Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1.1.1
Discuss Career and Technical Student Organizations (CTSO) such as FBLA and DECA. |
|
1.1.2
Investigate CTSO competitive events and identify sources to help prepare for success in competitive events. (If you have an active middle level chapter). |
|
1.1.3
Understand the importance of professional dress and evaluate appropriate dress for CTSO conferences. |
|
1.2.1
Identify effective communication skills by comparing personal vs. business communication. (e.g., text messages, emails). |
|
1.2.2
Comprehend and explain the importance of punctuality and attendance. |
|
1.2.3
Identify traits important to success. (e.g., initiative, positive attitude, enthusiasm, self-confidence). |
|
1.2.4
Discuss integrity and ethical leadership. |
|
1.2.5
Identify and practice fundamental etiquette skills. (e.g., introductions, handshakes, and eye contact) |
|
1.2.6
Participate in soft skill evaluations. |
|
1.3.1
Compare and contrast positive and negative social media presence. |
|
1.3.2
Critique one’s own digital presence. |
|
2.1.1
Practice proper care of computer equipment. (e.g., headphones, mouse, keyboard, etc.). |
|
2.1.2
Demonstrate and maintain proper use of computer equipment. |
|
2.1.3
Identify computer hardware and software. (e.g., peripherals, computer and audio settings, etc.). |
|
2.2.1
Establish effective file and password management. (e.g., Cloud Storage, Networks, etc.). |
|
2.2.2
Access a gradebook program to develop accountability. |
|
3.1.1
Demonstrate the proper techniques necessary for operation of the keyboard (e.g., seating, body posture, finger placement, etc.). |
|
3.1.2
Demonstrate correct touch typing techniques and spacing rules (e.g., punctuation marks, one space after a period, etc.). |
|
3.1.3
Key documents while applying proper keyboarding techniques. |
|
3.2.1
Understand proper 10-key techniques using numeric keypad on a keyboard. |
|
3.2.2
Identify careers utilizing the 10-key techniques. |
|
4.1.1
Determine and utilize the proper text formatting features. (e.g., font type, font style, color and case). |
|
4.1.2
Utilize paragraph formatting functions. (e.g., line spacing, tabs, paragraph spacing, and columns). |
|
4.1.3
Apply page formatting features. (e.g., borders, numbering, bullets, etc.). |
|
4.2.1
Key business documents using appropriate formatting guidelines. (e.g., memo, email, letters, reports). |
|
4.2.2
Edit documents using appropriate proofreaders’ marks. |
|
4.2.3
Key documents from handwritten samples. |
|
5.1.1
Examine traditional programming algorithms, including searches and sorts. |
|
5.1.2
Describe the steps needed to efficiently solve a problem. |
|
5.1.3
Manually test algorithms with simple data to observe accuracy of anticipated output. |
|
5.1.4
Demonstrate appropriate collaborative behaviors (e.g., integrating feedback, providing useful feedback, understanding and accepting multiple perspectives) when solving problems |
|
5.2.1
Apply strategies to protect personal digital footprints (e.g., game profiles, shares on social media, other online accounts) and the responsibilities and opportunities of living, learning, and working in a digitally connected world |
|
5.2.2
Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity, and how to apply digital and physical methods for protecting and securing personal information |
|
5.3.1
Explain the logic involved in how a computer program executes (e.g., flow charts, program flow) |
|
5.3.2
Discuss and apply best practices of backend program design (e.g., comments, documentation, whitespace) |
|
5.3.3
Test a computer program with data and evaluate output for accuracy |
|
5.3.4
Find and debug errors in a computer program |
|
5.4.1
Implement the following programming concepts: data types, variables creation, variable assignment, conditional branching (e.g., if, if-else, multi-branch), iteration (e.g., for, while), functions |
|
5.4.2
Create a program using a text-based programming language. |
|
5.5.1
Identify major components and functions of computer systems (e.g., hardware, software) and networks (e.g., network components, wired, wireless) and recommend methods to secure computer systems and networks. |
|
5.6.1
Research diverse careers and career opportunities that are influence by computer science and the technical and soft skills needed for each. |
|