CS.2.1 |
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices |
|
CS.2.2 |
Design projects that combine hardware and software components to collect and exchange data. |
|
CS.2.3 |
Systematically identify and fix problems with computing devices and their components. |
-
12.1 Methodology
-
12.2 Support Practice
|
NI.2.1 |
Model the role of protocols in transmitting data across networks and the Internet |
-
10.6 Domain Name System (DNS)
-
10.7 Routing
-
10.8 Packets & Protocols
-
10.9 Viewing a Webpage
-
19.13 Viewing Websites
|
NI.2.2 |
Explain how physical and digital security measures protect electronic information |
-
2.4 Privacy & Security
-
5.1 Cryptography, Cryptology, Cryptanalysis
-
7.6 Application Security
-
7.7 Browser Configuration
-
7.8 System Administration
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
-
11.6 Network Communication
-
11.7 Network Management
|
NI.2.3 |
Apply multiple methods of encryption to model the secure transmission of information. |
-
5.3 Basic Crypto Systems: Caesar Cipher
-
5.4 Basic Crypto Systems: Cracking Caesar
-
5.5 Basic Crypto Systems: Vigenere Cipher
|
DA.2.1 |
Represent data using multiple encoding schemes. |
-
10.2 Notational Systems
-
10.3 Data Representation
|
DA.2.2 |
Collect data using computational tools and transform the data to make it more useful and reliable. |
|
DA.2.3 |
Refine computational models based on the data they have generated. |
|
AP.2.1 |
Use flowcharts and/or pseudocode to address complex problems as algorithms. |
-
4.3 Looping
-
4.6 Organizational Techniques
|
AP.2.2 |
Create clearly named variables that represent different data types and perform operations on their values. |
-
4.1 Programming Concepts
|
AP.2.3 |
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. [ |
-
4.3 Looping
-
4.4 Branching
-
22.3 Comparison Operators
-
22.4 If Statements
-
22.7 For Loop Practice
|
AP.2.4 |
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. [ |
|
AP.2.5 |
Create procedures with parameters to organize code and make it easier to reuse |
|
AP.2.6 |
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
|
AP.2.7 |
Incorporate existing code, media, and libraries into original programs and give
attribution. |
|
AP.2.8 |
Systematically test and refine programs using a range of test cases. [ |
-
4.3 Looping
-
4.4 Branching
|
AP.2.9 |
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
|
AP.2.10 |
Document programs in order to make them easier to follow, test, and debug |
-
4.6 Organizational Techniques
|
IC.2.1 |
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. |
-
10.10 Impact of the Internet
|
IC.2.2 |
Discuss issues of bias and accessibility in the design of existing technologies. |
-
10.1 Introduction to the Internet
-
10.10 Impact of the Internet
|
IC.2.3 |
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. |
|
IC.2.4 |
Describe tradeoffs between allowing information to be public and keeping information private and secure. |
-
2.3 Internet Safety
-
2.4 Privacy & Security
|