Standards in this Framework
Standard | Description |
---|---|
8.CS.D.01 | Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device. (CSTA Practice - P3) |
8.CS.HS.01 | Model a computing system involving multiple considerations and potential tradeoffs of software and hardware, such as functionality, cost, size, speed, accessibility, and aesthetics (CSTA Practice - P5) |
8.CS.IO.01 | Know and apply grade-level appropriate skills with input and output devices. (CSTA Practice - P7) |
8.CS.T.01 | Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.(CSTA Practice - P6) |
8.NI.NCO.01 | Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.(CSTA Practice - P4) |
8.NI.C.01 | Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7) |
8.NI.C.02 | Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.(CSTA Practice - P4) |
8.DA.S.01 | Analyze multiple methods of representing data and choose the most appropriate method for representing data.(CSTA Practice - P4) |
8.DA.C.01 | Develop, implement, and refine a process that utilizes computational tools to collect meaningful data. (CSTA Practice - P6) |
8.DA.VT.01 | Develop, implement, and refine a process to make data more useful and reliable.(CSTA Practice - P6) |
8.DA.IM.01 | Refine computational models based on the data generated by the models.(CSTA Practice - P5, P4) |
8.AP.A.01 | Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems. (CSTA Practice - P4) |
8.AP.V.01 | Create programs using variables with purposeful and thoughtful naming conventions for identifiers to improve program readability. (CSTA Practice - P5) |
8.AP.C.01 | Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.(CSTA Practice - P5) |
8.AP.M.01 | Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.(CSTA Practice - P3) |
8.AP.PD.01 | Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.(CSTA Practice - P2, P1) |
8.AP.PD.02 | Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution. (CSTA Practice - P4, P5, P7) |
8.AP.PD.03 | Systematically test and refine programs using a range of student created inputs.(CSTA Practice - P6) |
8.AP.PD.04 | Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.(CSTA Practice - P2) |
8.AP.PD.05 | Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.(CSTA Practice - P7) |
8.IC.C.01 | Describe the trade-offs associated with computing technologies (e.g. automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.(CSTA Practice - P7) |
8.IC.C.02 | Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability (CSTA Practice - P1) |
8.IC.SI.01 | Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).(CSTA Practice - P2, P5) |
8.IC.H.01 | Identify and describe how the prominent figures in computer science have impacted and/or progressed the field. (CSTA Practice - P3) |
8.IC.SLE.01 | Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.(CSTA Practice - P7) |
8.IC.CP.01 | Formulate a computer-science based solution for a problem or issue by gathering input from local / regional industry members (CSTA Practice - P2, P5) |