Wisconsin 6-8 Standards Mapping

to

Fundamentals of Cybersecurity

46 Standards in this Framework 26 Standards Mapped 56% Mapped to Course

Standard Lessons
AP1.a.6.m Decompose (break down) a computational problem into parts and create solutions for one or more parts.
1. 4.3 Looping
AP1.a.7.m Identify how sub-problems could be recombined to create something new (e.g., break down the individual parts that would be needed to program a certain type of game and then show how the parts could be reused in other types of games).
AP2.a.6.m Develop programs, both independently and collaboratively, which include sequencing with nested loops and multiple branches [Clarification At this level, students may use block-based and/or text- based languages].
1. 4.3 Looping
2. 4.4 Branching
3. 22.7 For Loop Practice
4. 22.10 Loop and a Half
AP2.a.7.m Produce computational artifacts with broad accessibility and usability through careful consideration of diverse needs and wants of the community.
AP2.a.8.m Use an iterative design process (e.g., define the problem; generate ideas; build, test, and improve solutions) to solve computational problems, both independently and collaboratively.
AP2.a.9.m Create variables that represent different types of data and manipulate their values.
1. 4.1 Programming Concepts
AP3.a.3.m Provide proper attribution when code is borrowed or built upon.
AP3.b.5.m Discuss how algorithms have impacted societyâ€” both the beneficial and harmful effects.
1. 10.10 Impact of the Internet
AP3.b.6.m Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size (e.g., different algorithms solve the same problem, but one might be faster than the other). [Clarification Students are not expected to quantify these differences].
1. 21.1 Challenge Problems
AP3.b.7.m Modify existing code to change its functionality and discuss the variety of ways in which to do this.
AP3.c.1.m Interpret the flow of execution of algorithms and predict their outcomes. [Clarification Algorithms can be expressed using natural language, flow and control diagrams, comments within code, and pseudocode].
1. 4.6 Organizational Techniques
AP3.c.2.m Use documentation regarding code to modify programs.
AP4.a.3.m Define and use functions/ procedures that hide the complexity of a task and can be reused to solve similar tasks. [Clarification Students use and modify, but do not necessarily create, functions or procedures with parameters].
1. 4.2 Programming with Karel
2. 4.3 Looping
AP5.a.5.m Solicit and integrate peer feedback as appropriate to develop or refine a program.
AP5.b.2.m Analyze team membersâ€™ strengths and use them to foster an inclusive computing culture.
AP6.a.3.m Use testing and debugging methods to ensure program correctness and completeness.
1. 4.3 Looping
2. 4.4 Branching
AP6.b.2.m Apply a rubric to determine if and how well a program meets objectives.
CS1.a.5.m Justify the suitability of hardware and software chosen to accomplish a task (e.g., comparison of the features of a tablet vs. desktop, selecting which sensors and platform to use in building a robot or developing a mobile app).
CS2.a.3.m Use a systematic process to identify the source of a problem within individual and connected devices (e.g., follow a troubleshooting flow diagram, make changes to software to see if hardware will work, restart device, check connections, swap in working components).
1. 12.1 Methodology
2. 12.2 Support Practice
CS3.a.1.m Analyze the relationship between a device's computational components and its capabilities. (e.g., computing systems include not only computers, but also cars, microwaves, smartphones, traffic lights, and flash drives).
1. 7.1 Operating Systems
2. 11.1 Internal Components
CS4.a.1.m Extend or modify existing programs to add simple features and behaviors using different forms of inputs and outputs (e.g., inputs such as sensors, mouse clicks, data sets; outputs such as text, graphics, sounds).
DA1.a.3.m Represent data using different encoding schemes (e.g., binary, Unicode, Morse code, shorthand, student-created codes).
1. 10.2 Notational Systems
2. 10.3 Data Representation
DA2.a.3.m Gather and organize multiple quantitative data elements using a computational tool (e.g., spreadsheet software).
