8.1.8.AP.1 |
Design and illustrate algorithms that solve complex problems using flowcharts and/or pseudocode. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.16 Karel Challenges
-
14.10 Top Down Design
|
8.1.8.AP.2 |
Create clearly named variables that represent different data types and perform operations on their values. |
-
14.7 Naming Guidelines
-
14.11 Variables
|
8.1.8.AP.3 |
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
-
1.13 Control Structures Example
-
1.14 More Karel Examples and Testing
-
1.16 Karel Challenges
-
14.19 Putting Together Control Structures
|
8.1.8.AP.4 |
Decompose problems and sub-problems into parts to facilitate the design, implementation, and review of programs. |
-
1.6 Top Down Design and Decomposition in Karel
-
14.10 Top Down Design
|
8.1.8.AP.5 |
Create procedures with parameters to organize code and make it easier to reuse. |
-
14.13 Parameters
|
8.1.8.AP.6 |
Refine a solution that meets users’ needs by incorporating feedback from team members and users. |
|
8.1.8.AP.7 |
Design programs, incorporating existing code, media, and libraries, and give attribution |
|
8.1.8.AP.8 |
Systematically test and refine programs using a range of test cases and users. |
-
1.11 If/Else Statements
-
1.12 While Loops in Karel
-
1.13 Control Structures Example
-
1.14 More Karel Examples and Testing
-
1.16 Karel Challenges
-
14.12 User Input
-
14.16 If Statements
-
14.17 If/ Else Statements
-
14.18 While Loops
-
14.19 Putting Together Control Structures
|
8.1.8.AP.9 |
Document programs in order to make them easier to follow, test, and debug. |
-
1.7 Commenting Your Code
-
1.15 How to Indent Your Code
-
14.6 Comments
|
8.1.8.CS.1 |
Recommend improvements to computing devices in order to improve the ways users interact with the devices. |
|
8.1.8.CS.2 |
Design a system that combines hardware and software components to process data. |
|
8.1.8.CS.3 |
Justify design decisions and explain potential system trade-offs. |
|
8.1.8.CS.4 |
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems. |
|
8.1.8.DA.1 |
Organize and transform data collected using computational tools to make it usable for a specific purpose. |
|
8.1.8.DA.2 |
Explain the difference between how the computer stores data as bits and how the data is displayed. |
-
6.1 Intro to Digital Information
-
6.2 Number Systems
-
6.3 Encoding Text with Binary
-
6.4 Pixel Images
-
6.6 Pixel Colors!
|
8.1.8.DA.3 |
Identify the appropriate tool to access data based on its file format. |
|
8.1.8.DA.4 |
Transform data to remove errors and improve the accuracy of the data for analysis. |
|
8.1.8.DA.5 |
Test, analyze, and refine computational models |
|
8.1.8.DA.6 |
Analyze climate change computational models and propose refinements. |
|
8.1.8.IC.1 |
Compare the trade-offs associated with computing technologies that affect individual’s everyday activities and career options. |
-
7.7 The Impact of the Internet
-
9.1 Digital Footprint and Reputation
|
8.1.8.IC.2 |
Describe issues of bias and accessibility in the design of existing technologies. |
|
8.1.8.NI.1 |
Model how information is broken down into smaller pieces, transmitted as addressed packets through multiple devices over networks and the Internet, and reassembled at the destination. |
-
4.13 Viewing Websites
-
7.6 Packets and Protocols
|
8.1.8.NI.2 |
Model the role of protocols in transmitting data across networks and the Internet and how they enable secure and errorless communication. |
-
7.3 Internet Addresses
-
7.6 Packets and Protocols
|
8.1.8.NI.3 |
Explain how network security depends on a combination of hardware, software, and practices that control access to data and systems. |
|
8.1.8.NI.4 |
Explain how new security measures have been created in response to key malware events. |
|