Eighth Grade CS Standards and Annotations

Return to Explore Annotations page

 

Computing Systems

  •   Devices

    • 8. CS.D.01 Develop and implement a process to evaluate existing computing devices and make recommendations for improvements to design based on analysis of user interaction and other lenses. Annotation 8.CS.D.01

  •  Hardware and Software 

    • 8. CS.HS.01 Design and refine systems where secure hardware and software are combined to collect, store, retrieve, and exchange data and explain why specific components were chosen for optimality. Annotation.8.CS.HS.01

  •   Troubleshooting

    • 8. CS.T.01 Systematically identify and fix problems with computing devices and their interfaced components by using a structured system such as a troubleshooting flow diagram. Annotation 8.CS.T.01

Networks and the Internet

  • Network Communication and Organization

    • 8. NI.NCO.01 Model and explain how data is sent using protocols to choose the fastest pathway, to deal with missing information, and to deliver data securely. Annotation 8.NI.NCO.01

  • Cybersecurity

    • 8.NI.C.01 Evaluate physical and digital security measures that have been developed and implemented to protect electronic information; discuss the impacts of hacking, ransomware, scams, and ethical/legal concerns. Annotation 8.NI.C.01

Data Analysis

  • Storage

    • 8. DA.S.01 Evaluate different schemes of encoding data in order to effectively choose the most appropriate method of representation. Annotation 8.DA.S.01

  • Collection, Visualization, & Transformation

    • 8.DA.CVT.01 Develop and implement a refined process that uses computational tools to transform data to a more useful and reliable state. Annotation 8.DA.CVT.01

  • Inference & Models

    • 8. DA.IM.01 Refine existing or develop and implement new computational models based on observed and generated data. Annotation 8.DA.IM.01

Algorithms and Programming

  • Algorithms

    • 8. AP.A.01 Develop and implement algorithms and pseudocode to solve complex problems. Annotation 8.AP.A.01

  • Variables

    • 8. AP.V.01 Create clearly named variables of different data types that utilize naming conventions to improve program readability; perform operations on variable values. Annotation 8.AP.V.01

  • Control

    • 8. AP.C.01 Develop secure programs that utilize combinations of nested loops, compound conditionals, procedures with and without parameters, and the manipulation of variables representing different data types. Annotation 8.AP.C.01

  • Modularity

    • 8. AP.M.01 Decompose problems and subproblems into parts to facilitate the secure design, implementation, and review of complex programs. Annotation 8.AP.M.01

    • 8. AP.M.02 Create and use a function with parameters in a program to repeat instructions in order to organize code and make it easier to reuse. Annotation 8.AP.M.02

  • Program Development

    • 8. AP.PD.01 Seek and incorporate feedback from team members and users to refine the solution to a problem that meets the needs of a diverse group of users. Annotation 8.AP.PD.01

    • 8. AP.PD.02 Incorporate existing code, media, and libraries into original programs of increasing complexity, from secure sources, and give appropriate attribution. Annotation 8.AP.PD.02

    • 8. AP.PD.03 Develop a method or implement an existing method to systematically test and refine existing and original programs using user input and secure software development guidance.. Annotation 8.AP.PD.03

    • 8. AP.PD.04 Evaluate communication between participants to determine best practices in collaboration when developing computational artifacts. Annotation 8.AP.PD.04

    • 8. AP.PD.05 Document complex programs, using multiple methods, in order to make them easier to understand, test, and debug. Annotation 8.AP.PD.05

Impacts of Computing

  • Culture and Diversity

    • 8. IC.C.01 Compare the tradeoffs associated with computing concepts (e.g., automation, communication, privacy, cybersecurity), explaining their effects on economics and global societies. Annotation 8.IC.C.01

    • 8. IC.C.02 Analyze issues of bias and accessibility that occur in the design of everyday computing technologies, the role and responsibility of the designer, and make recommendations for how these issues could be rectified to reduce bias. Annotation 8.IC.C.02

  • Social Interactions

    • 8. IC.SI.01 Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Annotation 8.IC.SI.01

  • Safety, Law, & Ethics

    • 8. IC.SLE.01 Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking. Annotation 8.IC.SLE.01

Return to Explore Annotations page