CCP.1 |
Identify the advantages, disadvantages and unintended consequences of computing devices. |
Lessons
|
CCP.2 |
Analyze the relationship between human and computer interactions to improve the device. For example, student A watches student B use a simple communication device. Student A updates the tool for improved use. |
Lessons
|
CCP.3 |
Identify and describe multiple considerations and tradeoffs when designing or selecting computing system, such as functionality, cost, size, speed, accessibility, and aesthetics. |
Lessons
|
CCP.4 |
Construct optimized models of computing systems. |
Lessons
|
CCP.5 |
Create structured processes to troubleshoot problems with computing systems. |
Lessons
|
CCP.6 |
Define protocols in relation to a set of rules. |
Lessons
|
CCP.7 |
Construct protocols that can be used to share information between people or devices. For example: a binary communication protocol using lights. |
Lessons
|
CCP.8 |
Compare the relative strengths and weaknesses of unique protocols considering security, speed, and reliability. |
Lessons
|
CCP.9 |
Create models of networks that include packets and domain name server (DNS). |
Lessons
|
CCP.10 |
Identify steps to ensure security measures are in place to safeguard online information. |
Lessons
|
CCP.11 |
Create cyphers to encrypt data that can be transferred between users. |
Lessons
|
CCP.12 |
Explain how encryption can be used to safeguard data that is sent across a network. |
Lessons
|
CCP.13 |
Evaluate the accuracy and precision of various forms of data collection. |
Lessons
|
CCP.14 |
Identify and define the limiting factors to specific forms of data collection. |
Lessons
|
CCP.15 |
Describe how different formats of stored data represent tradeoffs between quality and size. |
Lessons
|
CCP.16 |
Represent data using different encoding schemes, such as binary, Unicode, Morse code, shorthand, studentcreated codes. |
Lessons
|
CCP.17 |
Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools. |
Lessons
|
CCP.18 |
Revise variables and constants in computational models to more accurately reflect real-world systems. For example in an ecosystem model, introducing predators as a new variable. |
Lessons
|
CCP.19 |
Solicit and integrate peer feedback as appropriate to develop or refine a program. |
Lessons
|
CCP.20 |
Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size. |
Lessons
|
CCP.21 |
Provide proper attribution when code is borrowed or built upon. |
Lessons
|
CCP.22 |
Interpret the flow of execution of algorithms and predict their outcomes. |
Lessons
|
CCP.23 |
Design, develop, and present computational artifacts such as mobile applications that address social problems both independently and collaboratively |
Lessons
|
CCP.24 |
Develop programs, both independently and collaboratively, that include sequences with nested loops and multiple branches. (Clarification: At this level, students may use block- based and/or text-based programming languages.) |
Lessons
|
CCP.25 |
Identify the purpose of variables in relation to programming |
Lessons
|
CCP.26 |
Create variables that represent different types of data and manipulate their values. |
Lessons
|
CCP.27 |
Define and use procedures that hide the complexity of a task and can be reused to solve similar tasks. (Clarification: Students use and modify, but do not necessarily create, procedures with parameters.) |
Lessons
|
CCP.28 |
Decompose a problem into parts and create solutions for each part. |
Lessons
|
CCP.29 |
Use an iterative design process (e.g., define the problem, generate ideas, build, test, and improve solutions) to solve problems, both independently and collaboratively. |
Lessons
|
CCP.30 |
Analyze the positive and negative impacts of computing technology. |
Lessons
|
CCP.31 |
Recognize there are tradeoffs in computing. |
Lessons
|
CCP.32 |
Explain how social interactions can allow for multiple viewpoints. |
Lessons
|
CCP.33 |
Demonstrate an understanding of digital security. |
Lessons
|