8.1.12.AP.1 |
Design algorithms to solve computational problems using a combination of original and existing algorithms. |
-
1.6 Top Down Design and Decomposition in Karel
-
1.9 Super Karel
-
1.16 Karel Algorithms
|
8.1.12.AP.2 |
Create generalized computational solutions using collections instead of repeatedly using simple variables. |
-
6.1 Intro to Lists/Arrays
-
6.2 Indexing Into an Array
-
6.3 Adding/Removing From an Array
-
6.4 Array Length and Looping Through Arrays
-
6.5 Iterating Over an Array
-
6.6 Finding an Element in a List
-
6.7 Removing an Element From an Array
|
8.1.12.AP.3 |
Select and combine control structures for a specific application based upon performance and readability, and identify trade-offs to justify the choice. |
-
6.6 Finding an Element in a List
|
8.1.12.AP.4 |
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue. |
-
5.1 Project: Tell a Story
-
11.1 Present a Data-Driven Insight
|
8.1.12.AP.5 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
-
1.6 Top Down Design and Decomposition in Karel
-
4.7 JavaScript vs Karel
-
4.8 Basic JavaScript and Graphics Challenges
|
8.1.12.AP.6 |
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. |
-
5.1 Project: Tell a Story
|
8.1.12.AP.7 |
Collaboratively design and develop programs and artifacts for broad audiences by incorporating feedback from users. |
-
12.1 Intro to Design Thinking
-
12.3 Prototype
-
12.4 Test
-
12.5 Project Prep and Development
|
8.1.12.AP.8 |
Evaluate and refine computational artifacts to make them more usable and accessible. |
-
12.2 Empathy
|
8.1.12.AP.9 |
Collaboratively document and present design decisions in the development of complex programs. |
-
12.5 Project Prep and Development
|
8.1.12.CS.1 |
Describe ways in which integrated systems hide underlying implementation details to simplify user experiences. |
-
4.7 JavaScript vs Karel
|
8.1.12.CS.2 |
Model interactions between application software, system software, and hardware. |
-
8.2 Software and Applications
|
8.1.12.CS.3 |
Compare the functions of application software, system software, and hardware. |
-
8.1 Operating Systems
-
8.2 Software and Applications
|
8.1.12.CS.4 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
-
1.15 Debugging Strategies
|
8.1.12.DA.1 |
Create interactive data visualizations using software tools to help others better understand real world phenomena, including climate change. |
-
10.2 Visualizing and Interpreting Data
|
8.1.12.DA.2 |
Describe the trade-offs in how and where data is organized and stored |
-
7.1 Intro to Digital Information
|
8.1.12.DA.3 |
Translate between decimal numbers and binary numbers. |
-
7.2 Number Systems
|
8.1.12.DA.4 |
Explain the relationship between binary numbers and the storage and use of data in a computing device. |
-
7.3 Encoding Text with Binary
|
8.1.12.DA.5 |
Create data visualizations from large data sets to summarize, communicate, and support different interpretations of real-world phenomena. |
-
10.2 Visualizing and Interpreting Data
|
8.1.12.DA.6 |
Create and refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process. |
-
11.1 Present a Data-Driven Insight
|
8.1.12.IC.1 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
-
9.1 The Effects of the Internet
|
8.1.12.IC.2 |
Test and refine computational artifacts to reduce bias and equity deficits. |
-
12.2 Empathy
|
8.1.12.IC.3 |
Predict the potential impacts and implications of emerging technologies on larger social, economic, and political structures, using evidence from credible sources. |
-
9.1 The Effects of the Internet
|
8.1.12.NI.1 |
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. |
-
8.4 Internet Hardware
|
8.1.12.NI.2 |
Evaluate security measures to address various common security threats |
-
8.10 Cybersecurity
|
8.1.12.NI.3 |
Explain how the needs of users and the sensitivity of data determine the level of security implemented |
-
8.10 Cybersecurity
|
8.1.12.NI.4 |
Explain how decisions on methods to protect data are influenced by whether the data is at rest, in transit, or in use. |
-
8.10 Cybersecurity
|