Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
8.CS.D.01
Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device. (CSTA Practice - P3) |
|
8.CS.HS.01
Model a computing system involving multiple considerations and potential tradeoffs of software and hardware, such as functionality, cost, size, speed, accessibility, and aesthetics (CSTA Practice - P5) |
|
8.CS.IO.01
Know and apply grade-level appropriate skills with input and output devices. (CSTA Practice - P7) |
|
8.CS.T.01
Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.(CSTA Practice - P6) |
|
8.NI.NCO.01
Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.(CSTA Practice - P4) |
|
8.NI.C.01
Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7) |
|
8.NI.C.02
Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.(CSTA Practice - P4) |
|
8.DA.S.01
Analyze multiple methods of representing data and choose the most appropriate method for representing data.(CSTA Practice - P4) |
|
8.DA.C.01
Develop, implement, and refine a process that utilizes computational tools to collect meaningful data. (CSTA Practice - P6) |
|
8.DA.VT.01
Develop, implement, and refine a process to make data more useful and reliable.(CSTA Practice - P6) |
|
8.DA.IM.01
Refine computational models based on the data generated by the models.(CSTA Practice - P5, P4) |
|
8.AP.A.01
Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems. (CSTA Practice - P4) |
|
8.AP.V.01
Create programs using variables with purposeful and thoughtful naming conventions for identifiers to improve program readability. (CSTA Practice - P5) |
|
8.AP.C.01
Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.(CSTA Practice - P5) |
|
8.AP.M.01
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.(CSTA Practice - P3) |
|
8.AP.PD.01
Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.(CSTA Practice - P2, P1) |
|
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution. (CSTA Practice - P4, P5, P7) |
|
8.AP.PD.03
Systematically test and refine programs using a range of student created inputs.(CSTA Practice - P6) |
|
8.AP.PD.04
Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.(CSTA Practice - P2) |
|
8.AP.PD.05
Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.(CSTA Practice - P7) |
|
8.IC.C.01
Describe the trade-offs associated with computing technologies (e.g. automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.(CSTA Practice - P7) |
|
8.IC.C.02
Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability (CSTA Practice - P1) |
|
8.IC.SI.01
Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).(CSTA Practice - P2, P5) |
|
8.IC.H.01
Identify and describe how the prominent figures in computer science have impacted and/or progressed the field. (CSTA Practice - P3) |
|
8.IC.SLE.01
Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.(CSTA Practice - P7) |
|
8.IC.CP.01
Formulate a computer-science based solution for a problem or issue by gathering input from local / regional industry members (CSTA Practice - P2, P5) |
|