8.1 |
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters. |
-
1.9 For Loops
-
1.10 If Statements
-
1.11 If/Else Statements
-
1.12 While Loops in Karel
-
1.13 Control Structures Example
-
1.14 More Karel Examples and Testing
-
1.16 Karel Challenges
-
14.4 For Loops
-
14.13 Parameters
-
14.14 Using i in For Loops
-
14.15 Extended Loop Control
-
14.16 If Statements
-
14.17 If/ Else Statements
-
14.18 While Loops
-
14.19 Putting Together Control Structures
|
8.2 |
The student will systematically test and refine programs using a range of test cases. |
-
1.9 For Loops
-
1.10 If Statements
-
1.11 If/Else Statements
-
1.12 While Loops in Karel
-
1.13 Control Structures Example
-
1.16 Karel Challenges
-
14.12 User Input
-
14.13 Parameters
-
14.16 If Statements
-
14.17 If/ Else Statements
-
14.18 While Loops
-
14.19 Putting Together Control Structures
|
8.3 |
The student will explain how effective communication between participants is required for successful collaboration when developing programs. |
-
14.19 Putting Together Control Structures
|
8.4 |
The student will use flowcharts and/or pseudo code to address complex problems as algorithms. |
-
1.6 Top Down Design and Decomposition in Karel
-
14.10 Top Down Design
|
8.5 |
The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system. |
-
2.2 Computer Organization
-
2.3 Software
-
2.4 Hardware
|
8.6 |
The student will identify physical and digital security measures used protect electronic information. |
-
9.3 Internet Safety
-
9.4 Privacy & Security
|
8.7 |
The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions. |
-
9.4 Privacy & Security
-
16.2 What is Cybersecurity?
-
16.3 Impact of Cybersecurity
|
8.8 |
The student will explain the difference between a model and a simulation, and create computational models to conduct simulations. |
|
8.9 |
The student will describe tradeoffs between allowing information to be public, and keeping information private. |
-
9.1 Digital Footprint and Reputation
-
9.6 Creative Credit & Copyright
|
8.10 |
The student will evaluate online and print sources for appropriateness and credibility. |
-
9.5 Information Literacy
-
9.6 Creative Credit & Copyright
|
8.11 |
The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity. |
|
8.12 |
The student will explore careers related to the field of cybersecurity. |
-
16.2 What is Cybersecurity?
|
8.13 |
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. |
-
9.4 Privacy & Security
|