Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CS.AP.6-8.1
use algorithms to address complex problems; |
|
CS.AP.6-8.2
create clearly named variables that represent different data types and perform operations on their values; |
|
CS.AP.6-8.3
develop programs that combine control structures, including nested loops and compound conditionals; |
|
CS.AP.6-8.4
decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs; |
|
CS.AP.6-8.5
create procedures with parameters to organize code and make it easier to reuse; |
|
CS.AP.6-8.6
seek and incorporate feedback from team members and users to refine a solution that meets user needs; |
|
CS.AP.6-8.7
incorporate existing code, media, and libraries into original programs, and give attribution; |
|
CS.AP.6-8.8
systematically test and refine programs using a range of test cases; |
|
CS.AP.6-8.9
distribute tasks and maintain a project timeline when collaboratively developing computational artifacts; and |
|
CS.AP.6-8.10
document programs in order to make them easier to follow, test, and debug. |
|
CS.CS.6-8.1
recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices; |
|
CS.CS.6-8.2
design projects that combine hardware and software components to collect and exchange data; and |
|
CS.CS.6-8.3
systematically identify and fix problems with computing devices and their components. |
|
CS.DA.6-8.1
collect data using computational tools and transform the data to make it more useful and reliable; |
|
CS.DA.6-8.2
represent data using multiple formats; and |
|
CS.DA.6-8.3
refine computational models based on the data they have generated. |
|
CS.IC.6-8.1
compare tradeoffs associated with computing technologies that affect people's everyday activities and career options in Montana and the world, urban, rural, and reservation communities; |
|
CS.IC.6-8.2
discuss issues of bias and accessibility in the design of existing technologies; |
|
CS.IC.6-8.3
collaborate with other contributors when creating a computational artifact; and |
|
CS.IC.6-8.4
describe tradeoffs between allowing information, personal or intellectual, to be public and keeping information private and secure. |
|
CS.NI.6-8.1
explain how physical and digital security measures protect electronic information; |
|
CS.NI.6-8.2
apply multiple methods of encryption to demonstrate how to securely transmit information; and |
|
CS.NI.6-8.3
demonstrate how information is broken down and transmitted through multiple devices over networks and the internet and reassembled at the destination. |
|