K-12 Computer Science Standards

California 6-8

24 Standards

1

6-8.AP.10

Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.

2

6-8.AP.11

Create clearly named variables that store data, and perform operations on their contents.

3

6-8.AP.12

Design and iteratively develop programs that combine control structures and use compound conditions.

4

6-8.AP.13

Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.

5

6-8.AP.14

Create procedures with parameters to organize code and make it easier to reuse.

6

6-8.AP.15

Seek and incorporate feedback from team members and users to refine a solution that meets user needs.

7

6-8.AP.16

Incorporate existing code, media, and libraries into original programs, and give attribution.

8

6-8.AP.17

Systematically test and refine programs using a range of test cases.

9

6-8.AP.18

Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.

10

6-8.AP.19

Document programs in order to make them easier to use, read, test, and debug.

11

6-8.CS.1

Design modifications to computing devices in order to improve the ways users interact with the devices.

12

6-8.CS.2

Design a project that combines hardware and software components to collect and exchange data.

13

6-8.CS.3

Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.

14

6-8.DA.7

Represent data in multiple ways.

15

6-8.DA.8

Collect data using computational tools and transform the data to make it more useful.

16

6-8.DA.9

Test and analyze the effects of changing variables while using computational models.

17

6-8.IC.20

Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.

18

6-8.IC.21

Discuss issues of bias and accessibility in the design of existing technologies.

19

6-8.IC.22

Collaborate with many contributors when creating a computational artifact.

20

6-8.IC.23

Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.

21

6-8.IC.24

Compare tradeoffs between allowing information to be public and keeping information private and secure.

22

6-8.NI.4

Model the role of protocols in transmitting data across networks and the Internet.

23

6-8.NI.5

Explain potential security threats and security measures to mitigate threats.

24

6-8.NI.6

Apply multiple methods of information protection to model the secure transmission of information.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program