CS.D.7.a |
Develop and implement a process to evaluate existing computing devices capabilities based on personal interaction with the device. |
-
2.3 Software
-
2.5 Future of Computing
|
CS.HS.7.a |
Evaluate hardware and software combinations used to accomplish a task. |
-
2.3 Software
-
2.4 Hardware
-
4.13 Viewing Websites
|
CS.T.7.a |
Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others. |
|
NI.N.7.a |
Explain the role of hardware components and diagram the infrastructure of networks and the internet (including cloud servers). |
-
2.4 Hardware
-
7.5 Routing
|
NI.N.7.b |
Explain the protocols (i.e., rules) and why they are used to transmit data across networks and the internet. |
-
7.6 Packets and Protocols
|
NI.C.7.a |
Identify and apply introductory methods of encryption to model the secure transmission of information. |
|
NI.C.7.b |
Describe the types of malware to show how malware affects information. |
-
9.4 Privacy & Security
-
15.2 What is Cybersecurity?
-
15.3 Impact of Cybersecurity
|
NI.C.7.c |
Identify cybersecurity concerns and measures needed to protect electronic information. |
-
9.4 Privacy & Security
-
15.2 What is Cybersecurity?
-
15.3 Impact of Cybersecurity
-
15.4 The CIA Triad
|
DA.DCS.7.a |
Compare and contrast digital data collection tools to make them more useful and reliable. |
|
DA.DCS.7.b |
Evaluate various file formats to understand data storage capabilities. |
|
DA.DCS.7.c |
Create a logical file structure to organize data to support individual and collaborative work. |
|
DA.VC.7.a |
Communicate relations between data sets to interpret results. |
|
DA.VC.7.b |
Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data. |
|
DA.IM.7.a |
Create and analyze models and simulations to accurately hypothesize a real-world situation. |
|
ATP.A.7.a |
Select and modify pseudocode for a multi-step process to solve a problem. |
-
1.9 For Loops
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
13.10 Top Down Design
|
ATP.VDR.7.a |
Use test cases to trace variable values to determine the result. |
-
13.11 Variables
-
13.14 Using i in For Loops
-
13.15 Extended Loop Control
-
13.16 If Statements
-
13.17 If/ Else Statements
-
13.18 While Loops
-
13.19 Putting Together Control Structures
|
ATP.CS.7.a |
Use and apply decisions and loops in a program to solve a problem. |
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
13.4 For Loops
-
13.14 Using i in For Loops
-
13.15 Extended Loop Control
-
13.16 If Statements
-
13.17 If/ Else Statements
-
13.18 While Loops
-
13.19 Putting Together Control Structures
|
ATP.M.7.a |
Decompose problems into parts to facilitate the design, implementation and review of increasingly complex programs. |
-
1.6 Top Down Design and Decomposition in Karel
-
13.8 Functions
-
13.10 Top Down Design
-
13.19 Putting Together Control Structures
|
ATP.PD.7.a |
Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression. |
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
13.4 For Loops
-
13.11 Variables
-
13.13 Parameters
-
13.14 Using i in For Loops
-
13.15 Extended Loop Control
-
13.16 If Statements
-
13.17 If/ Else Statements
-
13.18 While Loops
-
13.19 Putting Together Control Structures
|
ATP.PD.7.b |
Test, trace and debug to refine code. |
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
13.4 For Loops
-
13.10 Top Down Design
-
13.13 Parameters
-
13.16 If Statements
-
13.17 If/ Else Statements
-
13.18 While Loops
|
ATP.PD.7.c |
Identify procedures that utilize parameters. |
-
13.13 Parameters
|
IC.Cu.7.a |
Compare current technologies from the present to the past to evaluate the effect on people's everyday activities. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
IC.Cu.7.b |
Evaluate various technologies to identify issues of bias and accessibility. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
IC.Cu.7.c |
Identify and explore careers related to the field of computer science. |
-
15.3 Impact of Cybersecurity
|
IC.Cu.7.d |
Explain how computing impacts innovation in other fields. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
IC.SI.7.a |
Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
-
15.3 Impact of Cybersecurity
|
IC.SLE.7.a |
Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making. |
-
9.4 Privacy & Security
-
15.4 The CIA Triad
|
IC.SLE.7.b |
Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas. |
-
9.1 Digital Footprint and Reputation
-
9.4 Privacy & Security
|
IC.SLE.7.c |
Evaluate the development of new technologies in communication, entertainment and business to understand the impact. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
IC.SLE.7.d |
Provide appropriate credit when using resources or artifacts that are not our own. |
-
9.6 Creative Credit & Copyright
|
IC.SLE.7.e |
Explain the connection between the longevity of data on the internet, personal online identity and personal privacy. |
-
9.1 Digital Footprint and Reputation
-
9.4 Privacy & Security
|