H-NI-01 |
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, end devices, topology, and addressing. |
Lessons
|
H-NI-02 |
Give examples to illustrate how sensitive data can be affected by viruses, malware and other attacks. |
Lessons
|
H-NI-03 |
Recommend security measures to address various scenarios based on factors such as usability, efficiency, feasibility, and ethical impacts. |
Lessons
|
H-NI-04 |
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). * |
Lessons
|
H-NI-05 |
Compare ways software developers protect devices and information from unauthorized access. * |
Lessons
|
H-DA-01 |
Evaluate the tradeoffs in how data elements are organized and where data is stored.* |
Lessons
|
H-DA-02 |
Collect data using appropriate data collection tools and techniques to support a claim or to communicate information. |
Lessons
|
H-DA-03 |
Understand and design database structures to optimize search and retrieval.* |
Lessons
|
H-DA-04 |
Explain the privacy concerns related to the collection and generation of data. |
Lessons
|
H-DA-05 |
Use data analysis tools (e.g. formulas and other software data / statistical tools) to process and transform the data to make it more useful and reliable. |
Lessons
|
H-DA-06 |
Use data analysis tools and techniques to identify patterns and analyze data represented in complex systems. |
Lessons
|
H-DA-07 |
Create computational models that represent the relationships among different elements of data. |
Lessons
|
H-DA-08 |
Create interactive data visualizations using software tools to help others better understand real-world phenomena. |
Lessons
|
H-DA-09 |
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.* |
Lessons
|
H-AP-01 |
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. |
Lessons
|
H-AP-02 |
Use a development process in creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration. |
Lessons
|
H-AP-03 |
Use functions, data structures or objects to simplify solutions, generalizing computational problems instead of repeated use of simple variables. |
Lessons
|
H-AP-04 |
Design and iteratively develop event-driven computational artifacts for practical intent, personal expression, or to address a societal issue. |
Lessons
|
H-AP-05 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
Lessons
|
H-AP-06 |
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance and explain the benefits and drawbacks of choices made. |
Lessons
|
H-AP-07 |
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. |
Lessons
|
H-AP-08 |
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. |
Lessons
|
H-AP-09 |
Evaluate and refine computational artifacts to make them more usable and accessible using systematic testing and debugging. |
Lessons
|
H-AP-10 |
Systematically design and develop programs for broad audiences by incorporating feedback from users. |
Lessons
|
H-AP-11 |
Design and develop computational artifacts working in team roles using collaborative tools.* |
Lessons
|
H-AP-12 |
Describe how artificial intelligence drives many software and physical systems.* |
Lessons
|
H-AP-13 |
Use and adapt classic algorithms to solve computational problems.* |
Lessons
|
H-AP-14 |
Evaluate algorithms in terms of their efficiency, correctness, and clarity.* |
Lessons
|
H-AP-15 |
Compare and contrast fundamental data structures and their uses.* |
Lessons
|
H-AP-16 |
Illustrate the flow of execution of a recursive algorithm.* |
Lessons
|
H-AP-17 |
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.* |
Lessons
|
H-AP-18 |
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.* |
Lessons
|
H-AP-19 |
Select and employ an appropriate component or library to facilitate programming solutions.* |
Lessons
|
H-AP-20 |
Develop programs for multiple computing platforms.* |
Lessons
|
H-AP-21 |
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.* |
Lessons
|
H-AP-22 |
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., introducing errors).* |
Lessons
|
H-AP-23 |
Evaluate key qualities (including correctness, usability, readability, and efficiency) of a program.* |
Lessons
|
H-AP-24 |
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.* |
Lessons
|
H-IC-01 |
Reduce bias and equity deficits through the design of accessible computational artifacts. |
Lessons
|
H-IC-02 |
Evaluate and assess how computing impacts personal, ethical, social, economic, and cultural practices. |
Lessons
|
H-IC-03 |
Research how computational innovations that have revolutionized aspects of our culture might have evolved from a need to solve a problem. |
Lessons
|
H-IC-04 |
Explain the beneficial and harmful effects that laws governing data (intellectual property, privacy etc.) can have on innovation. |
Lessons
|
H-IC-05 |
Evaluate and design computational artifacts to maximize their benefit to society.* |
Lessons
|
H-IC-06 |
Evaluate the impact of the digital divide (i.e. inequity of computing access, education and influence) on the development of local communities and society. |
Lessons
|
H-IC-07 |
Demonstrate ways computational design (i.e. algorithms, abstractions and analysis) can apply to problems across disciplines.* |
Lessons
|
H-IC-08 |
Debate laws and regulations that impact the development and use of software and the protection of privacy. |
Lessons
|
H-CS-01 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
Lessons
|
H-CS-02 |
Compare levels of abstraction and interactions between application software, system software and hardware layers. |
Lessons
|
H-CS-03 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
Lessons
|
H-CS-04 |
Categorize the roles of operating system software. |
Lessons
|
H-CS-05 |
Illustrate ways computing systems implement logic, input, and output through hardware components.* |
Lessons
|