for Utah CS Investigations — Mix and Match Middle School Course
Total Standards: 60Mapped: 40Completion: 66%
UT.CSI.1.1a
Use the structured problem-solving process to help address new problems
9.5 Variables
9.9 Your First Sprites
UT.CSI.1.1b
View challenges as solvable
5.3 Functions
5.4 Multiple Functions
5.8 While Loops
5.9 Karel Challenges
UT.CSI.1.1c
Break down larger problems into smaller components (decomposition)
2.2 A Day at the Park
5.4 Multiple Functions
9.4 Intro to JavaScript
9.5 Variables
9.7 Program Structure
9.9 Your First Sprites
UT.CSI.1.2a
Expect and value mistakes as a natural and productive part of problem solving
1.2 Karel Error Messages
3.2 Debugging with Error Messages
5.1 Introduction to Karel
5.4 Multiple Functions
5.9 Karel Challenges
9.4 Intro to JavaScript
9.5 Variables
UT.CSI.1.2b
Continue working towards solutions despite setbacks
1.2 Karel Error Messages
3.2 Debugging with Error Messages
5.1 Introduction to Karel
5.2 Karel's World
5.4 Multiple Functions
5.9 Karel Challenges
9.4 Intro to JavaScript
9.5 Variables
UT.CSI.1.2c
Iterate and continue to improve partial solutions
1.2 Karel Error Messages
1.3 The Rabbit Chase
1.4 Lost in Space
3.2 Debugging with Error Messages
5.8 While Loops
5.9 Karel Challenges
9.4 Intro to JavaScript
9.5 Variables
UT.CSI.1.3a
Incorporate personal interests and ideas into activities and projects
3.5 Tracy Adventures 1: Evaluation
4.5 Internet of Things
4.8 Project: Design the Computer of Tomorrow
8.10 Project: Animate an Emoji
10.3 Formatting Text
10.4 Creating Links
10.6 Using Lists
10.9 Complete Your Homepage
15.5 Internet of Things (Duplicate)
15.8 Project: Design the Computer of Tomorrow (Duplicate)
UT.CSI.1.3b
Experiment with new ideas and consider multiple possible approaches
3.5 Tracy Adventures 1: Evaluation
5.8 While Loops
5.9 Karel Challenges
9.4 Intro to JavaScript
9.6 Introducing Libraries
9.8 Understanding the Canvas
9.9 Your First Sprites
9.10 The Physics of Sprites
UT.CSI.1.3c
Extend or build upon the ideas and projects of others
3.5 Tracy Adventures 1: Evaluation
4.5 Internet of Things
9.7 Program Structure
9.8 Understanding the Canvas
9.9 Your First Sprites
9.10 The Physics of Sprites
15.5 Internet of Things (Duplicate)
UT.CSI.1.4a
Work with others to develop solutions that incorporate all contributors
UT.CSI.1.4b
Mediate disagreements and help teammates agree on a common solution
UT.CSI.1.4c
Actively contribute to the success of group projects
UT.CSI.1.5a
Structure work so that it can be easily understood by others
2.2 A Day at the Park
5.4 Multiple Functions
9.4 Intro to JavaScript
9.5 Variables
9.7 Program Structure
UT.CSI.1.5b
Consider the perspective and background of your audience when presenting your work
UT.CSI.1.5c
Provide and accept constructive feedback in order to improve your work
UT.CSI.2.1
Students will identify different types of computing devices they encounter in their everyday life including laptops, desktops, mobile devices, gaming systems, wearable technology and embedded systems (drones, car systems, smart houses, etc.).
4.1 History of Computing
4.3 Hardware
15.1 History of Computing
15.3 Hardware (Duplicate)
UT.CSI.2.1a
Identify required functions for a device to be classified as a computer (input, processing; output; storage)
4.3 Hardware
15.3 Hardware (Duplicate)
UT.CSI.2.1b
Identify examples of tasks that can and cannot be accomplished with a computer.
