for New Jersey 6-8 Computer Science — New Jersey MS Computer Science
Total Standards: 25Mapped: 25Completion: 100%
8.1.8.AP.1
Design and illustrate algorithms that solve complex problems using flowcharts and/or pseudocode.
1.10 Top Down Design
4.3 Comments & Pseudocode
4.4 Variables
14.6 Top Down Design and Decomposition in Karel
14.16 Karel Challenges
8.1.8.AP.2
Create clearly named variables that represent different data types and perform operations on their values.
1.7 Naming Guidelines
1.11 Variables
4.4 Variables
6.3 Operators
8.1.8.AP.3
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
1.19 Putting Together Control Structures
6.1 For Loops
6.2 While Loops
6.3 Operators
6.4 If/Else Statements
7.1 micro:bit Challenges
14.13 Control Structures Example
14.14 More Karel Examples and Testing
14.16 Karel Challenges
8.1.8.AP.4
Decompose problems and sub-problems into parts to facilitate the design, implementation, and review of programs.
1.10 Top Down Design
4.3 Comments & Pseudocode
6.5 Functions
14.6 Top Down Design and Decomposition in Karel
8.1.8.AP.5
Create procedures with parameters to organize code and make it easier to reuse.
1.13 Parameters
6.5 Functions
8.1.8.AP.6
Refine a solution that meets users’ needs by incorporating feedback from team members and users.
5.3 Preparing and Conducting the Investigation
7.4 Final Project
12.6 Test
8.1.8.AP.7
Design programs, incorporating existing code, media, and libraries, and give attribution
5.4 Analyzing, Synthesizing, and Reporting
11.6 Copyright
8.1.8.AP.8
Systematically test and refine programs using a range of test cases and users.
1.12 User Input
1.16 If Statements
1.17 If/ Else Statements
1.18 While Loops
1.19 Putting Together Control Structures
5.3 Preparing and Conducting the Investigation
6.2 While Loops
6.4 If/Else Statements
7.1 micro:bit Challenges
14.11 If/Else Statements
14.12 While Loops in Karel
14.13 Control Structures Example
14.14 More Karel Examples and Testing
14.16 Karel Challenges
8.1.8.AP.9
Document programs in order to make them easier to follow, test, and debug.
1.6 Comments
4.3 Comments & Pseudocode
14.7 Commenting Your Code
14.15 How to Indent Your Code
8.1.8.CS.1
Recommend improvements to computing devices in order to improve the ways users interact with the devices.
5.3 Preparing and Conducting the Investigation
5.4 Analyzing, Synthesizing, and Reporting
7.4 Final Project
8.1.8.CS.2
Design a system that combines hardware and software components to process data.
5.3 Preparing and Conducting the Investigation
5.4 Analyzing, Synthesizing, and Reporting
6.2 While Loops
6.4 If/Else Statements
6.5 Functions
8.1.8.CS.3
Justify design decisions and explain potential system trade-offs.
5.3 Preparing and Conducting the Investigation
5.4 Analyzing, Synthesizing, and Reporting
8.1.8.CS.4
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
4.5 Debugging with micro:bit
9.6 Troubleshooting
8.1.8.DA.1
Organize and transform data collected using computational tools to make it usable for a specific purpose.
5.1 Sample Project: Climate Change
5.4 Analyzing, Synthesizing, and Reporting
7.3 Follow a Step-by-Step Project
8.1.8.DA.2
Explain the difference between how the computer stores data as bits and how the data is displayed.
2.1 Intro to Digital Information
2.2 Number Systems
2.3 Encoding Text with Binary
2.4 Pixel Images
2.6 Pixel Colors!
8.1.8.DA.3
Identify the appropriate tool to access data based on its file format.
5.1 Sample Project: Climate Change
8.1.8.DA.4
Transform data to remove errors and improve the accuracy of the data for analysis.
5.1 Sample Project: Climate Change
5.4 Analyzing, Synthesizing, and Reporting
8.1.8.DA.5
Test, analyze, and refine computational models
5.1 Sample Project: Climate Change
5.4 Analyzing, Synthesizing, and Reporting
8.1.8.DA.6
Analyze climate change computational models and propose refinements.
5.1 Sample Project: Climate Change
8.1.8.IC.1
Compare the trade-offs associated with computing technologies that affect individual’s everyday activities and career options.
3.8 The Impact of the Internet
8.1 Digital Footprint and Reputation
8.1.8.IC.2
Describe issues of bias and accessibility in the design of existing technologies.
5.3 Preparing and Conducting the Investigation
12.2 Empathy
8.1.8.NI.1
Model how information is broken down into smaller pieces, transmitted as addressed packets through multiple devices over networks and the Internet, and reassembled at the destination.
3.6 Packets and Protocols
11.9 Viewing Websites
8.1.8.NI.2
Model the role of protocols in transmitting data across networks and the Internet and how they enable secure and errorless communication.
3.3 Internet Addresses
3.6 Packets and Protocols
8.1.8.NI.3
Explain how network security depends on a combination of hardware, software, and practices that control access to data and systems.
3.7 Cybersecurity
8.1.8.NI.4
Explain how new security measures have been created in response to key malware events.