Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons | 
|---|---|
| 
                     CS.HS.1.1a 
                     Identify and create different types of algorithms (sort, search, etc.).  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.1b 
                     Predict the outcome of different types of algorithms.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.1c 
                     Create or adapt algorithms to solve problems for multiple purposes (e.g., personal interests, stakeholder needs).  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.1d 
                     Use an algorithm that involves mathematical operations and functions to solve problems.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.1e 
                     Use an iterative approach to utilizing and/or developing an algorithm.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.1f 
                     Recognize problems that cannot be solved computationally.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.1g 
                     Identify and describe algorithms that exist within their personal lives.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.2a 
                     Illustrate the flow of execution of an iterative algorithm (e.g., recursion).  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.2b 
                     Explain the value of heuristic algorithms to model ways to solve problems.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.2c 
                     Adapt algorithms used in one problem to solve a related or different problem.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.2d 
                     Use multiple methods to represent an algorithm (e.g., diagram, programming language, unplugged).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.3a 
                     Describe pros and cons of the performance of algorithms for the same task.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.3b 
                     Use an iterative approach to developing an algorithm.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.3c 
                     Test and troubleshoot so that algorithms produce reasonable results.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.4a 
                     Demonstrate how the process of decomposition is iterative and used to solve problems.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.4b 
                     Formulate possible solutions based on the decomposition of a problem.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.5a 
                     Describe how abstraction is central to computational thinking.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.5b 
                     Identify and prioritize the most relevant parts of a problem while filtering out extraneous details.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.5c 
                     Demonstrate different ways to represent key problem components.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.6a 
                     Identify different types of data that are exchanged and produced by computers (e.g., protocols).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.6b 
                     Evaluate the trade-offs for how data elements are organized and where data are stored (e.g., PNG/GIF, structured/unstructured).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.6c 
                     Compare and contrast various data structures/techniques for storing and processing data (e.g., arrays, lists, tables).  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.7a 
                     Provide multiple versions of data visualization in order to deepen problem analysis.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.7b 
                     Interpret and analyze data to make informed decisions.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.8a 
                     Analyze computer output in different forms (e.g., plain text, CSV, graphs, images).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.1.8b 
                     Design visualizations using the appropriate tool(s) with the end user in mind.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.1.8c 
                     Provide multiple versions of data visualization in order to deepen problem analysis.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.1a 
                     Describe key protocols and underlying processes of internet-based services, (e.g., https) and discuss impact of technology change on communication protocols.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.1b 
                     Illustrate and describe the basic components and various network types and topologies (e.g., personal, local, metropolitan, and wide).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.1c 
                     Explain the difference between decimal, hexadecimal, octal and binary number formats and how they are used in computing environments.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.2a 
                     Explain the difference between memory and disk storage, internal and external storage, Random Access Memory (RAM), flash, cloud.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.2b 
                     Explain how to maintain safety when working on PCs, e.g., electromagnetic precautions.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.2c 
                     Describe how computing devices are engineered for fault tolerance and reliability, and identify potential sources of weakness (e.g., redundant power supplies, RAID, SAN/NAS connections).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.3a 
                     Identify and differentiate between different kinds of software (e.g., operating systems vs. applications) and their purposes.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.3b 
                     Explain what an operating system is, and why it is important for a computer or computing device (e.g., Linux, Windows, iOS).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.3c 
                     Describe how software interacts with hardware to complete tasks.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.4a 
                     Explain the integration of hardware, software and network communications components to create a networked system.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.4b 
                     Summarize security approaches using a systems approach perspective  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.5a 
                     Identify stakeholder’s problems/needs.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.5b 
                     Articulate design requirements back to stakeholder.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.5c 
                     Illustrate options for considerations and develop conceptual model.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.5d 
                     Perform system analysis based on stakeholder considerations.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.6a 
                     Describe elements of an effective backup system.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.6b 
                     Compare backup systems for computer users, or a network.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.6c 
                     List the various backup methodologies (e.g., full, differential), and why one would pick one over the other, or use all.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.6d 
                     Explain the ways an organization would continue to operate in light of a systems failure.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.7a 
                     Identify examples of threats to systems and data.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.7b 
                     Describe the process by which intruders gain entry into a production system (e.g., reconnaissance).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.7c 
                     Describe and compare methods to test/validate how well systems and data are protected.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.2.7d 
                     Investigate different career pathways relating to systems security.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.1a 
                     Analyze and apply a design methodology to identify constraints and requirements of an identified problem.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.1b 
                     Utilize tools and resources such as pseudocode, flowcharts, wireframes, etc., as part of the design process.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.1c 
                     Determine and use graphical or text-based languages.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.3.1d 
                     Understand and apply core programming concepts.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.3.2a 
                     Write code per selected design.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.3.2b 
                     Create code comments to communicate to other developers and ensure documentation of code.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.3.2c 
                     Use various troubleshooting and debugging techniques to improve code.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.3.2d 
                     Create appropriate variables to store and retrieve data.  | 
                
