8.1 |
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters. |
-
2.9 For Loops
-
2.10 If Statements
-
2.11 If/Else Statements
-
2.12 While Loops in Karel
-
2.13 Control Structures Example
-
3.2 Challenge Problems
-
5.2 Variables
-
5.3 User Input
-
5.4 Basic Math in JavaScript
-
5.5 Using Graphics in JavaScript
-
7.1 Booleans
-
7.2 Logical Operators
-
7.3 Comparison Operators
-
7.4 If Statements
-
7.5 For Loops in JavaScript
-
7.6 General For Loops
-
7.7 For Loop Practice
-
7.9 While Loops
-
7.10 Loop and a Half
-
9.1 Functions and Parameters 1
-
9.2 Functions and Parameters 2
-
9.3 Functions and Parameters 3
-
9.6 Timers
-
9.7 Random Circles
-
9.8 Random Ghosts
-
9.9 Bouncing Ball
-
9.10 Mouse Events: Mouse Clicked
-
15.1 Mouse Events: Mouse Moved
-
15.2 Drawing Lines
-
15.3 Key Events
-
15.4 Crazy Ball Game
|
8.2 |
The student will systematically test and refine programs using a range of test cases. |
-
2.10 If Statements
-
2.11 If/Else Statements
-
2.12 While Loops in Karel
-
2.13 Control Structures Example
-
3.2 Challenge Problems
-
5.3 User Input
-
5.4 Basic Math in JavaScript
-
7.2 Logical Operators
-
7.3 Comparison Operators
-
7.4 If Statements
-
7.5 For Loops in JavaScript
-
7.9 While Loops
-
9.2 Functions and Parameters 2
-
9.3 Functions and Parameters 3
-
9.4 Functions and Return Values 1
-
9.5 Functions and Return Values 2
-
9.6 Timers
-
9.7 Random Circles
-
9.8 Random Ghosts
-
9.9 Bouncing Ball
-
9.10 Mouse Events: Mouse Clicked
-
15.1 Mouse Events: Mouse Moved
-
15.2 Drawing Lines
-
15.3 Key Events
-
15.4 Crazy Ball Game
|
8.3 |
The student will explain how effective communication between participants is required for successful collaboration when developing programs. |
|
8.4 |
The student will use flowcharts and/or pseudo code to address complex problems as algorithms. |
-
2.6 Top Down Design and Decomposition in Karel
-
3.2 Challenge Problems
|
8.5 |
The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system. |
|
8.6 |
The student will identify physical and digital security measures used protect electronic information. |
-
1.3 Privacy & Security
|
8.7 |
The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions. |
-
1.1 What is Cybersecurity?
-
1.3 Privacy & Security
-
1.8 Hacking Ethics
|
8.8 |
The student will explain the difference between a model and a simulation, and create computational models to conduct simulations. |
|
8.9 |
The student will describe tradeoffs between allowing information to be public, and keeping information private. |
-
1.7 Creative Credit & Copyright
|
8.10 |
The student will evaluate online and print sources for appropriateness and credibility. |
-
1.4 Information Literacy
-
1.7 Creative Credit & Copyright
|
8.11 |
The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity. |
-
1.8 Hacking Ethics
|
8.12 |
The student will explore careers related to the field of cybersecurity. |
-
1.1 What is Cybersecurity?
|
8.13 |
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. |
-
1.3 Privacy & Security
|