Standards in this Framework
Standard | Description |
---|---|
CSPG.Y2.1.1 | Leverage problem-solving strategies to solve problems of level-appropriate complexity |
CSPG.Y2.1.2 | Analyze and utilize multiple representations of problem-solving logic used to solve problems of appropriate complexity |
CSPG.Y2.1.3 | Analyze and utilize collaborative methods in problem solving of level-appropriate complexity |
CSPG.Y2.1.4 | Analyze and utilize level-appropriate troubleshooting strategies for hardware and software |
CSPG.Y2.1.5 | Decompose problems of level-appropriate complexity |
CSPG.Y2.2.1 | Construct and evaluate compound expressions using multiple relational and logical operators |
CSPG.Y2.2.4 | Analyze and utilize concepts of abstraction as modeling and abstraction as encapsulation |
CSPG.Y2.2.5 | Perform operations of level-appropriate complexity with binary, octal, decimal, and hexadecimal numbers |
CSPG.Y2.3.1 | Create programs to store, access, and manipulate level-appropriate data (e.g., structured data, objects) |
CSPG.Y2.3.2 | Define and discuss different examples of level-appropriate quantitative and qualitative data |
CSPG.Y2.3.3 | Research, discuss, and create level-appropriate programs to model and simulate probabilistic and real-world scenarios |
CSPG.Y2.3.4 | Analyze, utilize, and visually represent level-appropriate static and dynamic data |
CSPG.Y2.3.5 | Perform level-appropriate data analysis using computing tools |
CSPG.Y2.3.6 | Examine the capacity of computing technology to create and process large sets of data |
CSPG.Y2.4.1 | Apply the five pillars of cybersecurity as applicable to level-appropriate computer science concepts |
CSPG.Y2.4.3 | Research and describe common attacks on hardware, software, and networks |
CSPG.Y2.5.1 | Design and implement level-appropriate algorithms that use iteration, recursion, selection, and sequence |
CSPG.Y2.5.2 | Illustrate the flow of execution of algorithms in level-appropriate programs including recursion |
CSPG.Y2.5.3 | Evaluate the qualities of level-appropriate student-created and non-student-created algorithms including classic search and sort algorithms |
CSPG.Y2.5.4 | Use a systematic approach to detect and resolve errors in a given algorithm |
CSPG.Y2.6.1 | Create programs using procedures to solve problems of level-appropriate complexity. Programs must include classes |
CSPG.Y2.6.2 | Discuss and apply best practices of program design and format (e.g., descriptive names, documentation, indentation, user experience design, whitespace) |
CSPG.Y2.6.3 | Determine the scope and state of variables defined in classes and class procedures |
CSPG.Y2.6.4 | Create programs that read from, write to, and append to a file of level-appropriate complexity that includes structured data |
CSPG.Y2.6.5 | Use a systematic approach to detect logic, runtime, and syntax errors within a program |
CSPG.Y2.7.1 | Utilize hardware and/or software to solve level-appropriate industry-based problems |
CSPG.Y2.9.2 | Use collaboration tools and version control systems in a group software project of appropriate complexity |
CSPG.Y2.10.2 | Research and describe issues related to creating and enforcing cyber-related laws and regulations (e.g., ethical challenges, policy vacuum, privacy versus security, unintended consequences) |
CSPG.Y2.10.4 | Identify the ethical implications encountered in the curation, management, and monetization of data (e.g., harvesting, information overload, knowledge management repositories, sharing, summarizing) |
CSPG.Y2.10.5 | Explain advantages and disadvantages of various software life cycle processes (e.g., Agile, spiral, waterfall) |
CSPG.Y2.10.7 | Demonstrate industry-relevant technical and soft skills |
CSPG.Y2.10.8 | Identify the components of a quality professional digital portfolio |
CSPG.Y2.10.9 | Create and maintain a digital collection of self-created work |
CSPG.Y2.11.1 | Communicate technical information, of appropriate complexity, effectively to diverse audiences including, but not limited to, non-technical audience members |