3B-AP-08 |
Describe how artificial intelligence drives many software and physical systems. |
-
10.5 Future of Computing
|
3B-AP-09 |
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem. |
|
3B-AP-10 |
Use and adapt classic algorithms to solve computational problems. |
|
3B-AP-11 |
Evaluate algorithms in terms of their efficiency, correctness, and clarity. |
|
3B-AP-12 |
Compare and contrast fundamental data structures and their uses. |
-
4.1 Extra Karel Practice
-
5.1 Extra Karel Puzzles
-
6.13 Parameters
-
6.14 Using i in For Loops
-
6.16 If Statements
-
6.17 If/ Else Statements
-
6.18 While Loops
|
3B-AP-13 |
Illustrate the flow of execution of a recursive algorithm. |
|
3B-AP-14 |
Construct solutions to problems using student-created components, such as procedures, modules and/or objects. |
-
2.3 Karel Can't Turn Right
-
2.4 Functions in Karel
-
2.5 The Start Function
-
2.6 Top Down Design and Decomposition in Karel
-
2.7 Commenting Your Code
-
2.8 Super Karel
-
2.9 For Loops
-
2.10 If Statements
-
2.11 If/Else Statements
-
2.12 While Loops in Karel
-
2.13 Control Structures Example
-
2.14 More Karel Examples and Testing
-
2.15 How to Indent Your Code
-
2.16 Karel Challenges
-
4.1 Extra Karel Practice
-
5.1 Extra Karel Puzzles
-
6.10 Top Down Design
-
11.7 Image Manipulation
|
3B-AP-15 |
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution. |
-
6.1 Intro to Python with Tracy the Turtle
-
6.2 Tracy's Grid World
-
6.3 Turning Tracy
-
6.4 For Loops
-
6.5 Turning Tracy Using Angles
-
6.8 Functions
-
6.9 Artistic Effects
-
6.15 Extended Loop Control
|
3B-AP-16 |
Demonstrate code reuse by creating programming solutions using libraries and APIs. |
-
2.1 Introduction to Programming With Karel
-
2.2 More Basic Karel
-
2.3 Karel Can't Turn Right
-
2.4 Functions in Karel
-
2.5 The Start Function
-
2.6 Top Down Design and Decomposition in Karel
-
2.7 Commenting Your Code
-
2.8 Super Karel
-
2.9 For Loops
-
2.10 If Statements
-
2.11 If/Else Statements
-
2.12 While Loops in Karel
-
2.13 Control Structures Example
-
2.14 More Karel Examples and Testing
-
2.15 How to Indent Your Code
-
3.1 Hello World
-
3.2 Variables
-
3.3 User Input
-
3.4 Basic Math in JavaScript
-
3.5 Using Graphics in JavaScript
-
4.1 Extra Karel Practice
-
5.1 Extra Karel Puzzles
|
3B-AP-17 |
Plan and develop programs for broad audiences using a software life cycle process. |
|
3B-AP-18 |
Explain security issues that might lead to compromised computer programs. |
-
13.7 Network Attacks
|
3B-AP-19 |
Develop programs for multiple computing platforms. |
|
3B-AP-20 |
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project. |
|
3B-AP-21 |
Develop and use a series of test cases to verify that a program performs according to its design specifications. |
|
3B-AP-22 |
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality). |
|
3B-AP-23 |
Evaluate key qualities of a program through a process such as a code review. |
|
3B-AP-24 |
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems. |
|
3B-CS-01 |
Categorize the roles of operating system software. |
|
3B-CS-02 |
Illustrate ways computing systems implement logic, input, and output through hardware components. |
-
13.2 Internet Hardware and Sending Information
-
13.5 Routing
|
3B-DA-05 |
Use data analysis tools and techniques to identify patterns in data representing complex systems. |
|
3B-DA-06 |
Select data collection tools and techniques to generate data sets that support a claim or communicate information. |
|
3B-DA-07 |
Evaluate the ability of models and simulations to test and support the refinement of hypotheses. |
|
3B-IC-25 |
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society. |
-
13.9 Impact of Cybersecurity
|
3B-IC-26 |
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society. |
-
13.8 The CIA Triad
-
13.9 Impact of Cybersecurity
|
3B-IC-27 |
Predict how computational innovations that have revolutionized aspects of our culture might evolve. |
-
10.5 Future of Computing
-
10.6 Computer Model
-
13.1 What is Cybersecurity?
-
13.8 The CIA Triad
-
13.9 Impact of Cybersecurity
|
3B-IC-28 |
Debate laws and regulations that impact the development and use of software. |
|
3B-NI-03 |
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). |
-
13.2 Internet Hardware and Sending Information
-
13.7 Network Attacks
|
3B-NI-04 |
Compare ways software developers protect devices and information from unauthorized access. |
-
13.6 Packets & Protocols
-
13.8 The CIA Triad
|