Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
A.1
Review school safety policies and procedures. |
|
A.2
Review classroom safety rules and procedures. |
|
A.3
Review safety procedures for using equipment in the classroom. |
|
A.4
Identify major causes of work-related accidents in office environments. |
|
A.5
Demonstrate safety skills in an office/work environment. |
|
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
|
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. |
|
B.3
Explain the benefits and responsibilities of being a member of a CTSO. |
|
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
|
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
|
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed). |
|
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
|
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. |
|
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). |
|
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use. |
|
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information. |
|
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. |
|
C.8
Evaluate various solutions to common hardware and software problems. |
|
D.1
Demonstrate punctuality. |
|
D.2
Demonstrate self-representation. |
|
D.3
Demonstrate work ethic. |
|
D.4
Demonstrate respect. |
|
D.5
Demonstrate time management. |
|
D.6
Demonstrate integrity. |
|
D.7
Demonstrate leadership. |
|
D.8
Demonstrate teamwork and collaboration. |
|
D.9
Demonstrate conflict resolution. |
|
D.10
Demonstrate perseverance. |
|
D.11
Demonstrate commitment. |
|
D.12
Demonstrate a healthy view of competition. |
|
D.13
Demonstrate a global perspective. |
|
D.14
Demonstrate health and fitness. |
|
D.15
Demonstrate self-direction. |
|
D.16
Demonstrate lifelong learning |
|
E.1
Demonstrate effective speaking and listening skills. |
|
E.2
Demonstrate effective reading and writing skills. |
|
E.3
Demonstrate mathematical reasoning. |
|
E.4
Demonstrate job-specific mathematics skills. |
|
E.5
Demonstrate critical-thinking and problem-solving skills. |
|
E.6
Demonstrate creativity and resourcefulness. |
|
E.7
Demonstrate an understanding of business ethics. |
|
E.8
Demonstrate confidentiality. |
|
E.9
Demonstrate an understanding of workplace structures, organizations, systems, and climates. |
|
E.10
Demonstrate diversity awareness. |
|
E.11
Demonstrate job acquisition and advancement skills. |
|
E.12
Demonstrate task management skills. |
|
E.13
Demonstrate customer-service skills |
|
F.1
Define key computing terms (e.g., hardware, software, data, etc.). |
|
F.2
Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.). |
|
F.3
Define the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.). |
|
F.4
Describe how software and hardware interact. |
|
F.5
Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compresses/uncompressed files.) |
|
G.1
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise) |
|
G.2
Define algorithm (a set of clearly defined, logical steps to solve a problem). |
|
G.3
Demonstrate an understanding of algorithms and their practical applications. |
|
G.4
Create, evaluate, and adjust algorithms to solve a variety of problems. |
|
G.5
Use an iterative problem-solving process to design and refine solutions to a variety of problems. a. Define the problem including a variety of considerations (e.g., users, environment, demographics, societal trends, etc.) b. Design a solution. c. Prepare, test, and refine the solution. d. Reflect on results |
|
H.1
Express the design of a program using representations such as flowcharts and pseudocode. |
|
H.2
Analyze and explain how a particular program functions |
|
H.3
Solve problems of increasing complexity using visual block-based programming individually and collaboratively |
|
H.4
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for) |
|
H.5
Differentiate between text and numerical data. |
|
H.6
Edit, compile/run, test, and debug a program. |
|
I.1
Evaluate the results of Internet searches and the reliability of information found on Web sites. |
|
I.2
Describe how Web sites are used to communicate and exchange data |
|
I.3
Plan a web page considering subject, devices, audience, layout, color, links and graphics. |
|
I.4
Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph) and CSS styles. |
|
J.1
Explore the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing. |
|
J.2
Explain the importance of Acceptable Use Policies. |
|
J.3
Explain the importance of data security and physical security |
|
J.4
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society. |
|
K.1
Research careers in computing along with their education, training requirements, industry certifications and salary ranges. |
|
K.2
Describe how computing enhances other career fields. |
|
K.3
Describe the importance of access and equity in computing. |
|