Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons | 
|---|---|
| 
                     1.1.1 
                     Demonstrate understanding of various career paths in computer science (e.g., software development, data science, cybersecurity, networking, robotics, computer engineering, and artificial intelligence) and their roles in different industries.  | 
                
                    
                    
  | 
                
                
            
| 
                     1.1.2 
                     Practice professional communication skills through various activities (e.g., mock interviews, technical presentations, and collaborative coding projects) to prepare for real-world scenarios in computer science careers.  | 
                
                    
                    
  | 
                
                
            
| 
                     1.1.3 
                     Describe the importance of ethical considerations in computer science (e.g., data privacy, algorithmic bias, and social impact of technology) and how they apply to professional practice.  | 
                
                    
                     | 
                
                
            
| 
                     1.1.4 
                     Evaluate the concept and importance of a professional online presence in computer science careers (e.g., portfolio websites, professional networking platforms, open-source contributions) and explore ways to showcase skills and projects.  | 
                
                    
                     | 
                
                
            
| 
                     1.1.5 
                     Identify key elements of a professional portfolio and explain the purpose of a portfolio (e.g., showcasing skills, documenting growth, and supporting college applications or job searches).  | 
                
                    
                     | 
                
                
            
| 
                     2.1.1 
                     Recognize situations where leveraging computational approaches (e.g., data analysis, automation, or simulations) would be beneficial for solving real-world problems.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.1.2 
                     Apply the core computational thinking principles‚ abstraction (focusing on essential elements), decomposition (breaking problems into manageable parts), algorithm development (creating step-by-step solutions), and pattern recognition (identifying recurring elements), to designing effective problem-solving strategies.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.2.1 
                     Use various data types (e.g., Booleans, characters, integers, floating points, and strings) appropriately within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.2.2 
                     Create and use variables to store and manage data within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.2.3 
                     Construct expressions using arithmetic operators (e.g., +, -, *, /, and %) and numeric data types to perform calculations within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.2.4 
                     Convert between different data types when necessary within a program (e.g., casting a string into an integer).  | 
                
                    
                    
  | 
                
                
            
| 
                     2.2.5 
                     Perform operations that encode and decode data from one form into another form (e.g., binary to hexadecimal, numeric values to colored pixels, or numbers to ASCII/Unicode representations).  | 
                
                    
                     | 
                
                
            
| 
                     2.2.6 
                     Implement data structures (e.g., arrays, lists, sets, and maps) to organize, store, manipulate, and perform operations on collections of data within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.1 
                     Analyze a program in terms of steps of execution and expected outcomes (e.g., storyboards, flowcharts, and pseudocode).  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.2 
                     Construct Boolean expressions using relational operators (e.g., <, >, <=, >=, ==, and !=) within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.3 
                     Construct Boolean expressions using logical operators (e.g, AND, OR, and NOT) within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.4 
                     Create programs that implement selection control structures (e.g., if statements and switch statements) to make decisions and execute different code paths based on conditions.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.5 
                     Create programs that implement iteration control structures (e.g., while loops and for loops) to repeat code blocks a specific number of times or until a condition is met.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.6 
                     Create subroutines (e.g., procedures and functions) to modularize code for reusability and organization within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.3.7 
                     Debug errors (e.g., syntax, runtime, and logic) within a program to ensure program functionality.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.4.1 
                     Use the console for basic data input and output operations within a program.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.4.2 
                     Explain the structure and purpose of different file types (e.g., txt, csv, bmp, and json) used for data storage.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.4.3 
                     Develop programs that perform file operations including reading data from, writing data to, and appending data to files.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.5.1 
                     Implement consistent formatting and naming conventions within the code (e.g., indentation, spacing, variable names) to improve code readability and maintainability.  | 
                
                    
                    
  | 
                
                
            
| 
                     2.5.2 
                     Craft clear and concise comments within the code to explain the purpose of different code sections, algorithms used, and non-obvious logic.  | 
                
                    
                    
  | 
                
                
            
| 
                     3.1.1 
                     Categorize data into different types (e.g., quantitative - continuous and discrete, qualitative - nominal and ordinal) and understand the distinction between them.  | 
                
                    
                     | 
                
                
            
| 
                     3.1.2 
                     Identify potential sources of data (e.g., sensors, surveys, databases, and web scraping) based on the type of data needed.  | 
                
                    
                     | 
                
                
            
| 
                     3.1.3 
                     Explain the advantages and disadvantages of different data collection methods (e.g., surveys for user opinions, experiments for cause-effect relationships, and observational studies for naturalistic data) considering factors like accuracy, cost, and time.  | 
                
                    
                     | 
                
                
            
| 
                     3.1.4 
                     Design basic data collection methods (e.g., short surveys, observation checklists, and simple experiments) appropriate for a specific purpose.  | 
                
                    
                     | 
                
                
            
| 
                     3.2.1 
                     Identify and address data quality issues (e.g., missing values, inconsistencies, and outliers) to ensure the data is suitable for analysis.  | 
                
                    
                     | 
                
                
            
| 
                     3.2.2 
                     Analyze data sets utilizing appropriate descriptive statistics (e.g., mean, median, quartiles, and range) and visualizations (e.g., histograms and box plots).  | 
                
                    
                     | 
                
                
            
| 
                     3.2.3 
                     Visually inspect and use exploratory analysis techniques to discern patterns, trends, and relationships within the data.  | 
                
                    
                     | 
                
                
            
| 
                     3.2.4 
                     Develop programs that perform data analysis techniques (e.g., finding correlations and comparison of means) appropriate for the data and question at hand.  | 
                
