Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
8.1
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters. |
|
8.2
The student will systematically test and refine programs using a range of test cases. |
|
8.3
The student will explain how effective communication between participants is required for successful collaboration when developing programs. |
|
8.4
The student will use flowcharts and/or pseudo code to address complex problems as algorithms. |
|
8.5
The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system. |
|
8.6
The student will identify physical and digital security measures used protect electronic information. |
|
8.7
The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions. |
|
8.8
The student will explain the difference between a model and a simulation, and create computational models to conduct simulations. |
|
8.9
The student will describe tradeoffs between allowing information to be public, and keeping information private. |
|
8.10
The student will evaluate online and print sources for appropriateness and credibility. |
|
8.11
The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity. |
|
8.12
The student will explore careers related to the field of cybersecurity. |
|
8.13
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. |
|