6-8.AP.10 |
Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems. |
-
2.10 Top Down Design
-
2.19 Putting Together Control Structures
|
6-8.AP.11 |
Create clearly named variables that store data, and perform operations on their contents. |
-
2.7 Naming Guidelines
-
2.11 Variables
-
2.12 User Input
-
3.2 Variables and Types
-
3.3 User Input
|
6-8.AP.12 |
Design and iteratively develop programs that combine control structures and use compound conditions. |
-
2.16 If Statements
-
2.17 If/ Else Statements
-
2.19 Putting Together Control Structures
-
4.4 Logical Operators
-
5.3 Break and Continue
-
6.5 Exceptions
-
15.2 De Morgan's Laws
|
6-8.AP.13 |
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. |
-
2.10 Top Down Design
-
6.1 Functions
-
6.2 Functions and Parameters
-
6.4 Functions and Return Values
|
6-8.AP.14 |
Create procedures with parameters to organize code and make it easier to reuse. |
-
2.13 Parameters
-
6.2 Functions and Parameters
|
6-8.AP.15 |
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
|
6-8.AP.16 |
Incorporate existing code, media, and libraries into original programs, and give attribution. |
|
6-8.AP.17 |
Systematically test and refine programs using a range of test cases. |
-
2.4 For Loops
-
2.17 If/ Else Statements
-
2.18 While Loops
-
2.19 Putting Together Control Structures
-
4.2 If Statements
-
5.1 While Loops
-
5.2 For Loops
-
5.3 Break and Continue
-
6.2 Functions and Parameters
-
7.5 The in Keyword
-
9.4 Dictionaries
-
10.1 Project: Guess the Word
-
13.1 Advanced Challenges with Tracy
-
18.1 Let's Build Mastermind
|
6-8.AP.18 |
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
-
2.19 Putting Together Control Structures
|
6-8.AP.19 |
Document programs in order to make them easier to use, read, test, and debug.
|
-
2.6 Comments
-
3.6 Comments
|
6-8.CS.1 |
Design modifications to computing devices in order to improve the ways users interact with the devices. |
|
6-8.CS.2 |
Design a project that combines hardware and software components to collect and exchange data. |
|
6-8.CS.3 |
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems. |
|
6-8.DA.7 |
Represent data in multiple ways. |
-
8.1 Tuples
-
8.2 Lists
-
9.1 2d Lists
-
9.4 Dictionaries
|
6-8.DA.8 |
Collect data using computational tools and transform the data to make it more useful. |
|
6-8.DA.9 |
Test and analyze the effects of changing variables while using computational models. |
-
2.14 Using i in For Loops
-
2.15 Extended Loop Control
-
7.1 Indexing
-
7.2 Slicing
-
7.4 Strings and For Loops
-
7.5 The in Keyword
-
7.6 String Methods
-
8.1 Tuples
-
8.2 Lists
-
8.3 For Loops and Lists
-
8.4 List Methods
-
9.1 2d Lists
-
9.2 List Comprehensions
-
9.3 Packing and Unpacking
-
9.4 Dictionaries
|
6-8.IC.20 |
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. |
|
6-8.IC.21 |
Discuss issues of bias and accessibility in the design of existing technologies. |
|
6-8.IC.22 |
Collaborate with many contributors when creating a computational artifact. |
-
2.19 Putting Together Control Structures
|
6-8.IC.23 |
Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts. |
|
6-8.IC.24 |
Compare tradeoffs between allowing information to be public and keeping information private and secure. |
|
6-8.NI.4 |
Model the role of protocols in transmitting data across networks and the Internet. |
|
6-8.NI.5 |
Explain potential security threats and security measures to mitigate threats. |
|
6-8.NI.6 |
Apply multiple methods of information protection to model the secure transmission of information. |
|