# 57

Standards in this Framework

Standards Mapped

# 66%

Mapped to Course

Standard Lessons
CS.AP.9-12.1
create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests;
1. 2.4 Functions in Karel
2. 2.5 The Start Function
3. 2.11 If Statements
4. 2.12 If/Else Statements
5. 2.13 While Loops in Karel
6. 2.14 Control Structures Example
7. 2.15 More Karel Examples and Testing
8. 3.2 Challenge Problems
9. 5.2 Variables
10. 5.3 User Input
11. 5.4 Basic Math in JavaScript
12. 5.5 Using Graphics in JavaScript
13. 6.1 Graphics Challenges
14. 7.1 Booleans
15. 7.2 Logical Operators
16. 7.3 Comparison Operators
17. 7.4 If Statements
18. 7.5 For Loops in JavaScript
19. 7.6 General For Loops
20. 7.7 For Loop Practice
21. 7.8 Random Numbers
22. 7.9 While Loops
23. 7.10 Loop and a Half
24. 8.1 Control Structures Challenges
CS.AP.9-12.2
describe how artificial intelligence drives many software and physical systems;
CS.AP.9-12.3
implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem;
CS.AP.9-12.4
use and adapt classic algorithms to solve computational problems;
CS.AP.9-12.5
evaluate algorithms in terms of their efficiency, correctness, and clarity;
CS.AP.9-12.6
use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables;
1. 9.11 Intro to Lists/Arrays
2. 9.12 Adding/Removing From an Array
3. 9.13 Array Length and Looping Through Arrays
4. 9.14 Iterating Over an Array
CS.AP.9-12.7
compare and contrast fundamental data structures and their uses;
1. 17.4 When Do I Use an Object?
CS.AP.9-12.8
justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made;
1. 7.4 If Statements
2. 7.5 For Loops in JavaScript
3. 7.6 General For Loops
4. 7.7 For Loop Practice
5. 7.9 While Loops
6. 7.10 Loop and a Half
7. 8.1 Control Structures Challenges
CS.AP.9-12.9
design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions;
1. 9.10 Mouse Events: Mouse Clicked
2. 15.1 Mouse Events: Mouse Moved
3. 15.3 Key Events
4. 15.4 Crazy Ball Game
CS.AP.9-12.10
decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects;
1. 2.5 The Start Function
2. 2.6 Top Down Design and Decomposition in Karel
3. 3.2 Challenge Problems
4. 6.1 Graphics Challenges
5. 7.5 For Loops in JavaScript
6. 7.7 For Loop Practice
7. 7.8 Random Numbers
8. 7.9 While Loops
9. 7.10 Loop and a Half
10. 8.1 Control Structures Challenges
11. 9.1 Functions and Parameters 1
12. 9.2 Functions and Parameters 2
13. 9.3 Functions and Parameters 3
14. 9.4 Functions and Return Values 1
15. 9.5 Functions and Return Values 2
16. 9.6 Timers
17. 9.7 Random Circles
18. 9.8 Random Ghosts
19. 9.9 Bouncing Ball
20. 9.10 Mouse Events: Mouse Clicked
CS.AP.9-12.11
create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs;
1. 2.4 Functions in Karel
2. 2.5 The Start Function
3. 2.6 Top Down Design and Decomposition in Karel
4. 3.2 Challenge Problems
5. 5.5 Using Graphics in JavaScript
6. 6.1 Graphics Challenges
7. 9.6 Timers
8. 9.7 Random Circles
9. 9.8 Random Ghosts
10. 9.9 Bouncing Ball
11. 9.10 Mouse Events: Mouse Clicked
12. 9.12 Adding/Removing From an Array
13. 9.13 Array Length and Looping Through Arrays
14. 9.14 Iterating Over an Array
CS.AP.9-12.12
construct solutions to problems using student-created procedures, modules, or objects;
1. 2.4 Functions in Karel
2. 3.2 Challenge Problems
3. 6.1 Graphics Challenges
4. 8.1 Control Structures Challenges
5. 9.6 Timers
6. 9.7 Random Circles
7. 9.8 Random Ghosts
8. 9.9 Bouncing Ball
9. 9.10 Mouse Events: Mouse Clicked
CS.AP.9-12.13
analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution;
1. 3.2 Challenge Problems
CS.AP.9-12.14
demonstrate code reuse by creating programming solutions using libraries and application programming interfaces;
CS.AP.9-12.15
systematically design and develop programs for broad audiences by incorporating feedback from users;
1. 10.1 Intro to Design Thinking
2. 10.2 Prototype
3. 10.3 Test
CS.AP.9-12.16
evaluate and refine computational artifacts to make them more usable and accessible;
1. 10.1 Intro to Design Thinking
2. 10.2 Prototype
3. 10.3 Test
CS.AP.9-12.17
design and develop computational artifacts working in team roles using collaborative tools;
1. 3.1 Collaborative Programming
CS.AP.9-12.18
document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs;
2. 10.4 Project Prep and Development
CS.AP.9-12.19
plan and develop programs for broad audiences using a software life cycle process;
CS.AP.9-12.20
explain security issues that might lead to compromised computer programs;
1. 1.1 What is Cybersecurity?
3. 1.6 Privacy & Security
CS.AP.9-12.21
develop programs for multiple computing platforms;
CS.AP.9-12.22
