SECTION 210:15-3-208. Computer Science standards for eighth grade  


Latest version.
  • (a)   Computing Systems.
    (1)   Devices. Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device.
    (2)   Hardware and Software. Design and refine projects that combine hardware and software components to collect and exchange data.
    (3)   Troubleshooting. Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.
    (b)   Networks and the Internet.
    (1)   Network Communication and Organization. Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.
    (2)   Cybersecurity.
    (A)   Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.
    (B)   Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.
    (c)   Data Analysis.
    (1)   Storage. Analyze multiple methods of representing data and choose the most appropriate method for representing data.
    (2)   Collection, Visualization, and Transformation. Develop, implement, and refine a process that utilizes computational tools to collect and transform data to make it more useful and reliable.
    (3)   Inference and Models. Refine computational methods based on the data generated by the models.
    (d)   Algorithms and Programming.
    (1)   Algorithms. Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems.
    (2)   Control. Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.
    (3)   Modularity. Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.
    (4)   Program Development.
    (A)   Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.
    (B)   Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
    (C)   Systematically test and refine programs using a range of student created inputs.
    (D)   Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.
    (E)   Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.
    (e)   Impacts of Computing.
    (1)   Culture.
    (A)   Describe the trade-offs associated with computing technologies (e.g., automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.
    (B)   Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability. Evaluate how technology can be used to distort, exaggerate, and misrepresent information.
    (2)   Social Interactions. Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
    (3)   Safety, Law, and Ethics. Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.
[Source: Added at 36 Ok Reg 1528, eff 9-13-19]