DA2.b.3.m Develop a strategy to answer a question by using a computer to manipulate (e.g., sort, total and/or average, chart, graph) and analyze data that has been collected by the class or student.
DA3.a.4.m Describe how different formats of stored data represent tradeoffs between quality and size. [Clarification compare examples of music, text and/or image formats].
DA3.a.5.m Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools (e.g., use an app or spreadsheet form to collect data, decide which data to use or ignore, and choose a visualization method).
DA4.a.4.m Revise computational models to more accurately reflect real-world systems (e.g., ecosystems, epidemics, spread of ideas).
DA4.a.5.m Modify an existing computational model to emphasize key features and relationships within a system. (A model can be used to simulate events, examine theories and inferences, or make predictions).
IC1.a.4.m Provide examples of how computational artifacts and devices impact health and wellbeing, both positively and negatively, locally and globally (e.g., effects of globalization, and automation).
1. 10.10 Impact of the Internet
IC1.a.5.m Explain how computer science fosters innovation and can enhance careers and disciplines.
1. 7.4 Software and Applications
2. 10.10 Impact of the Internet
IC1.b.3.m Analyze and present beneficial and harmful effects of personal electronic communication and social electronic communication.
1. 2.1 Digital Footprint and Reputation
2. 2.2 Cyberbullying
3. 2.3 Internet Safety
4. 7.4 Software and Applications
5. 10.10 Impact of the Internet
IC1.b.4.m Describe ways in which the internet impacts global communication and collaborating.
1. 10.10 Impact of the Internet
1. 10.10 Impact of the Internet
IC2.b.2.m Critically evaluate and redesign a computational artifact to remove barriers to universal access (e.g., using captions on images, high contrast colors, and/or larger font sizes).
IC2.c.4.m Use the internet ethically and safely to work with a group of people who are not physically near to solve a problem or reach a goal.
IC3.a.2.m Understand laws associated with digital information (e.g., intellectual property, fair use, and Creative Commons).
1. 2.6 Creative Credit & Copyright
IC3.a.3.m Describe ethical issues that relate to computing devices and networks (e.g., equity of access, security, hacking, intellectual property, copyright, Creative Commons licensing, and plagiarism).
1. 2.6 Creative Credit & Copyright
2. 2.7 Hacking Ethics
3. 10.1 Introduction to the Internet
4. 10.10 Impact of the Internet
IC3.b.4.m Analyze and summarize negative and positive impacts of using data and information to categorize people, predict behavior, and make recommenda- tions based on those predictions (e.g., customizing search results or targeted advertising based on previous browsing history can save search time and limit options at the same time).
NI1.a.4.m Analyze and summarize security risks associated with weak passwords, lack of encryption, insecure transactions, and persistence of data.
1. 2.4 Privacy & Security
2. 5.1 Cryptography, Cryptology, Cryptanalysis
3. 8.9 Common Security Problems
NI1.a.5.m Understand security issues with general computer use.
1. 2.4 Privacy & Security
2. 7.6 Application Security
3. 8.9 Common Security Problems
NI1.b.2.m Understand security issues with general computer use.
1. 2.4 Privacy & Security
2. 7.6 Application Security
3. 8.9 Common Security Problems
NI2.a.6.m Simulate how information is transmitted as packets through multiple devices over the internet and networks.
1. 10.8 Packets & Protocols
2. 10.9 Viewing a Webpage
NI2.a.7.m Explain, using basic terms, how a wireless or cellular network allows internet information to be transmitted from a server to a user device.
1. 8.5 Clients and Servers
2. 10.4 Internet Hardware and Sending Information
3. 11.3 Network Devices
4. 11.5 Network Options
NI2.b.2.m Define the term protocol, provide an example of protocols in daily life, and explain their use on the internet.
1. 10.8 Packets & Protocols
NI2.c.3.m Explain the hierarchical structure of the Internet Domain Name System (IDNS).
1. 10.6 Domain Name System (DNS)
NI2.d.2.m Encode and decode text- based messages using basic algorithms (e.g., shift cipher, substitution cipher).
1. 5.3 Basic Crypto Systems: Caesar Cipher
2. 5.4 Basic Crypto Systems: Cracking Caesar
3. 5.5 Basic Crypto Systems: Vigenere Cipher