7-8.CT.1 |
Compare the results of alternative models or simulations to determine and evaluate how the input data and assumptions change the results. |
Lessons
|
7-8.CT.10 |
Document the iterative design process of developing a computational artifact that incorporates user feedback and preferences. |
Lessons
|
7-8.CT.2 |
Collect and use digital data in a computational artifact. |
Lessons
|
7-8.CT.3 |
Refine and visualize a data set in order to persuade an audience. |
Lessons
|
7-8.CT.4 |
Write a program using functions or procedures whose names or other documentation convey their purpose within the larger task. |
Lessons
|
7-8.CT.5 |
Identify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences. |
Lessons
|
7-8.CT.6 |
Design, compare and refine algorithms for a specific task or within a program. |
Lessons
|
7-8.CT.7 |
Design or remix a program that uses a variable to maintain the current value of a key piece of information. |
Lessons
|
7-8.CT.8 |
Develop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem. |
Lessons
|
7-8.CT.9 |
Read and interpret code to predict the outcome of various programs that involve conditionals and repetition for the purposes of debugging. |
Lessons
|
7-8.CY.1 |
Determine the types of personal information and digital resources that an individual may have access to that needs to be protected. |
Lessons
|
7-8.CY.2 |
Describe physical, digital, and behavioral safeguards that can be employed in different situations. |
Lessons
|
7-8.CY.3 |
Describe trade-offs of implementing specific security safeguards. |
Lessons
|
7-8.CY.4 |
Describe the limitations of cryptographic methods. |
Lessons
|
7-8.CY.5 |
Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly. |
Lessons
|
7-8.DL.1 |
Type on a keyboard while demonstrating proper keyboarding technique, with increased speed and accuracy. |
Lessons
|
7-8.DL.2 |
Communicate and collaborate with others using a variety of digital tools to create and revise a collaborative product. |
Lessons
|
7-8.DL.3 |
Compare types of search tools, choose a search tool for effectiveness and efficiency, and evaluate the quality of search tools based on returned results. |
Lessons
|
7-8.DL.4 |
Select and use digital tools to create, revise, and publish digital artifacts. |
Lessons
|
7-8.DL.5 |
Transfer knowledge of technology in order to explore new technologies. |
Lessons
|
7-8.DL.6 |
Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy. |
Lessons
|
7-8.DL.7 |
Describe safe, appropriate, positive, and responsible online behavior and identify strategies to combat negative online behavior. |
Lessons
|
7-8.IC.1 |
Compare and contrast tradeoffs associated with computing technologies that affect individuals and society. |
Lessons
|
7-8.IC.2 |
Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information. |
Lessons
|
7-8.IC.3 |
Identify and discuss issues of ethics surrounding computing technologies and current events. |
Lessons
|
7-8.IC.4 |
Identify and discuss issues related to the collection and use of public and private data. |
Lessons
|
7-8.IC.5 |
Analyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals. |
Lessons
|
7-8.IC.6 |
Assess the accessibility of a computing device or software application in terms of user needs. |
Lessons
|
7-8.IC.7 |
Explore a range of computer sciencerelated career paths. |
Lessons
|
7-8.NSD.1 |
Design a user interface for a computing technology that considers usability, accessibility, and desirability. |
Lessons
|
7-8.NSD.2 |
Design a project that combines hardware and software components. |
Lessons
|
7-8.NSD.3 |
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide. |
Lessons
|
7-8.NSD.4 |
Design a protocol for transmitting data through a multi-point network. |
Lessons
|
7-8.NSD.5 |
Summarize how remote data is stored and accessed in a network. |
Lessons
|