                    
                    
  | 
                
                
            
| 
                     CS.HS.3.3a 
                     Integrate collaborative strategies to improve programming outputs.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.3b 
                     Identify and analyze a variety of collaborative tools (e.g., commenting, development repositories) in order to determine the appropriateness for intended use.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.3c 
                     Identify strategies such as peer reviews to test and refine artifacts in development.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.3d 
                     Determine when to use standard software tools like APIs, libraries, version control repositories, etc.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.4a 
                     Understand and apply principles of stakeholder-based design.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.4b 
                     Guide/advise stakeholders on strategies and solutions best suited for their problem (i.e., type of platform).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.4c 
                     Construct effective methods for gathering feedback from stakeholder.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.4d 
                     Respond to feedback from stakeholders to improve computing solutions.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.4e 
                     Create and share product support documentation for potential users.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.4f 
                     Articulate lessons learned as a result of the design and creation process.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.5a 
                     Investigate and understand privacy, security and protection laws.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.5b 
                     Articulate the importance of securing personal data information on encrypted storage systems.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.5c 
                     Identify and analyze current events to ensure the safety, security and wellbeing of all potential stakeholders and end users.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.5d 
                     Identify influential computing innovations, and identify the beneficial and harmful effects they have had, or could have, on society, economy and culture.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.5e 
                     Discuss and explain how diversity of design and issues of accessibility impact a wide-range of users.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.5f 
                     Demonstrate ways to improve the accessibility of computational technologies and artifacts.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.6a 
                     Describe how software licensing influences program development.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.6b 
                     Investigate and develop solutions that discourage online software piracy.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.6c 
                     Explore and integrate security measures such as encryption, authentication and verification strategies to secure developed computer programs.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.3.6d 
                     Research and abide by intellectual property laws and patents.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.1a 
                     Define confidentiality, integrity and availability in the context of cybersecurity, and share a basic example of each.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.1b 
                     Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.1c 
                     Critically analyze case studies of cyber security incidents and identify where breaches in CIA have occurred.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.1d 
                     Research real-world examples of cyber security breaches and share their findings, focusing on how CIA principles were impacted.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2a 
                     Compare and contrast applications based on their privacy policies and permissions, evaluating the impact on individuals and society.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2b 
                     Synthesize understanding of privacy practices to inform peers on healthy vs harmful practices.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2c 
                     Explain the individual risks of a data breach to an organization housing personal data. (Department of Homeland Security (DHS) through CISA Grant given to Cyber.org, 2021)  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2d 
                     Compare and contrast the harms and benefits between ensuring privacy and enabling convenience and usability (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2e 
                     Compare and contrast situations where one would want to be anonymous vs. identifiable and provide an example where one party desires anonymity but the other party desires clear identification.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2f 
                     Discuss and/or give an example of how privacy decisions made today may have negative implications in the future.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2g 
                     Describe one or more systems used on a regular basis which reveals information about a user’s pattern of life.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2h 
                     Explain why trying every possible combination (a brute force attack) will always break encryption if given enough time.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2i 
                     Describe ways encryption is used today.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.2j 
                     Evaluate strengths and weaknesses of an encryption method in context.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3a 
                     Build a list of common threats students face and explain how an adversary may try to exploit those threats (adversarial thinking).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3b 
                     Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why. (This covers “Demonstrate adversarial thinking for a given problem. example: attack trees”)  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3c 
