6.CS.D.1 |
Compare computing device designs based on how humans interact with them. |
|
6.CS.HS.1 |
Explain how hardware and software can be used to collect and exchange data. |
-
2.3 Software
-
2.4 Hardware
-
7.2 Internet Hardware
-
7.5 Routing
|
6.CS.T.1 |
Identify problems that can occur in computing devices and their components within a system. |
|
6.NI.C.1 |
Identify multiple methods of encryption to secure the transmission of information. |
|
6.NI.C.2 |
Identify different physical and digital security measures that protect electronic information. |
-
9.4 Privacy & Security
|
6.NI.NCO.1 |
Discuss how protocols are used in transmitting data across networks and the Internet. |
-
7.6 Packets and Protocols
|
6.DA.CVT.1 |
Compare different computational tools used to collect, analyze and present data that is meaningful and useful. |
|
6.DA.S.1 |
Identify multiple encoding schemes used to represent data, including binary and ASCII. |
-
6.2 Number Systems
-
6.3 Encoding Text with Binary
-
6.4 Pixel Images
-
6.5 Hexadecimal
-
6.6 Pixel Colors!
-
6.7 Image Manipulation
|
6.DA.IM.1 |
Discuss the validity of a computational model based on the reliability of the data. |
|
6.AP.A.1 |
Identify planning strategies such as flowcharts or pseudocode, to simulate algorithms that solve problems. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.7 Commenting Your Code
-
14.10 Top Down Design
|
6.AP.V.1 |
Identify variables that represent different data types and perform operations on their values. |
-
14.11 Variables
-
14.12 User Input
-
14.13 Parameters
-
14.17 If/ Else Statements
-
14.18 While Loops
-
14.19 Putting Together Control Structures
|
6.AP.C.1 |
Design programs that combine control structures, including nested loops and compound conditionals. |
-
1.13 Control Structures Example
-
1.14 More Karel Examples and Testing
-
1.16 Karel Challenges
-
14.19 Putting Together Control Structures
|
6.AP.M.1 |
Decompose problems into parts to facilitate the design, implementation, and review of programs. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
14.10 Top Down Design
-
14.19 Putting Together Control Structures
|
6.AP.M.2 |
Use procedures to organize code and make it easier to reuse. |
-
14.8 Functions
-
14.13 Parameters
-
14.19 Putting Together Control Structures
|
6.AP.PD.1 |
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
|
6.AP.PD.2 |
Incorporate existing code into programs and give attribution. |
|
6.AP.PD.3 |
Test programs using a range of inputs and identify expected outputs. |
-
14.16 If Statements
-
14.17 If/ Else Statements
-
14.18 While Loops
-
14.19 Putting Together Control Structures
|
6.AP.PD.4 |
Maintain a timeline with specific tasks while collaboratively developing computational artifacts. |
-
14.19 Putting Together Control Structures
|
6.AP.PD.5 |
Document programs in order to make them easier to follow, test, and debug |
-
14.6 Comments
|
6.IC.C.1 |
Identify some of the tradeoffs associated with computing technologies that can affect people's everyday activities and career options. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
-
9.1 Digital Footprint and Reputation
-
16.2 What is Cybersecurity?
|
6.IC.C.2 |
Identify issues of bias and accessibility in the design of existing technologies. |
|
6.IC.SI.1 |
Identify the advantages of creating a computational product by collaborating with others using digital technologies. |
|
6.IC.SLE.1 |
Describe how some digital information can be public or can be kept private and secure. |
-
9.1 Digital Footprint and Reputation
-
9.4 Privacy & Security
-
16.4 The CIA Triad
|