CS Matters Curriculum with Updates for 2020
0. Introduction
1. Your Virtual World
- 1 - 1. Into the Darkness: A World Without Digital Communication (3 sessions)
- 1 - 2. Into the Light: How Computers and the Internet Enhance Innovation (3 sessions)
- 1 - 3. Exploring Innovations(2 sessions)
- 1 - 4. It's Just Bits (2 sessions)
- 1 - 5. How Innovation Affects Our Lives
- 1 - 6. A Problem Solving Process that Scales
- 1 - 7. Unit 1 Assessment
- 1 - 8. The Basics of Research and Technical Writing (2 sessions)
- 1-9a_exploring_a_computing_innovation.pdf (2 sessions)
2. Developing Programming Tools
- 2 - 1. Programming Introduction and Motivation
- 2 - 2. Using Python and PyCharm
- 2 - 3. Algorithms: Basics
- 2 - 4. Algorithms: Pseudocode
- 2 - 5. Reading Python Code and Debugging (2 sessions)
- 2 - 6. Types and Evaluation
- 2 - 7. Creating and Assigning Variables
- 2 - 8. Comparison, Logical Operators, and Conditional Execution
- 2 - 9. Nested and Chained Conditional Statements
- 2 - 10. Iteration: For Loops
- 2 - 11. Iteration: While Loops
- 2 - 12. Functions: Parameters and Return Values
- 2 - 13. Algorithms: Layers of Abstraction
- 2 - 14. Functions: Scope and Abstraction (2 sessions)
- 2 - 15. Strings: Traversing, Slicing, and Parsing (2 sessions)
- 2 - 16. Lists: Creation, Traversal, Insertion, and Removal (2 sessions)
- 2 - 17. Unit Assessment (3 sessions)
3. Information and the Internet
- 3 - 1. The Internet: Basics of Information Transmission
- 3 - 2. The Internet: Present and Future
- 3 - 3. How the Internet Works: Routing
- 3 - 4. How the Internet Works: Domain Name System
- 3 - 5. How the Internet Works: DNS Activity (2 sessions)
- 3 - 6. Search Engines: Finding Information
- 3 - 7. Search Engines: Page Rank and Retrieval (2 sessions)
- Optional: 3 - 8. Basic Statistics with Excel
- 3-9a_exploring_a_computing_innovation.pdf (3 sessions)
- 3 - 10. Cybersecurity: Attacks, Protection, and Impact
- 3 - 11. Cryptography: Symmetric Encryption
- 3 - 12. Cryptography: Public Key Encryption, Certificate Authorities, and Open Standards (2 sessions)
- 3 - 13. Cybersecurity: Malicious Code, Identity Theft, and Remedies
- 3 - 14. Data on the Internet
4. Data Acquisition
- 4 - 1. Data Acquisition and Analysis (2 sessions)
- 4 - 2. What are Models and Simulations?
- 4 - 3. Using Data and Simulations
- 4 - 4. File Input and Output using Python (2 sessions)
- 4 - 5. Data Collection, Analysis, and Simulation (2 sessions)
- 4 - 6_exploring_a_computing_innovation.pdf ( 2 sessions)
- 4 - 7. Hypothesis Testing with Simulations in NetLogo (3 sessions)
- 4 - 8. Unit 4 Assessment
5. Data Manipulation
- 5-1a_manipulating_large_data_sets.pdf (2 sessions)
- 5 - 2. Searching (2 sessions)
- 5 - 3. Sorting (3 sessions)
- 5 - 4. Comparing Algorithms (2 sessions)
- 5 - 5. Advanced Algorithms (2 sessions)
- 5 - 6. Create Performance Task Partial Practice (3 sessions)
6. Data Visualization
- 6-1a_data_visualization_with_EarSketch.pdf (5 sessions)
- 6-2a_optional_data_vizualization_with_RawGraphs.pdf (2 sessions)
- 6 - 3. Dataquest (15 sessions)
- 6 - 4. Diversity Makes For Better Solutions (2 sessions)