                    
                     | 
                
                
            
| 
                     3.2.5 
                     Create programs to generate suitable visualizations (e.g., bar charts for comparisons, line charts for trends, scatter plots for relationships, and pie charts for part-to-whole) for the data and question at hand.  | 
                
                    
                     | 
                
                
            
| 
                     3.3.1 
                     Recognize and explain how potential biases (e.g., confirmation, selection, and reporting) within a data source could influence the analysis and resulting insights.  | 
                
                    
                     | 
                
                
            
| 
                     3.3.2 
                     Develop clear and concise narratives that effectively communicate data insights to diverse audiences, leveraging storytelling techniques to enhance understanding and engagement.  | 
                
                    
                     | 
                
                
            
| 
                     3.3.3 
                     Demonstrate a clear understanding of the difference between correlation and causation, ensuring conclusions accurately reflect the relationships identified in the data analysis.  | 
                
                    
                     | 
                
                
            
| 
                     3.3.4 
                     Develop sound inferences from the data to support informed decision-making, avoiding overstated or misleading implications based on the findings.  | 
                
                    
                     | 
                
                
            
| 
                     3.3.5 
                     Present both positive and negative findings in a comprehensive and unbiased way, ensuring accurate data representation for the audience.  | 
                
                    
                     | 
                
                
            
| 
                     4.1.1 
                     Define artificial intelligence (AI), identify its key subfields, and explain its benefits and potential drawbacks in real-world applications.  | 
                
                    
                     | 
                
                
            
| 
                     4.1.2 
                     Explain cloud computing, its service models (e.g., Infrastructure as a Service, Platform as a Service, and Software as a Service), and discuss how it has transformed the IT landscape, including its advantages and challenges.  | 
                
                    
                     | 
                
                
            
| 
                     4.1.3 
                     Define the Internet of Things (IoT), recognize its real-world applications, and discuss its impact on data generation, automation, and interconnectedness.  | 
                
                    
                     | 
                
                
            
| 
                     4.1.4 
                     Explain the concept of big data, its defining characteristics, and its impact on data analysis, decision-making, and various industries.  | 
                
                    
                     | 
                
                
            
| 
                     4.2.1 
                     Define quantum computing, explaining its basic principles and potential to revolutionize computing power and cryptography.  | 
                
                    
                     | 
                
                
            
| 
                     4.2.2 
                     Describe edge computing and its role in processing data closer to the source, discussing its advantages in reducing latency and enhancing privacy.  | 
                
                    
                     | 
                
                
            
| 
                     4.2.3 
                     Explain the concept of extended reality (e.g., virtual reality, augmented reality, and mixed reality) and its potential applications across various industries.  | 
                
                    
                     | 
                
                
            
| 
                     4.2.4 
                     Describe the capabilities of blockchain technology and assess its potential uses across different sectors (e.g., supply chain management, identity verification systems, and decentralized financial services).  | 
                
                    
                     | 
                
                
            
| 
                     5.1.1 
                     Analyze the core principles for establishing comprehensive information security strategies (e.g., confidentiality, integrity, availability, authentication, and non-repudiation) when using data and information systems.  | 
                
                    
                     | 
                
                
            
| 
                     5.1.2 
                     Describe common cyber threats (e.g., malware, phishing, and ransomware) and how these threats can compromise data and information systems.  | 
                
                    
                     | 
                
                
            
| 
                     5.1.3 
                     Describe essential cybersecurity practices (e.g., data encryption, secure coding, and user authentication) and technologies (e.g., firewalls and multi-factor authentication) implemented to safeguard information.  | 
                
                    
                     | 
                
                
            
| 
                     5.1.4 
                     Analyze the impact of best practices (e.g., strong passwords and security awareness training) in maintaining a secure digital environment.  | 
                
                    
                     | 
                
                
            
| 
                     5.2.1 
                     Identify and explain the purpose of key hardware components (e.g., CPU, RAM, storage, and I/O devices) within various computing platforms (e.g., desktops, laptops, and mobile devices) and how they work together to enable the overall system operation.  | 
                
                    
                     | 
                
                
            
| 
                     5.2.2 
                     Define software and distinguish between system software (e.g., operating systems, device drivers) and application software (e.g., word processors, web browsers, games).  | 
                
                    
                     | 
                
                
            
| 
                     5.2.3 
                     Explain the basic functions of an operating system (e.g., managing hardware resources, providing user interface, handling file systems) and its importance in computer operations.  | 
                
                    
                     | 
                
                
            
| 
                     5.2.4 
                     Summarize the concept of open-source software, its benefits, and its impact on software development and distribution.  | 
                
                    
                     | 
                
                
            
| 
                     5.2.5 
                     Explain the importance of software updates and patches in maintaining security and improving functionality.  | 
                
                    
                     | 
                
                
            
| 
                     5.3.1 
                     Define and explain the significance of common network concepts (e.g., IP address, topology, protocols, bandwidth, and latency).  | 
                
                    
                     | 
                
                
            
| 
                     5.3.2 
                     Identify and describe the functionalities of common network hardware (e.g., modems, routers, switches, firewalls, and servers) used in networks.  | 
                
                    
                     | 
                
                
            
| 
                     5.3.3 
                     Explain how basic network security principles (e.g., access control, encryption, and firewalls) are used to safeguard networks.  | 
                
                    
                     | 
                
                
            
| 
                     5.3.4 
                     Analyze the relationship between computer systems, software, and networks in creating interconnected computing environments.  | 
                
                    
                     |