. |
-
3.6 Comments
-
3.10 Top Down Design
-
8.7 Commenting Your Code
-
8.15 How to Indent Your Code
|
6-8.CS.D.1 |
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices, noting that advantages may have disadvantages and unintended consequences. |
-
7.1 Project: Secure the Company's Network
-
14.1 Project: The Effects of the Internet
|
6-8.CS.HS.1 |
Design and evaluate projects that combine hardware and software components to collect and exchange data. |
-
7.1 Project: Secure the Company's Network
|
6-8.CS.T.1 |
Systematically identify and fix problems with computing devices and their components. |
-
6.11 Networking Fundamentals Quiz
|
6-8.DA.S.1 |
Model encoding schema used by software tools to access data, stored as bits, into forms more easily understood by people (e.g., encoding schema include binary and ASCII). |
-
9.1 Intro to Digital Information
-
9.2 Number Systems
-
9.3 Encoding Text with Binary
-
9.4 Pixel Images
-
9.5 Hexadecimal
-
9.6 Pixel Colors!
-
9.7 Image Manipulation
|
6-8.DA.CVT.1 |
Collect data using computational tools and transform the data to make it more meaningful and useful. |
-
2.1 Project: Public Service Announcement
-
12.1 Project: Classic Cipher Newscast
|
6-8.DA.IM.1 |
Refine computational models based on the reliability and validity of the data they generate. |
-
10.6 Structuring Data in SQL
|
6-8.IC.C.1 |
Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options. |
-
1.1 Digital Footprint and Reputation
-
6.8 Impact of the Internet
-
13.7 The Impact of the Internet
|
6-8.IC.C.2 |
Discuss and evaluate issues of bias and accessibility in the design of existing technologies. |
-
6.1 Introduction to the Internet
-
6.8 Impact of the Internet
|
6-8.IC.SI.1 |
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. |
-
12.1 Project: Classic Cipher Newscast
|
6-8.IC.SLE.1 |
Identify risks associated with sharing information digitally (e.g., phishing, identity theft, hacking). |
-
6.9 Network Attacks
-
6.10 Securing a Network
-
7.1 Project: Secure the Company's Network
-
10.9 Common Security Problems
-
10.10 SQL Injection Overview
-
10.11 Types of SQLi and Prevention
-
10.12 Cross-site Scripting
|
6-8.IC.SLE.2 |
Evaluate how legal and ethical issues shape computing practices |
-
1.6 Creative Credit & Copyright
-
1.7 Hacking Ethics
|
6-8.NI.NCO.1 |
Compare and contrast modeled protocols used in transmitting data across networks and the Internet. |
-
4.13 Viewing Websites
-
6.6 Packets & Protocols
-
6.7 Viewing a Webpage
-
13.6 Packets and Protocols
|
6-8.NI.C.1 |
Explain how physical and digital security measures protect electronic information. |
-
1.4 Privacy & Security
-
6.10 Securing a Network
-
7.1 Project: Secure the Company's Network
-
10.9 Common Security Problems
-
10.11 Types of SQLi and Prevention
-
10.12 Cross-site Scripting
|
6-8.NI.C.2 |
Apply multiple methods of encryption to model the secure transmission of information. |
-
11.1 Cryptography, Cryptology, Cryptanalysis
-
11.2 History of Cryptography
-
11.4 Basic Crypto Systems: Caesar Cipher
-
11.5 Basic Crypto Systems: Cracking Caesar
-
11.6 Basic Crypto Systems: Vigenere Cipher
-
11.7 Advanced Cryptography
-
11.8 Hash Functions
-
11.9 Hash Function Development
-
12.1 Project: Classic Cipher Newscast
|