CS.3A.1 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
-
2.2 Computer Organization
-
6.3 Encoding Text with Binary
-
6.4 Pixel Images
-
6.6 Pixel Colors!
-
7.2 Internet Hardware
-
7.3 Internet Addresses
|
CS.3A.2 |
Compare levels of abstraction and interactions between application software, system software, and hardware layers |
-
2.2 Computer Organization
-
2.3 Software
-
2.4 Hardware
-
7.2 Internet Hardware
|
CS.3A.3 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
|
NI.3A.1 |
Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, and addressing. |
-
2.2 Computer Organization
-
2.4 Hardware
-
7.2 Internet Hardware
-
7.3 Internet Addresses
-
7.4 DNS
-
7.5 Routing
|
NI.3A.2 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks. |
-
16.3 Impact of Cybersecurity
|
NI.3A.3 |
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. |
|
NI.3A.4 |
Compare various security measures considering tradeoffs between the usability and security of a computing system. |
|
NI.3A.5 |
Explain tradeoffs when selecting and implementing cybersecurity recommendations. |
|
DA.3A.1 |
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. |
-
2.4 Hardware
-
6.2 Number Systems
-
6.3 Encoding Text with Binary
-
6.4 Pixel Images
-
6.5 Hexadecimal
-
6.6 Pixel Colors!
-
6.7 Image Manipulation
|
DA.3A.2 |
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
|
DA.3A.3 |
Collect, transform, and organize data to help others better understand a problem. |
|
DA.3A.4 |
Create and evaluate computational models that represent real-world systems. |
|
AP.3A.1 |
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. |
-
14.19 Putting Together Control Structures
|
AP.3A.2 |
Use lists and functions to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
-
1.4 Functions in Karel
-
1.14 More Karel Examples and Testing
-
1.16 Karel Challenges
-
14.8 Functions
|
AP.3A.3 |
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. |
-
1.9 For Loops
-
1.11 If/Else Statements
-
1.12 While Loops in Karel
-
1.13 Control Structures Example
|
AP.3A.4 |
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. |
-
5.1 Project: Your First Website
-
10.1 Project: Public Service Announcement
|
AP.3A.5 |
Decompose problems into smaller components through systematic analysis, using
constructs such as procedures, modules, and/or objects. |
-
1.6 Top Down Design and Decomposition in Karel
-
14.8 Functions
-
14.10 Top Down Design
|
AP.3A.6 |
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. |
-
14.8 Functions
-
14.13 Parameters
|
AP.3A.7 |
Systematically design and develop programs for broad audiences by incorporating feedback from users |
|
AP.3A.8 |
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. |
-
9.6 Creative Credit & Copyright
|
AP.3A.9 |
Evaluate and refine computational artifacts to make them more usable and accessible. |
|
AP.3A.10 |
Design and develop computational artifacts working in team roles using collaborative tools. |
-
10.1 Project: Public Service Announcement
-
14.19 Putting Together Control Structures
|
AP.3A.11 |
Document design decisions using text, graphics, presentations, and/or
demonstrations in the development of complex programs. |
-
1.7 Commenting Your Code
-
14.6 Comments
|
IC.3A.1 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
|
IC.3A.2 |
Test and refine computational artifacts to reduce bias and equity deficits. |
|
IC.3A.3 |
Demonstrate ways a given algorithm applies to problems across disciplines. |
|
IC.3A.4 |
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
|
IC.3A.5 |
Explain the beneficial and harmful effects that intellectual property laws can have on
innovation. |
-
2.5 Future of Computing
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
-
9.6 Creative Credit & Copyright
|
IC.3A.6 |
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. [ |
-
9.4 Privacy & Security
|
IC.3A.7 |
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. |
-
7.7 The Impact of the Internet
-
8.1 Project: The Effects of the Internet
-
9.1 Digital Footprint and Reputation
-
9.4 Privacy & Security
|