Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
A.1
Review school safety policies and procedures. |
|
A.2
Review classroom safety rules and procedures. |
|
A.3
Review safety procedures for using equipment in the classroom. |
|
A.4
Identify major causes of work-related accidents in office environments. |
|
A.5
Demonstrate safety skills in an office/work environment. |
|
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
|
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. |
|
B.3
Explain the benefits and responsibilities of being a member of a CTSO. |
|
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
|
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
|
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation. |
|
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
|
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. |
|
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; illegal downloading; cyberbullying; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). |
|
C.5
Discuss legal issues and the terms of use related to copyright laws, Creative Commons, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal use. |
|
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information. |
|
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. |
|
D.1
Demonstrate creativity and innovation. |
|
D.2
Demonstrate critical thinking and problem-solving skills. |
|
D.3
Demonstrate initiative and self-direction. |
|
D.4
Demonstrate integrity. |
|
D.5
Demonstrate work ethic. |
|
D.6
Demonstrate conflict resolution skills. |
|
D.7
Demonstrate listening and speaking skills. |
|
D.8
Demonstrate respect for diversity. |
|
D.9
Demonstrate customer service orientation. |
|
D.10
Demonstrate teamwork. |
|
E.1
Demonstrate global or “big picture” thinking. |
|
E.2
Demonstrate career and life management skills and goal-making. |
|
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements. |
|
E.4
Demonstrate time and resource management skills. |
|
E.5
Demonstrates information literacy skills. |
|
E.6
Demonstrates information security skills. |
|
E.7
Demonstrates information technology skills. |
|
E.8
Demonstrates knowledge and use of job-specific tools and technologies. |
|
E.9
Demonstrate job-specific mathematics skills. |
|
E.10
Demonstrates professionalism in the workplace. |
|
E.11
Demonstrates reading and writing skills. |
|
E.12
Demonstrates workplace safety. |
|
F.1
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-ofservice attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017). |
|
F.2
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017) |
|
F.3
Explain how to document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator. (Ethical and fair use) |
|
F.4
Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons) |
|
F.5
Discuss the implications of using licensed resources in a developed solution. |
|
G.1.1
Investigate how a problem is systematically solved through the selection and integration of hardware and software components |
|
G.1.2
Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, and specialized devices like global positioning systems (GPSs)). |
|
G.1.3
Compare and contrast ways software developers protect both devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017). |
|
G.1.4
Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age). |
|
G.1.5
Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017). |
|
G.1.6
Categorize a variety of algorithms (e.g, linear, exponential, logarithmic, regression etc.). |
|
G.2.1
Compare and contrast the various data collection methods, data analysis tools, and data representation tools. |
|
G.2.2
Compare and contrast the various data storage tools and data organization methods. |
|
G.2.3
Compare and contrast the various data collection methods, data analysis tools, and data representation tools. |
|
G.2.4
Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types, and incorporate them into programs. |
|
G.2.5
Create and modify data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types, and incorporate them into programs. |
|
G.3.1
Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution. (e.g., procedures, modules, objects). |
|
G.3.2
Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries). |
|
G.3.3
Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., trade- offs involving implementation, readability, and program performance). (e.g., conditionals, loops, event handlers, recursion). |
|
G.3.4
Implement and modify built-in classes. |
|
G.3.5
Create and use user-defined classes. |
|
G.3.6
Instantiate and use objects from user-defined classes. |
|
G.4.1
Recommend modifications for existing computing devices and software to improve functionality for end users. |
|
G.4.2
Evaluate and refine programs to make them more usable, functional, and accessible. |
|
G.5.1
Implement version control to track program refinements. (Refers to using folder structures for version control. This is not specific to using configuration management software.) |
|
G.5.2
Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator. |
|