Please enable JavaScript to use CodeHS

Florida Teacher Certification Exam Standards Framework

42 Standards in this Framework


Standard Description
1.1 Analyze a problem and apply appropriate solution strategies.
1.2 Apply the steps of algorithmic problem solving when designing solutions to problems.
1.3 Apply the stages of the software development life cycle (i.e., problem definition, analysis, design, testing, implementation, maintenance).
1.4 Determine and select an appropriate algorithm for a given problem.
1.5 Predict outputs of algorithms for a given input.
1.6 Identify an appropriate set of data necessary for testing a computer solution.
2.1 Distinguish between constants and variables and between local and global identifiers.
2.2 Distinguish between integer, real number, character, string, Boolean, and object data types.
2.3 Recognize and convert between binary, decimal, and hexadecimal number systems.
2.4 Identify characteristics and uses of data structures, including arrays, linked lists, stacks, queues, and sets.
2.5 Distinguish between instance, class, and local variables in an object-oriented design.
2.6 Identify components of class declarations for an object-oriented program and distinguish between public and private access specifiers.
3.1 Distinguish between error types (e.g., syntax, runtime, logic) and apply principles of debugging.
3.2 Identify principles, characteristics, and uses of internal and external program documentation.
3.3 Analyze the characteristics and functions of object-oriented and procedural languages.
3.4 Select the appropriate algorithmic sequence, conditional, iteration, and recursive constructs for a given purpose.
3.5 Analyze characteristics and applications of searching (i.e., sequential, binary) and sorting (i.e., selection, insertion, merge) algorithms.
3.6 Analyze the characteristics and applications of propositional logic (e.g., De Morgan's laws).
4.1 Identify characteristics and apply concepts of the Scratch™1 programming language learning environment from the MIT Media Library.
4.2 Analyze segments of Java®2 code containing sequential, conditional, or iteration statements.
4.3 Analyze segments of Java® code involving methods, interacting objects, or passing parameters.
4.4 Apply principles of data types and data manipulation (e.g., string methods, arithmetic operations) in the Java® programming language.
4.5 Apply principles of abstraction, encapsulation, inheritance, and polymorphism in the Java® programming language.
5.1 Identify the hardware components of a computer system and their functions (e.g., input, output, processing, storage).
5.2 Analyze the advantages, disadvantages, or both of various data storage technologies.
5.3 Identify the characteristics and uses of various types of software (e.g., system, application).
5.4 Apply features and functions of application and productivity software (e.g., word processing, spreadsheet, database, multimedia authoring, Web development software).
5.5 Identify concepts and terminology related to networks (e.g., network protocols, Open Systems Interconnection model, client-server, cloud computing).
5.6 Identify characteristics and uses of network devices (e.g., servers, routers, switches, access points, workstations).
6.1 Identify examples of appropriate use (e.g., software license types, archival copying, fair use of copyrighted materials) and misuse (e.g., plagiarism, music and video piracy) of intellectual property.
6.2 Identify milestones in the historical development of computer technology and important contributions of individuals or groups to the development of computer technology.
6.3 Analyze cultural, legal, and ethical issues and responsibilities of digital citizens, organizations, and government entities (e.g., privacy issues related to Internet use, data protection).
6.4 Analyze issues related to malicious software, social engineering, and security awareness.
6.5 Identify concepts and terminology related to security countermeasures (e.g., firewalls, antivirus programs, filtering software, encryption) that prevent, detect, and correct breaches.
6.6 Analyze security issues related to maintaining the confidentiality, integrity, and availability of information.
7.1 Apply appropriate and effective classroom management strategies for teaching computer science (e.g., laboratory work, cooperative learning, electronic communications).
7.2 Apply appropriate and effective instructional strategies for teaching computer science (e.g., independent learning, case studies, role-playing, manipulatives, visualizations, simulations, modeling, team software development).
7.3 Apply appropriate and effective formative and summative assessment strategies for teaching computer science (e.g., rubrics, portfolios).
7.4 Apply appropriate and effective accommodations, adaptations, and strategies that ensure the equitable use of technology for diverse student populations (e.g., students with exceptionalities, English language learners, students from various socioeconomic levels).
7.5 Determine characteristics and apply uses of instructional technologies (e.g., collaborative online tools, social networking, computer-based learning, mobile devices).
7.6 Recognize opportunities, skills, and paths related to college and career readiness in the field of computer science.
7.7 Apply practices for planning and developing curricula that meet state and national standards and recognize resources for ongoing professional support and development.