Standards in this Framework
Standard | Description |
---|---|
8.1 | The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters. |
8.2 | The student will systematically test and refine programs using a range of test cases. |
8.3 | The student will explain how effective communication between participants is required for successful collaboration when developing programs. |
8.4 | The student will use flowcharts and/or pseudo code to address complex problems as algorithms. |
8.5 | The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system. |
8.6 | The student will identify physical and digital security measures used protect electronic information. |
8.7 | The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions. |
8.8 | The student will explain the difference between a model and a simulation, and create computational models to conduct simulations. |
8.9 | The student will describe tradeoffs between allowing information to be public, and keeping information private. |
8.10 | The student will evaluate online and print sources for appropriateness and credibility. |
8.11 | The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity. |
8.12 | The student will explore careers related to the field of cybersecurity. |
8.13 | The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. |