6.3 Impact of the Internet
UT.CSI.2.2
Students will explain the purpose of and interaction between key functional components of a computer including processor, RAM, ROM, hard drive, and input and output devices.
4.3 Hardware
15.3 Hardware (Duplicate)
UT.CSI.2.3
Students will demonstrate an understanding of gigahertz, kilobyte, megabyte, gigabyte, and terabyte in relation to current computing devices.
UT.CSI.2.4
Students will explain the interrelation of the operating system software, application software, and utility software, citing specific examples of each.
4.2 Software
15.2 Software
UT.CSI.2.5
Students will diagnose and solve routine hardware and software problems that occur during everyday computer use. (e.g., reboot/restart, power, connections, cables, ports, network resources, video, sound)
4.3 Hardware
15.3 Hardware (Duplicate)
UT.CSI.3.1
Students will understand and describe the network system that makes up the Internet.
6.1 What is the Internet?
UT.CSI.3.2
Students will investigate web search algorithms and how search engines work (crawling, indexing and ranking websites).
7.5 Information Literacy
UT.CSI.3.3
Students will describe how packets are used to send and receive data and what happens to the data when it experiences packet loss.
UT.CSI.3.4
Students will evaluate how various physical and digital security measures protect electronic information and how a lack of such measures could lead to vulnerabilities. (cybersecurity)
6.4 Cybersecurity
UT.CSI.3.5
Students will investigate multiple methods of secure transmission of information. (i.e.: encryption, firewalls, VPNs)
6.6 Encryption
UT.CSI.4.1
Students will evaluate the quality of digital sources for reliability, including currency, relevancy, authority, accuracy, and purpose of digital information.
UT.CSI.4.1a
Relate the distribution of computing resources in a global society to issues of equity, access, and power.
UT.CSI.4.1b
Evaluate the bias of digital information sources, including websites.
4.6 Ethics and Legal Considerations
15.6 Ethics and Legal Considerations
UT.CSI.4.1c
Evaluate how media and technology can be used to distort, exaggerate, and misrepresent information.
7.5 Information Literacy
UT.CSI.4.2
Students will identify some of the tradeoffs associated with computing technologies that can affect people’s everyday activities and career options.
4.6 Ethics and Legal Considerations
15.6 Ethics and Legal Considerations
UT.CSI.4.3
Students will be able to identify issues of bias and accessibility in the design and functionality of existing technologies.
4.6 Ethics and Legal Considerations
15.6 Ethics and Legal Considerations
UT.CSI.4.4
Students will understand the ethical responsibility to society when creating apps or programs- including the following: empathy with the end user, improving the world around you, efficiency-making things easier, potential liability for misuse, potential security issues.
4.6 Ethics and Legal Considerations
7.6 Creative Credit & Copyright
15.6 Ethics and Legal Considerations
UT.CSI.4.5
Students will be able to explain the benefits and risks associated with sharing information digitally:
7.1 Digital Footprint and Reputation
7.3 Internet Safety
UT.CSI.4.5a
Appropriate uses of social media in personal, educational, extra-curricular, professional, and community scenarios
7.1 Digital Footprint and Reputation
7.2 Cyberbullying
UT.CSI.4.5b
Permanence of online information
UT.CSI.4.5c
Appropriate methods of communication for personal, educational, extra-curricular, professional, and community situations
UT.CSI.4.5d
Online safety [password/passphrase, personal information, location (GPS), sharing images, talking to/ meeting up with strangers, financial information, names, and addresses]
7.3 Internet Safety
7.4 Privacy & Security
UT.CSI.5.1
Solve a problem by applying appropriate problem-solving techniques: Define - Understand the Problem, Prepare - Plan the Solution (design via pseudocode/flowcharts), Try - Carry out the Plan (Code), Reflect - Review and Discuss your Solution (Testing / Feedback)
5.9 Karel Challenges
UT.CSI.5.2
Students will identify how planning strategies (such as flowcharts, storyboards, prototypes or pseudocode) are used when creating a program.
