# 30

Standards in this Framework

Standards Mapped

# 90%

Mapped to Course

Standard Lessons
6-8.AP.01
Solicit, evaluate, and integrate peer feedback as appropriate to develop or refine a product.
1. 7.6 Test
2. 15.4 Final Project
6-8.AP.02
Compare different algorithms that may be used to solve the same problem by time and space efficiency.
1. 1.4 For Loops
2. 1.8 Functions
3. 1.13 Parameters
4. 1.14 Using i in For Loops
5. 1.15 Extended Loop Control
6. 1.18 While Loops
7. 11.13 Control Structures Example
8. 11.14 More Karel Examples and Testing
9. 11.16 Karel Challenges
6-8.AP.03
Interpret, modify, and analyze content-specific models used to run simulations (e.g. ecosystems, epidemics, spread of ideas) .
6-8.AP.04
Apply an iterative design process (define the problem, generate ideas, build, test, and improve solutions) in problem solving, both individually and collaboratively.
1. 7.6 Test
2. 11.6 Top Down Design and Decomposition in Karel
3. 15.1 micro:bit Challenges
4. 15.4 Final Project
6-8.AP.05
Create, analyze, and modify control structures to create programming solutions.
1. 1.4 For Loops
2. 1.14 Using i in For Loops
3. 1.15 Extended Loop Control
4. 1.16 If Statements
5. 1.17 If/ Else Statements
6. 1.18 While Loops
7. 1.19 Putting Together Control Structures
8. 11.9 For Loops
9. 11.11 If/Else Statements
10. 11.12 While Loops in Karel
11. 11.13 Control Structures Example
12. 11.14 More Karel Examples and Testing
13. 11.16 Karel Challenges
14. 14.1 For Loops
15. 14.2 While Loops
16. 14.4 If/Else Statements
17. 15.1 micro:bit Challenges
6-8.AP.06
Predict the outcome of an algorithm and then step through it to verify your predictions.
1. 1.18 While Loops
3. 14.1 For Loops
4. 14.2 While Loops
5. 14.4 If/Else Statements
6-8.AP.07
Decompose a problem into sub-problems and demonstrate how the parts can be synthesized to create a solution.
1. 1.10 Top Down Design
3. 11.6 Top Down Design and Decomposition in Karel
4. 14.5 Functions
6-8.AP.08
Evaluate the correctness of a program by collecting and analyzing data generated from multiple runs of the program.
1. 15.1 micro:bit Challenges
2. 15.2 Explore a New Sensor
3. 15.4 Final Project
6-8.AP.09
Use debugging and testing to improve program quality.
1. 1.10 Top Down Design
2. 1.19 Putting Together Control Structures
3. 11.13 Control Structures Example
4. 11.16 Karel Challenges
5. 15.1 micro:bit Challenges
6. 15.2 Explore a New Sensor
7. 15.4 Final Project
6-8.CS.01
Exemplify how computational devices impact the quality of life (both positively and negatively) and enhance the ability of people to perform work, communicate, and interact with others.
1. 9.7 The Impact of the Internet
6-8.CS.02
Compare and contrast the ways that humans and machines process instructions and sense the world.
1. 3.1 Welcome to micro:bit!
2. 8.2 Number Systems
3. 8.3 Encoding Text with Binary
4. 9.4 DNS
6-8.CS.03
Differentiate features of everyday objects that contain computing components (i.e., computing systems that collect, store, analyze, and/or transmit data) (e.g. Kinect, GoPro, smartphone, car).
1. 13.2 What is Cybersecurity?
6-8.CS.04
Apply troubleshooting strategies for solving hardware and software problems (e.g. recognizing, describing, reproducing, isolating, fixing and retesting).
1. 2.3 Software
2. 2.4 Hardware
6-8.CS.05
Compare and contrast the capabilities of different hardware and software in computer systems (e.g. processors, display types, input devices, communication, and storage capabilities).
1. 2.2 Computer Organization
2. 2.3 Software
3. 2.4 Hardware
6-8.DA.01
Describe the trade-off between quality and file size of stored data (e.g. music, video, text, images).
1. 8.2 Number Systems
6-8.DA.02
Defend the selection of the data, collection, and analysis needed to answer a question.
1. 7.3 Define
2. 7.6 Test
3. 15.2 Explore a New Sensor
6-8.DA.03
Understand that data collection is used to make recommendations to influence decisions as well as predict behavior. List the positive and negative impacts.
1. 15.2 Explore a New Sensor
6-8.DA.04
Encode and decode information using encryption/decryption schemes. (e.g. Morse code, Unicode, binary, symbols, student-created codes, simple ciphers).
1. 5.3 Basic Crypto Systems: Caesar Cipher
2. 5.4 Basic Crypto Systems: Cracking Caesar
3. 5.5 Basic Crypto Systems: Vigenere Cipher
4. 8.1 Intro to Digital Information
5. 8.3 Encoding Text with Binary
6. 8.4 Pixel Images
8. 8.6 Pixel Colors!
6-8.DA.05
Identify layers of abstraction in different contexts (e.g. video and animation are made of audio and video frames, which are made of pixels, which are made of color codes).
1. 8.1 Intro to Digital Information
2. 8.2 Number Systems
3. 8.3 Encoding Text with Binary
4. 8.4 Pixel Images
6. 8.6 Pixel Colors!
6-8.IC.01
Explore security risks associated with using weak passwords, lack of encryption and/or insecure transactions.
1. 4.4 Privacy & Security
6-8.IC.02
Explore how computer science fosters innovation and enhances other careers and disciplines.
1. 2.5 Future of Computing
2. 9.7 The Impact of the Internet
6-8.IC.03
Describe ethical issues that relate to computers and networks (e.g. equity of access, security, privacy, ownership and information sharing, copyright, licensing)
1. 4.3 Internet Safety
2. 4.4 Privacy & Security
6-8.IC.04
Explore how the Internet impacts global communication and collaboration.
1. 9.7 The Impact of the Internet
6-8.IC.05
Design, develop, and present computational artifacts that have a positive social impact (e.g. web pages, mobile applications, animations).
1. 11.16 Karel Challenges
6-8.IC.06
Redesign user interfaces to be more inclusive, accessible, and minimizing the impact of the designer's inherent bias. (e.g. web pages, mobile applications, animations).
6-8.IC.07
Understand and explain the elements of federal, state, and local regulations that relate to digital citizenship (e.g. COPPA, CIPA, state laws, district policies).
1. 4.1 Digital Footprint and Reputation
6-8.IC.08
Summarize current events and changes resulting from computing and their effects on education, the workplace, and society.
1. 2.5 Future of Computing
2. 9.7 The Impact of the Internet
3. 15.4 Final Project
6-8.IC.09
Predict positive and negative social impacts of existing or student created content and computational artifacts (e.g. economic, entertainment, education, or political).
1. 9.7 The Impact of the Internet
6-8.NI.01
Simulate the flow of information as packets on the Internet and networks (e.g. model using strings and paper, note passing)
1. 6.9 Viewing Websites
2. 9.5 Routing
3. 9.6 Packets and Protocols
6-8.NI.02
Compare and contrast the trade-offs between physical (wired), wireless, and mobile networks (e.g. speed, security, and cost).