8.1 |
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters. |
-
2.9 For Loops
-
2.10 If Statements
-
2.11 If/Else Statements
-
2.12 While Loops in Karel
-
2.13 Control Structures Example
-
2.14 More Karel Examples and Testing
-
2.16 Karel Challenges
-
3.2 Variables
-
3.3 User Input
-
3.4 Basic Math in JavaScript
-
3.5 Using Graphics in JavaScript
-
6.4 For Loops
-
6.13 Parameters
-
6.14 Using i in For Loops
-
6.15 Extended Loop Control
-
6.16 If Statements
-
6.17 If/ Else Statements
-
6.18 While Loops
-
6.19 Putting Together Control Structures
|
8.2 |
The student will systematically test and refine programs using a range of test cases. |
-
2.9 For Loops
-
2.10 If Statements
-
2.11 If/Else Statements
-
2.12 While Loops in Karel
-
2.13 Control Structures Example
-
2.16 Karel Challenges
-
3.3 User Input
-
3.4 Basic Math in JavaScript
-
6.12 User Input
-
6.13 Parameters
-
6.16 If Statements
-
6.17 If/ Else Statements
-
6.18 While Loops
-
6.19 Putting Together Control Structures
|
8.3 |
The student will explain how effective communication between participants is required for successful collaboration when developing programs. |
-
6.19 Putting Together Control Structures
|
8.4 |
The student will use flowcharts and/or pseudo code to address complex problems as algorithms. |
-
2.6 Top Down Design and Decomposition in Karel
-
6.10 Top Down Design
|
8.5 |
The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system. |
-
10.2 Computer Organization
-
10.3 Software
-
10.4 Hardware
|
8.6 |
The student will identify physical and digital security measures used protect electronic information. |
-
13.7 Network Attacks
|
8.7 |
The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions. |
-
13.1 What is Cybersecurity?
-
13.7 Network Attacks
-
13.9 Impact of Cybersecurity
|
8.8 |
The student will explain the difference between a model and a simulation, and create computational models to conduct simulations. |
|
8.9 |
The student will describe tradeoffs between allowing information to be public, and keeping information private. |
|
8.10 |
The student will evaluate online and print sources for appropriateness and credibility. |
|
8.11 |
The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity. |
|
8.12 |
The student will explore careers related to the field of cybersecurity. |
-
13.1 What is Cybersecurity?
|
8.13 |
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. |
-
13.7 Network Attacks
|