5.7 If/Else Statements
5.8 While Loops
8.2 Color
8.3 Variables
8.4 The Draw Loop
8.6 Shape Transformations
UT.CSI.5.3
Define an algorithm as a set of clearly defined, logical steps to solve a problem.
5.1 Introduction to Karel
5.2 Karel's World
UT.CSI.5.3a
Students will describe the steps needed to efficiently solve a non-computing problem using a pseudocode algorithm
5.1 Introduction to Karel
5.4 Multiple Functions
UT.CSI.5.3b
Students will examine traditional programming algorithms including searches, sorts, and/or minimal spanning trees.
UT.CSI.5.3c
Students will examine and formulate algorithms that solve specific problems.
1.3 The Rabbit Chase
1.4 Lost in Space
5.2 Karel's World
5.3 Functions
5.4 Multiple Functions
5.5 For Loops
5.6 Conditional Statements
5.7 If/Else Statements
5.8 While Loops
5.9 Karel Challenges
9.5 Variables
UT.CSI.5.4
Students will recognize a variety of different user input sources such as text input, sensors, mouse response, movement, or event. Students will recognize a variety of different outputs such as sounds, light, vibrations, movement, text and/or graphics.
8.8 Mouse Data
8.9 Keyboard Data
UT.CSI.5.5a
Students will understand that variables are named locations in memory.
UT.CSI.5.5b
Students will be able to identify variables and when they should be used in code.
3.4 Under the Sea
8.3 Variables
9.5 Variables
UT.CSI.5.6
Students will understand that programs use loops (iteration) to be more efficient and avoid code duplication.
1.4 Lost in Space
2.1 Quest for the Rosetta Stone
2.2 A Day at the Park
5.5 For Loops
5.8 While Loops
9.7 Program Structure
UT.CSI.5.7
Students will understand that programs use conditionals to perform different computations or actions based on whether a condition is true or false (Booleans).
1.4 Lost in Space
2.1 Quest for the Rosetta Stone
2.2 A Day at the Park
5.6 Conditional Statements
5.7 If/Else Statements
5.8 While Loops
8.8 Mouse Data
8.9 Keyboard Data
UT.CSI.5.8
Students will understand that programs use mathematical symbols (+, -, *, /, >, <, ==, AND, OR) in a program to perform specific operations (mathematical, relational, or logical) and produce a single result.
5.5 For Loops
UT.CSI.5.9
Students will understand that a function is a named block of code that performs a specific task. Functions encourage efficiency, reusability, and readability.
2.2 A Day at the Park
3.3 A Day at the Carnival
5.3 Functions
5.4 Multiple Functions
9.7 Program Structure
UT.CSI.5.10
Students will understand that debugging is finding and removing errors from a program so it can operate as intended. Strategies students might learn for debugging could include: Guess and Check; Deactivating sections to identify problematic code; Looking for typos, missing tags, or incorrect syntax; Making the problem smaller - identifying important points (changing variable values, getting input, etc.); Asking a friend or team member for help; Printing, watching, or changing variable values while the program runs; Using a debugging tool; Thinking about when the code last worked and what you have added since then
1.2 Karel Error Messages
3.2 Debugging with Error Messages
5.2 Karel's World
5.4 Multiple Functions
5.6 Conditional Statements
5.7 If/Else Statements
5.8 While Loops
9.4 Intro to JavaScript
9.5 Variables
UT.CSI.6.1a
Students will define a binary system as one that uses just two possible states to represent information
UT.CSI.6.1b
Students will define a bit as a single piece of binary information
UT.CSI.6.1c
Students will be familiar with common features of systems used to represent information in binary, ASCII, and images
UT.CSI.6.1c.i
Students will use the ASCII system to encode and decode text information in binary
UT.CSI.6.1c.ii
Students will use a binary system to represent numbers
UT.CSI.6.1d
Students will describe common features of systems used to represent information in binary
UT.CSI.6.2
Students will collect and/or generate their own data related to local community issues and discuss appropriate methods for data collection and aggregation of data necessary to support making a case of facilitating a discovery.