Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CS.6-8.1.1a
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. |
|
CS.6-8.1.2a
Collect data using computational tools and transform the data to make it more useful and reliable. |
|
CS.6-8.1.2b
Illustrate translation of a structure such as a game board, road map, or mind map into a labeled graph and explain the contributions of the components. |
|
CS.6-8.2.1a
Model the role of protocols in transmitting data across the Internet. |
|
CS.6-8.2.1b
Design projects that combine hardware and software components to collect and exchange data. |
|
CS.6-8.2.1c
Systematically identify and fix problems with computing devices and their components. |
|
CS.6-8.2.1d
Compare and contrast network topologies. |
|
CS.6-8.2.2a
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices. |
|
CS.6-8.2.2b
Identify the role of connected network components. |
|
CS.6-8.2.2c
Discuss issues of bias and accessibility in the design of existing technologies. |
|
CS.6-8.2.3a
Describe various types of threat actors. |
|
CS.6-8.2.3b
Develop strategies to raise awareness of hardware vulnerabilities. |
|
CS.6-8.2.3c
Evaluate the risks and benefits of Internet of Things devices. |
|
CS.6-8.2.3d
Distinguish between responsible and malicious hacking. |
|
CS.6-8.3.1a
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
|
CS.6-8.3.1b
Use flowcharts and/or pseudocode to address complex problems as algorithms. |
|
CS.6-8.3.1c
Systematically test and refine programs using a range of test cases. |
|
CS.6-8.3.2a
Represent data using multiple encoding schemes. |
|
CS.6-8.3.2b
Document programs in order to make them easier to follow, test, and debug. |
|
CS.6-8.3.2c
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
|
CS.6-8.3.2d
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
|
CS.6-8.3.2e
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. |
|
CS.6-8.3.3a
Explain the role and importance of backups. |
|
CS.6-8.4.1a
Explain how physical and digital security measures protect electronic information. |
|
CS.6-8.4.1b
Apply multiple methods of encryption to model the secure transmission of information. |
|
CS.6-8.4.1c
Describe tradeoffs between allowing information to be public and keeping information private and secure. |
|
CS.6-8.4.1d
Discuss the risks and benefits of sharing PII. |
|
CS.6-8.4.1e
Explain techniques to detect, correct, and prevent disclosure of PII. |
|
CS.6-8.4.1f
Analyze specific federal, state, and local laws as they relate to cybersecurity and privacy. |
|
CS.6-8.5.1a
Examine an aspect of daily life that is predicted to change due to the introduction of AI technologies. |
|
CS.6-8.5.1b
Compare the changes AI is bringing to society with those of previous industrial revolutions. |
|
CS.6-8.5.1c
Predict a new type of job that might arise, or how an existing type of job might change or go away, as a result of the adoption of AI technologies. |
|
CS.6-8.5.1d
Create a novel application using some of the AI extensions or plugins available in the programming framework of your choice. |
|
CS.6-8.5.1e
Research a societal problem and describe how AI technologies can be used to address that problem. |
|
CS.6-8.5.1f
Create a dataset for training a decision tree classifier or predictor and explore the impact that different feature encodings have on the decision tree. |
|
CS.6-8.5.2a
Describe how a vision system might exhibit cultural bias if it lacked knowledge of objects not found in the culture of the people who created it (For example: road signs in different countries). |
|
CS.6-8.5.2b
Train and evaluate a classification or prediction model using machine learning on a dataset. |
|
CS.6-8.5.2c
Evaluate the ways various stakeholders' goals and values influence the design of AI systems. |
|
CS.6-8.5.2d
Explain how the choice of training data shapes the behavior of the classifier, and how bias can be introduced if the training set is not properly balanced to represent the full range and distribution of items being classified. |
|
CS.6-8.5.2e
Define criteria for consciousness and evaluate AI systems or fictional AI characters according to those criteria. |
|
CS.6-8.5.3a
Give examples of how intelligent agents combine information from multiple sensors. |
|
CS.6-8.5.3b
Give examples of different types of computer perception that can extract meaning from sensory signals. |
|
CS.6-8.5.3c
Illustrate how sequences of words can be recognized as phrases, even if some of the words are unclear, by looking at how the words fit together. |
|
CS.6-8.5.3d
Show how a game board (e.g., tic-tac-toe, Chutes and Ladders, Monopoly, chess) can be represented by a description in plain language. |
|
CS.6-8.5.3e
Evaluate how an AI system meets the design criteria of accountability and respect for privacy. |
|
CS.6-8.5.3f
Contrast the unique characteristics of human learning with the ways machine learning systems operate. |
|
CS.6-8.5.3g
Model how unsupervised learning finds patterns in unlabeled data. |
|
CS.6-8.5.3h
Explain the difference between training and using a reasoning model. |
|
CS.6-8.5.3i
Compare how a decision tree learning algorithm works vs. how a neural network learning algorithm works. |
|
CS.6-8.5.3j
Explain the differences between supervised learning and reinforcement learning. |
|
CS.6-8.5.3k
Illustrate the structure of a neural network and describe how its parts form a set of functions that compute an output. |
|
CS.6-8.5.3l
Illustrate how a computer can solve a maze, find a route on a map, or reason about concepts in a knowledge graph by drawing a search tree. |
|
CS.6-8.5.3m
Model the process of solving a graph search problem using breadth-first search to draw a search tree. |
|
CS.6-8.5.3n
Categorize problems as classification, prediction, combinatorial search, or sequential decision problems. |
|
CS.6-8.5.3o
Illustrate how word embeddings can be used to reason about the meaning of words. |
|
CS.6-8.5.3p
Describe some NLP (Natural Language Processing) tasks computers can perform and explain how they work. |
|
CS.6-8.5.3q
Explain the knowledge a computer would need to solve a naive physics reasoning problem. |
|
CS.6-8.5.3r
Describe how computers use different types of cues to recognize human emotional states. |
|
CS.6-8.6.1a
Develop strategies to raise awareness of the effects of, and methods to identify and prevent, cyberbullying. |
|
CS.6-8.6.1b
Recognize the many sources of data that make up a digital footprint. |
|
CS.6-8.6.1c
Recognize the permanence of a digital footprint. |
|
CS.6-8.6.1d
Explain how intellectual property and copyright relate to fair use. |
|
CS.6-8.6.1e
Identify the role of social media in their lives. |
|
CS.6-8.6.1f
Reflect on the positive and negative effects social media use has on their relationships. |
|
CS.6-8.6.1g
Think about how to develop healthy habits when using digital media. |
|
CS.6-8.6.1h
Explain why information about them and their behaviors is valuable to companies and consider potential strategies to limit access to information by third parties. |
|