9-12.AP.12 |
Design algorithms to solve computational problems using a combination of original and existing algorithms. |
Lessons
|
9-12.AP.13 |
Create more generalized computational solutions using collections instead of repeatedly using simple variables. |
Lessons
|
9-12.AP.14 |
Justify the selection of specific control structures by identifying tradeoffs associated with implementation, readability, and performance. |
Lessons
|
9-12.AP.15 |
Iteratively design and develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. |
Lessons
|
9-12.AP.16 |
Decompose problems into smaller subproblems through systematic analysis, using constructs such as procedures, modules, and/or classes. |
Lessons
|
9-12.AP.17 |
Create computational artifacts using modular design. |
Lessons
|
9-12.AP.18 |
Systematically design programs for broad audiences by incorporating feedback from users. |
Lessons
|
9-12.AP.19 |
Explain the limitations of licenses that restrict use of computational artifacts when using resources such as libraries. |
Lessons
|
9-12.AP.20 |
Iteratively evaluate and refine a computational artifact to enhance its performance, reliability, usability, and accessibility. |
Lessons
|
9-12.AP.21 |
Design and develop computational artifacts working in team roles using collaborative tools. |
Lessons
|
9-12.AP.22 |
Document decisions made during the design process using text, graphics, presentations, and/or demonstrations in the development of complex programs. |
Lessons
|
9-12.CS.1 |
Describe ways in which abstractions hide the underlying implementation details of computing systems to simplify user experiences. |
Lessons
|
9-12.CS.2 |
Compare levels of abstraction and interactions between application software, system software, and hardware. |
Lessons
|
9-12.CS.3 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
Lessons
|
9-12.DA.10 |
Create data visualizations to help others better understand real-world phenomena. |
Lessons
|
9-12.DA.11 |
Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process. |
Lessons
|
9-12.DA.8 |
Translate between different representations of data abstractions of real-world phenomena, such as characters, numbers, and images. |
Lessons
|
9-12.DA.9 |
Describe tradeoffs associated with how data elements are organized and stored. |
Lessons
|
9-12.IC.23 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
Lessons
|
9-12.IC.24 |
Identify impacts of bias and equity deficit on design and implementation of computational artifacts and apply appropriate processes for evaluating issues of bias. |
Lessons
|
9-12.IC.25 |
Demonstrate ways a given algorithm applies to problems across disciplines. |
Lessons
|
9-12.IC.26 |
Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources. |
Lessons
|
9-12.IC.27 |
Use collaboration tools and methods to increase connectivity with people of different cultures and careers. |
Lessons
|
9-12.IC.28 |
Explain the beneficial and harmful effects that intellectual property laws can have on innovation. |
Lessons
|
9-12.IC.29 |
Explain the privacy concerns related to the collection and generation of data through automated processes. |
Lessons
|
9-12.IC.30 |
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. |
Lessons
|
9-12.NI.4 |
Describe issues that impact network functionality. |
Lessons
|
9-12.NI.5 |
Describe the design characteristics of the Internet. |
Lessons
|
9-12.NI.6 |
Compare and contrast security measures to address various security threats. |
Lessons
|
9-12.NI.7 |
Compare and contrast cryptographic techniques to model the secure transmission of information. |
Lessons
|