Standards in this Framework
Standard | Description |
---|---|
CS.D.8.a | Evaluate the advantages and limitations of existing computing devices to recommend design improvements based on analysis of how users interact with the device. |
CS.HS.8.a | Design projects that combine hardware and software components that could complete a task. |
CS.T.8.a | Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others. |
NI.N.8.a | Model the role of hardware components to diagram the infrastructure of networks and the internet (including cloud servers). |
NI.N.8.b | Model protocols (i.e., rules) and explain why they are used to transmit data across networks and the internet. |
NI.N.8.c | Explain how a system responds when information is lost to understand the effect it has on the transferred information. |
NI.C.8.a | Explain how physical and digital security measures are used to protect electronic information. |
NI.C.8.b | Compare and contrast the effects of different types of malware to determine strategies for how to protect devices. |
NI.C.8.c | Compare and contrast examples of various threat actors, such as nation-states, cyber terrorist groups, organized crime or hacktivists. |
NI.C.8.d | Explore and differentiate examples of complex encryption methods, e.g., Vigenère, Bacon’s cipher and Enigma. |
NI.IOT.8.a | Explore career pathways related to IoT to identify careers associated with the computer science field. |
NI.IOT.8.b | Model the lifecycle of information in the IoT including data gathering, transmission, reception and analysis to recreate a realworld scenario. |
DA.DCS.8.a | Interpret digital data collection tools to manage information effectively. |
DA.DCS.8.b | Identify data storage systems to define how data is stored and accessed. |
DA.DCS.8.c | Create a logical file structure to organize data in different storage systems to support individual and collaborative work. |
DA.VC.8.a | Evaluate data to construct a model or representation. |
DA.VC.8.b | Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data. |
DA.IM.8.a | Create and analyze models and simulations to accurately hypothesize a real-world situation. |
ATP.A.8.a | Create multiple pseudocode to solve a multi-step process and justify the most efficient solution. |
ATP.VDR.8.a | Analyze test cases and determine the range of valid solutions. |
ATP.VDR.8.b | Use a data structure to represent a collection. |
ATP.CS.8.a | Use and apply decisions and loops in a program to solve a problem. |
ATP.M.8.a | Decompose problems and subproblems into parts to facilitate the design, implementation and review of complex programs. |
ATP.PD.8.a | Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression. |
ATP.PD.8.b | Systematically test and refine programs using a range of test cases. |
ATP.PD.8.c | Use procedures that utilize parameters to pass values. |
AI.P.8.a | Explain how sounds and images are represented digitally in a computer to explain how sensor data is stored in a computer. |
AI.P.8.b | Describe how a vision system might exhibit cultural bias if it lacked knowledge of objects not found in the culture of the people who created it to create inclusive and equitable data sets. |
AI.P.8.c | Illustrate how sequences of words can be recognized as phrases, even if some of the words are unclear, by looking at how the words fit together to create a text recognition program. |
AI.RR.8.a | Model the process of solving a graph-search problem using breadth-first search to draw a search tree. |
AI.ML.8.a | Explain the difference between training and using a reasoning model to identify how a machine learns. |
AI.ML.8.b | Illustrate how objects in an image can be segmented and labeled to construct a training set for object recognition. |
AI.ML.8.c | Explain how the choice of training data shapes the behavior of the classifier to identify how bias can be introduced if the training set is not properly balanced. |
AI.NI.8.a | Create a program, individually and collaboratively, that implements a language processing algorithm to create a functional chatbot. |
AI.NI.8.b | Critically analyze and discuss features that make an entity “intelligent,” including discussing differences between human, animal and machine intelligence to identify how machine intelligence varies from natural intelligence. |
AI.SI.8.a | Identify and explain how the composition of training data affects the outcome of a supervised artificial intelligence system to identify bias in data sets. |
AI.SI.8.b | Identify bias potential in the design of artificial intelligence systems and describe how to utilize inclusive AI design to prevent algorithmic bias. |
IC.Cu.8.a | Compare current technologies and how they affect the current economy. |
IC.Cu.8.b | Propose potential guidelines/standards/criteria to positively impact bias and accessibility in the design of future technologies. |
IC.Cu.8.c | Identify and explore careers related to the field of computer science. |
IC.Cu.8.d | Explain how computing impacts innovation in other fields. |
IC.SI.8.a | Evaluate the impacts of electronic communication on personal relationships to be able to evaluate differences between face-to-face and electronic communication. |
IC.SLE.8.a | Explain user privacy concerns related to the collection and generation of data that may not be evident through automated processes. |
IC.SLE.8.b | Describe the social and economic implications of privacy in the context of safety, law or ethics to be global digital citizens. |
IC.SLE.8.c | Identify ethical and legal security measures used to protect electronic information. |
IC.SLE.8.d | Provide appropriate credit when using resources or artifacts that are not our own. |