6-8.AP.A.1 |
Use flowcharts and/or pseudocode to address complex problems as algorithms. |
Lessons
|
9-12.AP.A.1 |
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. |
Lessons
|
6-8.AP.PD.2 |
Incorporate existing code, media, and libraries into original programs, and give attribution. |
Lessons
|
6-8.AP.PD.4 |
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
Lessons
|
9-12.AP.PD.2 |
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. |
Lessons
|
9-12.AP.PD.4 |
Design and develop computational artifacts working in team roles using collaborative tools. |
Lessons
|
6-8.AP.V.1 |
Create clearly named variables that represent different data types and perform operations on their values. |
Lessons
|
6-8.AP.C.1 |
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
Lessons
|
9-12.AP.C.1 |
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. |
Lessons
|
9-12.AP.C.2 |
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. |
Lessons
|
6-8.AP.M.2 |
Create procedures with parameters to organize code and make it easier to reuse. |
Lessons
|
9-12.AP.M.1 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
Lessons
|
6-8.CS.HS.1 |
Design and evaluate projects that combine hardware and software components to collect and exchange data. |
Lessons
|
9-12.CS.HS.1 |
Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
Lessons
|
6-8.CS.D.1 |
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices, noting that advantages may have disadvantages and unintended consequences. |
Lessons
|
9-12.CS.D.1 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
Lessons
|
9-12.CS.T.1 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
Lessons
|
9-12.DA.S.1 |
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation). |
Lessons
|
9-12.DA.S.2 |
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
Lessons
|
6-8.DA.CVT.1 |
Collect data using computational tools and transform the data to make it more meaningful and useful. |
Lessons
|
9-12.DA.CVT.1 |
Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena. |
Lessons
|
6-8.IC.C.1 |
Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options. |
Lessons
|
6-8.IC.C.2 |
Discuss and evaluate issues of bias and accessibility in the design of existing technologies. |
Lessons
|
9-12.IC.C.1 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
Lessons
|
9-12.IC.C.2 |
Test and refine computational artifacts to reduce bias and equity deficits. |
Lessons
|
9-12.IC.SI.1 |
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
Lessons
|
6-8.IC.SLE.1 |
Identify risks associated with sharing information digitally (e.g., phishing, identity theft, hacking). |
Lessons
|
9-12.IC.SLE.2 |
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. |
Lessons
|
9-12.IC.SLE.3 |
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. |
Lessons
|
6-8.NI.C.1 |
Explain how physical and digital security measures protect electronic information. |
Lessons
|
9-12.NI.C.1 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks. |
Lessons
|
9-12.NI.NCO.1 |
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. |
Lessons
|
9-12.EL.A.1 |
Actively assimilate and revise personal and career goals, select and manage current and emerging technologies to achieve them, and reflect on their successes and areas of improvement in working toward their goals. |
Lessons
|
9-12.EL.B.1 |
Consistently engage in online social networks as a means to access and promote lifelong learning in collaboration with global peers. |
Lessons
|
9-12.EL.C.1 |
Regularly revise their work habits and attitudes based on feedback from others and from functionalities embedded in digital tools to improve their learning process, and they select or creatively use technologies to share their learning in ways that are useful to others. |
Lessons
|
9-12.EL.D.1 |
Successfully use a variety of existing technologies to develop criteria and identify new digital tools and resources from emerging technologies to accomplish a defined task with fluency and ease. |
Lessons
|
9-12.DC.A.1 |
Analyze their digital identities and reputations within school policy to consider social media's impact on society, including demonstrating an understanding of how digital actions may have positive or negative implications for their future. |
Lessons
|
9-12.DC.B.1 |
Demonstrate and advocate for positive, safe, legal, and ethical habits when using technology and when interacting with others online. |
Lessons
|
9-12.DC.B.2 |
Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility. |
Lessons
|
9-12.DC.C.1 |
Advocate and demonstrate a respect for intellectual property with both print and digital media—including copyright, permission and fair use—by creating a variety of media products that include appropriate citation and attribution elements. |
