This document outlines a scheme of work for a Developing Games course with 13 lessons that teach key concepts related to programming games. The lessons progress from investigating simple games to adding sprites, events, variables, user needs, functions, libraries and more. Lessons incorporate flowcharts, pseudocode, variables, control structures, decomposition, modularity, testing, collaboration and documentation.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views
Standards Alignment
This document outlines a scheme of work for a Developing Games course with 13 lessons that teach key concepts related to programming games. The lessons progress from investigating simple games to adding sprites, events, variables, user needs, functions, libraries and more. Lessons incorporate flowcharts, pseudocode, variables, control structures, decomposition, modularity, testing, collaboration and documentation.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Construct3
Standards alignment for Developing Games Scheme of Work
Lesson 2 - Lesson 9 - Lesson 12 -
Lesson 1 - Lesson 4 - Lesson 7 - Lesson 13 - Level 2 (Ages 11-14) Adding a sprite Lesson 3 - Events Lesson 5 - User Lesson 6 - Lesson 8 - Compound Lesson 10 - Lesson 11 - Using Variables Concept Subconcept Code Investigating a Variables and Computational improvements By the end of Grade 8, students will be able to.. and control its and Actions needs Project lifecycle Flowcharts conditional Functions libraries naming simple game data types Thinking and feedback movement statements conventions Recommend improvements to the design of computing Devices 2-CS-01 devices, based on an analysis of how users interact with the devices Computing Hardware & Design projects that combine hardware and software Systems 2-CS-02 Software components to collect and exchange data. Systematically identify and fix problems with computing Troubleshooting 2-CS-03 devices and their components. Network Model the role of protocols in transmitting data across Communication 2-NI-04 networks and the Internet. & Organization Networks & The Explain how physical and digital security measures protect Internet 2-NI-05 electronic information. Cybersecurity Apply multiple methods of encryption to model the secure 2-NI-06 transmission of information. Storage 2-DA-07 Represent data using multiple encoding schemes Collection, Collect data using computational tools and transform the data Data & Analysis Visualization, & 2-DA-08 to make it more useful and reliable. Transformation Inference & Refine computational models based on the data they have 2-DA-09 Models generated. Use flowcharts and/or pseudocode to address complex Algorithms 2-AP-10 Y Y problems as algorithms. Create clearly named variables that represent different data Variables 2-AP-11 Y Y types and perform operations on their values. Design and iteratively develop programs that combine control Control 2-AP-12 structures, including nested loops and compound Y conditionals Decompose problems and subproblems into parts to facilitate 2-AP-13 Y Y Y Y Y Y Y Y Y Y Y Y the design, implementation, and review of programs. Modularity Create procedures with parameters to organize code and Algorithms & 2-AP-14 Y make it easier to reuse. Programming Seek and incorporate feedback from team members and 2-AP-15 Y Y Y users to refine a solution that meets user needs. Incorporate existing code, media, and libraries into original 2-AP-16 Y programs, and give attribution. Program Systematically test and refine programs using a range of test 2-AP-17 Y Y Y Y Y Y Y Y Y Y Y Development cases. Distribute tasks and maintain a project timeline when 2-AP-18 Y Y Y Y Y Y Y Y Y Y Y Y collaboratively developing computational artifacts. Document programs in order to make them easier to follow, 2-AP-19 Y test, and debug. Compare tradeoffs associated with computing technologies 2-IC-20 that affect people's everyday activities and career options Culture Discuss issues of bias and accessibility in the design of existing 2-IC-21 technologies. Impacts of Computing Collaborate with many contributors through strategies such Social 2-IC-22 as crowdsourcing or surveys when creating a computational Y Interactions artifact. Safety, Law, & Describe tradeoffs between allowing information to be public 2-IC-23 Ethics and keeping information private and secure.
Distributed Computing and Internet Technology 10th International Conference ICDCIT 2014 Bhubaneswar India February 6 9 2014 Proceedings 1st Edition Gérard Berry All Chapters Instant Download