SD.CSE.1.1 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
-
2.8 Abstraction
|
SD.CSE.1.2 |
Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
|
SD.CSE.1.3 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
-
2.17 Debugging Strategies
|
SD.CSE.2.1 |
Identify network components by describing the relationship between routers, switches, servers, topology, and addressing. |
-
4.2 Internet Hardware
-
4.3 Internet Addresses
-
4.4 DNS
-
4.5 Routing
-
4.6 Packets and Protocols
|
SD.CSE.2.2 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks |
-
1.1 What is Cybersecurity?
-
1.6 Privacy & Security
-
1.11 Hacking Ethics
|
SD.CSE.2.3 |
Identify security measures to address various scenarios based on the CIA Triad (confidentiality, integrity, and availability). |
-
1.2 The CIA Triad
|
SD.CSE.2.4 |
Compare various security measures, considering tradeoffs between the usability and security of a computing system. |
-
1.5 Internet Safety
-
1.6 Privacy & Security
|
SD.CSE.3.1 |
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. |
|
SD.CSE.3.2 |
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
-
1.7 Information Literacy
|
SD.CSE.4.1 |
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
-
9.11 Intro to Lists/Arrays
-
9.12 Adding/Removing From an Array
-
9.13 Array Length and Looping Through Arrays
-
9.14 Iterating Over an Array
-
16.1 Indexing Into an Array
-
16.2 Finding an Element in a List
-
16.3 Removing an Element From an Array
|
SD.CSE.4.2 |
Investigate specific control structures and tradeoffs involving implementation, readability, and program performance. |
-
2.10 For Loops
-
2.11 If Statements
-
2.12 If/Else Statements
-
2.13 While Loops in Karel
-
2.14 Control Structures Example
-
3.2 Challenge Problems
-
7.4 If Statements
-
7.5 For Loops in JavaScript
-
7.6 General For Loops
-
7.7 For Loop Practice
-
7.9 While Loops
-
7.10 Loop and a Half
-
8.1 Control Structures Challenges
|
SD.CSE.4.3 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
-
2.4 Functions in Karel
-
2.6 Top Down Design and Decomposition in Karel
-
9.1 Functions and Parameters 1
-
9.2 Functions and Parameters 2
-
9.3 Functions and Parameters 3
-
9.4 Functions and Return Values 1
-
9.5 Functions and Return Values 2
-
9.6 Timers
-
17.1 Intro to Objects/Maps
-
17.2 Basics of Objects
-
17.4 When Do I Use an Object?
|
SD.CSE.4.4 |
Understand the purpose of gathering feedback when creating software |
-
10.1 Intro to Design Thinking
-
10.2 Prototype
-
10.3 Test
|
SD.CSE.4.5 |
Examine software licenses, including copyright, freeware, and open-source licensing. |
-
1.10 Creative Credit & Copyright
|
SD.CSE.4.6 |
Evaluate computer programs for intended outcomes. |
-
2.1 Introduction to Programming With Karel
-
3.2 Challenge Problems
-
5.4 Basic Math in JavaScript
-
7.2 Logical Operators
-
9.1 Functions and Parameters 1
-
9.6 Timers
-
10.1 Intro to Design Thinking
-
10.3 Test
|
SD.CSE.5.1 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
-
1.1 What is Cybersecurity?
-
1.3 Digital Footprint and Reputation
-
1.4 Cyberbullying
-
1.10 Creative Credit & Copyright
-
4.7 The Impact of the Internet
|
SD.CSE.5.2 |
Examine and identify bias and equity deficits in existing computer programs. |
-
10.3 Test
|
SD.CSE.5.3 |
Identify and use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
-
3.1 Collaborative Programming
|
SD.CSE.5.4 |
Explore privacy concerns and intellectual property laws related to computing. |
-
1.3 Digital Footprint and Reputation
-
1.6 Privacy & Security
-
1.10 Creative Credit & Copyright
|
SD.CSE.5.5 |
Explore careers in computer science. |
-
11.1 Computer Science Careers
|