K-12 Computer Science Standards

Montana 6-8

23 Standards

1

CS.AP.6-8.1

use algorithms to address complex problems;

2

CS.AP.6-8.2

create clearly named variables that represent different data types and perform operations on their values;

3

CS.AP.6-8.3

develop programs that combine control structures, including nested loops and compound conditionals;

4

CS.AP.6-8.4

decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs;

5

CS.AP.6-8.5

create procedures with parameters to organize code and make it easier to reuse;

6

CS.AP.6-8.6

seek and incorporate feedback from team members and users to refine a solution that meets user needs;

7

CS.AP.6-8.7

incorporate existing code, media, and libraries into original programs, and give attribution;

8

CS.AP.6-8.8

systematically test and refine programs using a range of test cases;

9

CS.AP.6-8.9

distribute tasks and maintain a project timeline when collaboratively developing computational artifacts; and

10

CS.AP.6-8.10

document programs in order to make them easier to follow, test, and debug.

11

CS.CS.6-8.1

recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices;

12

CS.CS.6-8.2

design projects that combine hardware and software components to collect and exchange data; and

13

CS.CS.6-8.3

systematically identify and fix problems with computing devices and their components.

14

CS.DA.6-8.1

collect data using computational tools and transform the data to make it more useful and reliable;

15

CS.DA.6-8.2

represent data using multiple formats; and

16

CS.DA.6-8.3

refine computational models based on the data they have generated.

17

CS.IC.6-8.1

compare tradeoffs associated with computing technologies that affect people's everyday activities and career options in Montana and the world, urban, rural, and reservation communities;

18

CS.IC.6-8.2

discuss issues of bias and accessibility in the design of existing technologies;

19

CS.IC.6-8.3

collaborate with other contributors when creating a computational artifact; and

20

CS.IC.6-8.4

describe tradeoffs between allowing information, personal or intellectual, to be public and keeping information private and secure.

21

CS.NI.6-8.1

explain how physical and digital security measures protect electronic information;

22

CS.NI.6-8.2

apply multiple methods of encryption to demonstrate how to securely transmit information; and

23

CS.NI.6-8.3

demonstrate how information is broken down and transmitted through multiple devices over networks and the internet and reassembled at the destination.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program