for Nevada 6-8 — Nevada Middle School Computer Science
Total Standards: 24Mapped: 24Completion: 100%
6-8.AP.A.1
Use flowcharts and/or pseudocode to address complex problems as algorithms.
3.10 Top Down Design
3.19 Putting Together Control Structures
8.6 Top Down Design and Decomposition in Karel
8.13 Control Structures Example
8.16 Karel Challenges
6-8.AP.V.1
Create clearly named variables that represent different data types and perform operations on their values.
3.11 Variables
3.12 User Input
3.13 Parameters
3.16 If Statements
3.17 If/ Else Statements
3.18 While Loops
3.19 Putting Together Control Structures
6-8.AP.C.1
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
3.19 Putting Together Control Structures
8.11 If/Else Statements
8.12 While Loops in Karel
8.13 Control Structures Example
8.14 More Karel Examples and Testing
8.16 Karel Challenges
6-8.AP.M.1
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
3.10 Top Down Design
3.19 Putting Together Control Structures
8.6 Top Down Design and Decomposition in Karel
8.13 Control Structures Example
8.16 Karel Challenges
6-8.AP.M.2
Create procedures with parameters to organize code and make it easier to reuse.
3.13 Parameters
6-8.AP.PD.1
Design meaningful solutions for others, incorporating data from collaborative team members and the end user, to meet the end user’s needs.
2.1 Project: Public Service Announcement
5.1 Project: Your First Website
7.1 Project: Secure the Company's Network
12.1 Project: Classic Cipher Newscast
6-8.AP.PD.2
Incorporate existing code, media, and libraries into original programs, and give attribution.
1.6 Creative Credit & Copyright
5.1 Project: Your First Website
12.1 Project: Classic Cipher Newscast
6-8.AP.PD.3
Systematically test and refine programs using a range of test cases.
3.17 If/ Else Statements
3.18 While Loops
3.19 Putting Together Control Structures
8.14 More Karel Examples and Testing
6-8.AP.PD.4
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
3.19 Putting Together Control Structures
6-8.AP.PD.5
Document programs (throughout the design, development, troubleshooting, and user experience phases) in order to make them easier to follow, test, and debug by others.
3.6 Comments
3.10 Top Down Design
8.7 Commenting Your Code
8.15 How to Indent Your Code
6-8.CS.D.1
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices, noting that advantages may have disadvantages and unintended consequences.
7.1 Project: Secure the Company's Network
14.1 Project: The Effects of the Internet
6-8.CS.HS.1
Design and evaluate projects that combine hardware and software components to collect and exchange data.
7.1 Project: Secure the Company's Network
6-8.CS.T.1
Systematically identify and fix problems with computing devices and their components.
6.11 Networking Fundamentals Quiz
6-8.DA.S.1
Model encoding schema used by software tools to access data, stored as bits, into forms more easily understood by people (e.g., encoding schema include binary and ASCII).
9.1 Intro to Digital Information
9.2 Number Systems
9.3 Encoding Text with Binary
9.4 Pixel Images
9.5 Hexadecimal
9.6 Pixel Colors!
9.7 Image Manipulation
6-8.DA.CVT.1
Collect data using computational tools and transform the data to make it more meaningful and useful.
2.1 Project: Public Service Announcement
12.1 Project: Classic Cipher Newscast
6-8.DA.IM.1
Refine computational models based on the reliability and validity of the data they generate.
10.6 Structuring Data in SQL
6-8.IC.C.1
Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
1.1 Digital Footprint and Reputation
6.8 Impact of the Internet
13.7 The Impact of the Internet
6-8.IC.C.2
Discuss and evaluate issues of bias and accessibility in the design of existing technologies.
6.1 Introduction to the Internet
6.8 Impact of the Internet
6-8.IC.SI.1
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
12.1 Project: Classic Cipher Newscast
6-8.IC.SLE.1
Identify risks associated with sharing information digitally (e.g., phishing, identity theft, hacking).
6.9 Network Attacks
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
6-8.IC.SLE.2
Evaluate how legal and ethical issues shape computing practices
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
6-8.NI.NCO.1
Compare and contrast modeled protocols used in transmitting data across networks and the Internet.
4.13 Viewing Websites
6.6 Packets & Protocols
6.7 Viewing a Webpage
13.6 Packets and Protocols
6-8.NI.C.1
Explain how physical and digital security measures protect electronic information.
1.4 Privacy & Security
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
6-8.NI.C.2
Apply multiple methods of encryption to model the secure transmission of information.