use version control systems, integrated development environments, and collaborative tools and practices in a group software project;
1. 3.1 Collaborative Programming
CS.AP.9-12.23
develop and use a series of test cases to verify that a program performs according to its design specifications;
1. 2.11 If Statements
2. 2.12 If/Else Statements
3. 2.13 While Loops in Karel
4. 2.14 Control Structures Example
5. 2.15 More Karel Examples and Testing
6. 3.2 Challenge Problems
CS.AP.9-12.24
modify an existing program to add additional functionality and discuss intended and unintended implications;
CS.AP.9-12.25
evaluate key qualities of a program through a process such as a code review; and
CS.AP.9-12.26
compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
CS.CS.9-12.1
explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects;
1. 2.8 Abstraction
2. 2.9 Super Karel
CS.CS.9-12.2
compare levels of abstraction and interactions between application software, system software, and hardware layers;
1. 2.8 Abstraction
CS.CS.9-12.3
categorize the roles of operating system software;
CS.CS.9-12.4
develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and
1. 2.17 Debugging Strategies
CS.CS.9-12.5
illustrate ways computing systems implement logic, input, and output through hardware components.
CS.DA.9-12.1
create interactive data visualizations using software tools to help others better understand authentic phenomena;
1. 1.8 Visualizing and Interpreting Data
CS.DA.9-12.2
use data analysis tools and techniques to identify patterns in data representing complex systems;
CS.DA.9-12.3
select data collection tools and techniques to generate data sets that support a claim or communicate information;
1. 1.9 Data Collection & Limitations
CS.DA.9-12.4
translate between different bit representations of authentic phenomena, including characters, numbers, and images;
1. 5.6 Using RGB to Create Colors
CS.DA.9-12.5
evaluate the tradeoffs in how data elements are organized and where data is stored;
1. 1.6 Privacy & Security
CS.DA.9-12.6
create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and
1. 1.8 Visualizing and Interpreting Data
2. 1.9 Data Collection & Limitations
CS.DA.9-12.7
evaluate the ability of models and simulations to test and support the refinement of hypotheses.
CS.IC.9-12.1
evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices;
1. 1.3 Digital Footprint and Reputation
2. 1.4 Cyberbullying
3. 1.10 Creative Credit & Copyright
4. 1.11 Hacking Ethics
5. 1.12 Project: Public Service Announcement
6. 4.1 Intro to the Internet
7. 4.7 The Impact of the Internet
CS.IC.9-12.2
evaluate the ways computing technologies impact American Indian communities in Montana;
CS.IC.9-12.3
test and refine computational artifacts to reduce bias and equity deficits;
CS.IC.9-12.4
demonstrate ways a given algorithm applies to problems across disciplines;
CS.IC.9-12.5
evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society;
1. 4.7 The Impact of the Internet
CS.IC.9-12.6
evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities;
1. 4.7 The Impact of the Internet
CS.IC.9-12.7
predict how computational innovations that have revolutionized aspects of our culture might evolve;
1. 4.1 Intro to the Internet
2. 4.7 The Impact of the Internet
CS.IC.9-12.8
use tools and methods to connect and work with others on a project including people in different cultures and career fields;
1. 3.1 Collaborative Programming
CS.IC.9-12.9
explain the beneficial and harmful effects that intellectual property laws can have on innovation;
1. 1.7 Information Literacy
2. 1.10 Creative Credit & Copyright
CS.IC.9-12.10
explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;
1. 1.1 What is Cybersecurity?
3. 1.3 Digital Footprint and Reputation
4. 1.5 Internet Safety
5. 1.6 Privacy & Security
CS.IC.9-12.11
evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and
1. 1.3 Digital Footprint and Reputation
2. 1.6 Privacy & Security
3. 1.11 Hacking Ethics
CS.IC.9-12.12
debate laws and regulations that impact the development and use of software.
CS.NI.9-12.1
recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts;
1. 1.1 What is Cybersecurity?
3. 1.3 Digital Footprint and Reputation
4. 1.5 Internet Safety
5. 1.6 Privacy & Security
CS.NI.9-12.2
explain tradeoffs when selecting and implementing cybersecurity recommendations;
1. 1.1 What is Cybersecurity?
3. 1.3 Digital Footprint and Reputation
4. 1.6 Privacy & Security
CS.NI.9-12.3
compare ways software developers protect devices and information from unauthorized access;
CS.NI.9-12.4
evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology;
1. 4.2 Internet Hardware