Lessons
|
9-12.DC.D.1 |
Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work. |
Lessons
|
9-12.KC.A.1 |
Plan and employ effective research strategies to locate information and other resources for their intellectual or creative pursuits. |
Lessons
|
9-12.KC.B.1 |
Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources in the school and career setting. |
Lessons
|
9-12.KC.C.1 |
Curate information from digital resources, including online databases and catalogs, for research using a variety of tools and methods to create collections of artifacts that support their learning and career goals. |
Lessons
|
9-12.KC.D.1 |
Explore real-world issues and problems through inquiry and analysis, develop ideas, actively create solutions for them, and evaluate and revise through the use of digital tools. |
Lessons
|
9-12.ID.A.1 |
Engage in a design process and employ it to inquire and analyze, generate ideas, create innovative products or solve authentic problems, and evaluate the process to revise if needed. |
Lessons
|
9-12.ID.B.1 |
Creatively use digital tools to support a design process and expand their understanding to identify constraints, trade-offs, and to weigh risks. |
Lessons
|
9-12.ID.C.1 |
Engage in a cyclical design process to inquire and analyze, develop ideas, test, and revise prototypes, presenting finished products and best practices learned during the development. |
Lessons
|
9-12.ID.D.1 |
Demonstrate an ability to persevere and handle greater ambiguity as they work to solve open-ended problems. |
Lessons
|
9-12.CT.A.1 |
Define complex issues, create a plan, and select appropriate technology-assisted methods such as data analysis, abstract models, and algorithmic thinking in exploring and finding solutions. |
Lessons
|
9-12.CT.B.1 |
Evaluate created or given data sets, use digital tools to analyze them, and represent data in various ways to facilitate problem-solving and decision-making. |
Lessons
|
9-12.CT.B.2 |
Evaluate and justify the formats for reporting results to a variety of audiences. |
Lessons
|
9-12.CT.C.1 |
Collaborate to break problems into component parts, identify key pieces, and use that information to problem-solve. |
Lessons
|
9-12.CT.C.2 |
Use 3D design tools to create prototypes, models, and simulations to demonstrate solutions and ideas. |
Lessons
|
9-12.CT.D.1 |
Collaborate to develop an automated process by using algorithmic thinking to develop a sequence of steps to create and test automated solutions. |
Lessons
|
9-12.CC.A.1 |
Use digital learning tools and resources to identify communication needs considering goals, audience, content, access to tools or devices, and timing of communication, to involve teams in diverse locales for effective communication. |
Lessons
|
9-12.CC.B.1 |
Create an original work using multiple digital tools, including planning, research, editing, and production. |
Lessons
|
9-12.CC.C.1 |
Create digital graphic visualizations, data driven models, and simulations to succinctly communicate complex ideas and problems; justify methods and tools used. |
Lessons
|
9-12.CC.D.1 |
Publish or present content designed for specific audiences using online meeting tools to asynchronous and synchronous audiences. |
Lessons
|
9-12.GC.A.1 |
Use digital tools to interact with others to develop a richer understanding of different perspectives and cultures; publish electronic artifacts that communicate to a culturally diverse and global community. |
Lessons
|
9-12.GC.B.1 |
Use collaborative technologies (live and recorded) to connect with global stakeholders including peers, not excluding other languages, experts, and community members, to learn about issues and problems or to gain a broader perspective; develop multiple viewpoints that may be electronically published and accessible to all audiences. |
Lessons
|
9-12.GC.C.1 |
Learn project management roles on a team to meet goals, based on their knowledge of technology and content, as well as personal preference; goals in project, timelines and milestones, will be monitored with tools and shared globally. |
Lessons
|
9-12.GC.D.1 |
Select and justify the effective collaborative technologies (live video conference, online forums, social media and other emerging communication methods) to investigate, develop, and publish solutions related to local and global issues. |
Lessons
|
9-12.GC.D.2 |
Understand that digital tools such as blogs and social media can be used to crowd source, crowd fund, and mobilize a community toward a goal. |
Lessons
|