CSI-1.1 |
Document problem analysis through industry standards such as: flowcharts, functional specifications, user stories, etc. |
Lessons
|
CSI-1.2 |
Outline the problem assigned and describe the solution. |
Lessons
|
CSI-1.3 |
Use puzzles and games to enhance problem solving skills. |
Lessons
|
CSI-1.4 |
Recognize language appropriate planning and designing tools (for example: flowcharts, UML diagrams, pseudocode, use cases). |
Lessons
|
CSI-2.1 |
Design a solution to a problem by working in a team. |
Lessons
|
CSI-2.2 |
Explore technologies that can be used to collaborate with others of various cultures and career fields. |
Lessons
|
CSI-2.3 |
Utilize a problem solving approach to develop a solution using technology. |
Lessons
|
CSI-2.4 |
Analyze the work of peers and provide feedback. |
Lessons
|
CSI-2.5 |
Program a solution to a problem using pair programming or other methods. |
Lessons
|
CSI-3.1 |
Develop algorithms to determine a solution. |
Lessons
|
CSI-3.2 |
Assess the use of algorithms to provide a solution. |
Lessons
|
CSI-3.3 |
Use pseudocode to describe a solution. |
Lessons
|
CSI-3.4 |
Create a program flowchart using ANSI standard flowcharting symbols to define a solution. |
Lessons
|
CSI-3.5 |
Explain how the algorithm can be used to solve a problem. |
Lessons
|
CSI-3.6 |
Apply Boolean logic and relational operations. |
Lessons
|
CSI-3.7 |
Describe the different methods for encoding data such as binary, decimal, hexadecimal, ASCII, and Unicode. |
Lessons
|
CSI-4.1 |
Define the process of programming. |
Lessons
|
CSI-4.10 |
Recognize the order of operations used by a computer when performing calculations. |
Lessons
|
CSI-4.11 |
Define simple and compound conditionals (Boolean - not, and, or). |
Lessons
|
CSI-4.12 |
Implement simple and compound conditionals. |
Lessons
|
CSI-4.13 |
Adhere to industry standard programming conventions for accuracy and readability. |
Lessons
|
CSI-4.2 |
Create a computer program that corresponds to an algorithm or proposed solution. |
Lessons
|
CSI-4.3 |
Define fundamental control structures (sequencing, selection, and repetition). |
Lessons
|
CSI-4.4 |
Implement data variables and constants. |
Lessons
|
CSI-4.5 |
Compare local scope and global scope. |
Lessons
|
CSI-4.6 |
Construct a fundamental control structure. |
Lessons
|
CSI-4.7 |
Implement arrays. |
Lessons
|
CSI-4.8 |
Create programmer defined functions and methods to break down program logic and support reuse. |
Lessons
|
CSI-4.9 |
Compare the graphical user interface and the command line interface. |
Lessons
|
CSI-5.1 |
Predict and explain programming outcomes. |
Lessons
|
CSI-5.2 |
Identify cause/effect for input/output. |
Lessons
|
CSI-5.3 |
Understand input validation. |
Lessons
|
CSI-5.4 |
Peer review documentation and code. |
Lessons
|
CSI-5.5 |
Conduct testing to identify performance errors. |
Lessons
|
CSI-5.6 |
Differentiate between syntax and logic errors. |
Lessons
|
CSI-5.7 |
Debug code using techniques such as: code tracing, print statements, boundary testing, breakpoints, etc. |
Lessons
|
CSI-5.8 |
Review computing artifacts to reduce bias, increase equity, and support accessibility. |
Lessons
|
CSI-6.1 |
Describe the function of a computing artifact (for example, code or design). |
Lessons
|
CSI-6.2 |
Identify the purposes of a computing artifact. |
Lessons
|
CSI-6.3 |
Explain concepts related to a computing artifact. |
Lessons
|
CSI-6.4 |
Describe how to use a computing artifact. |
Lessons
|
CSI-6.5 |
Explain cause/effect by interpreting input and output. |
Lessons
|
CSI-6.6 |
Create documentation for computing artifact such as comments or user manual/readme. |
Lessons
|
CSI-7.1 |
Examine the dynamic between privacy and security. |
Lessons
|
CSI-7.2 |
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes. |
Lessons
|
CSI-7.3 |
Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics. |
Lessons
|
CSI-7.4 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks. |
Lessons
|
CSI-7.5 |
Discuss the concepts and justifications for using secure design techniques. |
Lessons
|
CSI-7.6 |
Discuss the laws surrounding intellectual property. |
Lessons
|
CSI-8.1 |
Identify computer science occupations and the roles and responsibilities of each. |
Lessons
|
CSI-8.2 |
Report job outlook, demand, and projected wages for computer science careers. |
Lessons
|
CSI-8.3 |
Explore the job opportunities that are available in computer science. |
Lessons
|
CSI-8.4 |
Investigate post-secondary training opportunities and industry certifications that are available. |
Lessons
|