                     Explain how social behaviors and human factors can impact the cybersecurity of a system design. (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3d 
                     Evaluate digital habits and practices to identify potential risks and predict how an adversary might seek to exploit vulnerabilities.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3e 
                     Analyze the motives of threat actors (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3f 
                     Explain the variety of ways in which a security vulnerability could be created and exploited (for example: system error, social engineering, or input by an adversary).  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3g 
                     Explain the difference between protecting against a random failure versus protecting against an intentional attack.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.4.3h 
                     Give an example of a system where the risk of a potential incident requires a high degree of security and an example where the risk of a potential compromise requires only a minor degree of security  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1a 
                     Explain the evolution of AI, the scope and limitations of current AI and the future of AI.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1b 
                     Describe the purpose of different AI tools.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1c 
                     Explain the potential ethical dilemmas and biases in developing, training, and using AI tools.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1d 
                     Distinguish between AI and general computer programming.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1e 
                     Describe real-world applications of AI, such as personal assistants, recommendation systems, advertising systems, and autonomous vehicles.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1f 
                     Examine the differences between narrow AI and general AI, and their implications.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1g 
                     Discuss the use of the term “learning” with respect to specific AI tools and techniques.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1h 
                     Evaluate the kinds of data that can be used for AI problems and how they are used to train AI models.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.1i 
                     Evaluate, select and use appropriate AI technology to solve a problem.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.2a 
                     Develop and evaluate an AI-based solution to address a real-world objective.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.2b 
                     Describe how AI can create novel outcomes by identifying patterns in data from the domain of interest.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.3a 
                     Explain the potential limitations of AI; for example, insufficient or inaccurate data inputs, inability of the system to recognize its own errors, and flaws in the underlying algorithms.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.3b 
                     Evaluate the results produced by an AI tool before using it.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.3c 
                     Discuss challenges and considerations of AI with respect to personal privacy.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.3d 
                     Evaluate the implications of AI on job markets and its role in automation and productivity.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.3e 
                     Recognize the importance and challenges of human oversight in AI decision-making.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.3f 
                     Recognize the purpose and suitability of AI tools for achieving specific outcomes.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.4a 
                     Identify arguments regarding the dilemmas created by advances in artificial intelligence.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.4b 
                     Explain why computational artifacts can be attributed to an AI system rather than its initial programmers.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.4c 
                     Describe the "Turing Test" and its implications for distinguishing human and artificial intelligences.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.5.4d 
                     Articulate arguments against "artificial intelligence" qualifying as "actual intelligence" and counterarguments that refute those specific arguments.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1a 
                     a. Describe how active and passive social media use can lead to positive and negative feelings.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1b 
                     5 b. Identify research trends related to the health impact of screen time.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1c 
                     6 c. Brainstorm strategies for navigating challenging relationships in a digital environment.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1d 
                     8 d. Learn strategies for civil discourse in a digital environment and apply them to a scenario involving uncivil discourse.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1e 
                     10 e. Define "digital reputation," and identify examples of social media posts that can have a positive or negative effect.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1f 
                     12 f. Explain why you should ask permission before posting pictures or information about someone else.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1g 
                     14 g. Identify strategies for protecting their privacy, including opting out of specific features and analyzing app or website privacy policies and terms of service.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1h 
                     16 h. Define "misinformation" and explore the consequences of spreading misinformation online.  | 
                
                    
                     | 
                
                
            
| 
                     CS.HS.6.1i 
                     18 i. Explore examples of confirmation bias, particularly related to news and online information.  | 
                
                    
                     |