SD.CSE.1.1 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
Lessons
|
SD.CSE.1.2 |
Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
Lessons
|
SD.CSE.1.3 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
Lessons
|
SD.CSE.2.1 |
Identify network components by describing the relationship between routers, switches, servers, topology, and addressing. |
Lessons
|
SD.CSE.2.2 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks |
Lessons
|
SD.CSE.2.3 |
Identify security measures to address various scenarios based on the CIA Triad (confidentiality, integrity, and availability). |
Lessons
|
SD.CSE.2.4 |
Compare various security measures, considering tradeoffs between the usability and security of a computing system. |
Lessons
|
SD.CSE.3.1 |
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. |
Lessons
|
SD.CSE.3.2 |
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
Lessons
|
SD.CSE.4.1 |
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
Lessons
|
SD.CSE.4.2 |
Investigate specific control structures and tradeoffs involving implementation, readability, and program performance. |
Lessons
|
SD.CSE.4.3 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
Lessons
|
SD.CSE.4.4 |
Understand the purpose of gathering feedback when creating software |
Lessons
|
SD.CSE.4.5 |
Examine software licenses, including copyright, freeware, and open-source licensing. |
Lessons
|
SD.CSE.4.6 |
Evaluate computer programs for intended outcomes. |
Lessons
|
SD.CSE.5.1 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
Lessons
|
SD.CSE.5.2 |
Examine and identify bias and equity deficits in existing computer programs. |
Lessons
|
SD.CSE.5.3 |
Identify and use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
Lessons
|
SD.CSE.5.4 |
Explore privacy concerns and intellectual property laws related to computing. |
Lessons
|
SD.CSE.5.5 |
Explore careers in computer science. |
Lessons
|