Standards in this Framework
Standard | Lessons |
---|---|
9-12.CS.1.1
Identify and describe hardware components. |
|
9-12.CS.1.2
Identify and evaluate what computing system resources are required for a specific software program. |
|
9-12.CS.1.3
Identify the use of embedded computers in various applications. |
|
9-12.CS.1.4
Create or modify a program that uses different forms of input and output. |
|
9-12.CS.1.5
Identify how a high level programming language abstracts machine language in a computer program. |
|
9-12.CS.1.6
Create a model of how embedded systems sense, process, and interact in a given environment. |
|
9-12.CS.2.1
Use applicable data collection techniques for various scenarios. |
|
9-12.CS.2.2
Apply basic techniques for locating, collecting, and understanding the quality of data sets. |
|
9-12.CS.2.3
Analyze data and identify patterns through modeling and simulation. |
|
9-12.CS.2.4
Use data analysis to show the transformation from data to information to knowledge. |
|
9-12.CS.2.5
Use models and simulations to help formulate, refine, and test scientific hypotheses. |
|
9-12.CS.2.6
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, and the government. |
|
9-12.CS.2.7
Analyze the strengths and weaknesses of security policies based on their usage of encryption and authentication strategies. |
|
9-12.CS.2.8
Convert between binary, decimal, octal, and hexadecimal representations of data. |
|
9-12.CS.2.9
Describe how real-world phenomena such as numbers, Strings, or images are represented as binary in a computer. |
|
9-12.CS.2.10
Analyze the trade-offs among various compression algorithms. |
|
9-12.CS.3.1
Demonstrate responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software. |
|
9-12.CS.3.2
Explain the social and economic implications associated with unethical computing practices. |
|
9-12.CS.3.3
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large-scale analysis of personal information. |
|
9-12.CS.3.4
Identify and evaluate the beneficial and harmful effects of computing innovations on behavior and culture. |
|
9-12.CS.3.5
Debate how the issues of equity, data access, and distribution of computing resources create a digital divide in a global society. |
|
9-12.CS.3.6
Debate laws and regulations that impact the development, security and use of software. |
|
9-12.CS.3.7
Understand and define artificial intelligence. |
|
9-12.CS.3.8
Research and explain the social, moral, ethical, and legal impacts of artificial intelligence systems and respective usage. |
|
9-12.CS.3.9
Explain how computer automation continues to transform society and the global economy (e.g. financial markets, transactions, predictions). |
|
9-12.CS.3.10
Research, analyze, and present how computational thinking has enabled computing to revolutionize business, manufacturing, commerce and society. |
|
9-12.CS.3.11
Evaluate the accessibility of a computational artifact. |
|
9-12.CS.3.12
Describe how computer science shares features with creating and designing an artifact such as in music and art. |
|
9-12.CS.3.13
Understand the ecosystem of open-source software development and its impact on global collaboration. |
|
9-12.CS.3.14
Explain how computer science fosters innovation and enhances other career and disciplines. |
|
9-12.CS.4.1
Illustrate the basic components of computer networks and protocols. |
|
9-12.CS.4.2
Analyze the issues that impact network functionality. |
|
9-12.CS.4.3
Describe the data flow that occurs when using Internet-based services. |
|
9-12.CS.4.4
Examine how encryption is essential to ensuring privacy and security over the internet. |
|
9-12.CS.5.1
Diagram the flow of execution and output of a given program. |
|
9-12.CS.5.2
Design algorithms using sequence, selection, iteration and recursion. |
|
9-12.CS.5.3
Use variable scope and encapsulation to design programs with cohesive and modular components. |
|
9-12.CS.5.4
Decompose a complex problem using abstraction through methods and/or classes. |
|
9-12.CS.5.5
Demonstrate the value of abstraction to manage problem complexity. |
|
9-12.CS.5.6
Demonstrate code reuse by creating programming solutions using APIs and libraries. |
|
9-12.CS.5.7
Evaluate the qualities of a program such as correctness, usability, readability, efficiency, portability and scalability through processes such as debugging and code review. |
|
9-12.CS.5.8
Compare and contrast simple data structures and their uses. |
|
9-12.CS.5.9
Compare software development processes. |
|
9-12.CS.5.10
Demonstrate an understanding of the software life cycle process. |
|
9-12.CS.5.11
Design and develop a software artifact by leading, initiating, and participating in a team. |
|
9-12.CS.5.12
Create collaborative software projects using Integrated Development Environments, or other collaborative tools. |
|
9-12.CS.5.13
Understand the positive and negative implications that arise when you add functionality to an existing program. |
|
9-12.CS.5.14
Demonstrate how diverse team collaboration improves the design and development of software products. |
|
9-12.CS.5.15
Compare a variety of programming languages available to solve problems and develop systems. |
|
9-12.CS.5.16
Analyze security issues that might lead to compromised computer programs. |
|
9-12.CS.5.17
Classify and define the different types of software licenses in order to understand how to apply each one to a specific software example. |
|
9-12.CS.5.18
Analyze the notion of intelligent behavior through the programs that learn and adapt, play games, do image recognition, perform text analysis, and control the behavior of robots. |
|
9-12.CS.5.19
Illustrate how mathematical and statistical functions, sets, and logic are used in computation. |
|
9-12.CS.5.20
Describe the concept of parallel processing. |
|
9-12.CS.5.21
Explore issues surrounding mobile computing. |
|
9-12.CS.5.22
Explain the value of heuristic algorithms to approximate solutions for interactable problems. |
|
9-12.CS.5.23
Critically examine algorithms and design an original algorithm (e.g. adapt, remix, improve). |
|
9-12.CS.5.24
Classify problems as tractable, interactable, or computationally unsolvable. |
|