Standards in this Framework
Standard | Description |
---|---|
CSII-1.1 | Document problem analysis through industry standards such as: flowcharts, functional specifications, user stories, etc. |
CSII-1.2 | Outline the problem assigned and describe the solution. |
CSII-1.3 | Use puzzles and games to enhance problem solving skills. |
CSII-1.4 | Recognize language appropriate planning and designing tools (for example: flowcharts, UML diagrams, pseudocode, use cases). |
CSII-1.5 | Modify an existing program, such as a template, to add additional functionality and discuss intended and unintended implications. |
CSII-1.6 | Justify what programming methodology to use (object oriented or procedural). |
CSII-2.1 | Design a solution to a problem by working in a team. |
CSII-2.2 | Explore technologies that can be used to collaborate with others of various cultures and career fields. |
CSII-2.3 | Utilize a problem solving approach to develop a solution using technology. |
CSII-2.4 | Analyze the work of peers and provide feedback. |
CSII-2.5 | Use version control systems, integrated development environments (IDEs), and collaborative tools and practices in a group software project. |
CSII-3.1 | Develop algorithms to determine a solution. |
CSII-3.2 | Assess the use of algorithms to provide a solution. |
CSII-3.3 | Create pseudocode to describe a solution. |
CSII-3.4 | Create a program flowchart using ANSI standard flowcharting symbols to define a solution. |
CSII-3.5 | Explain how the algorithm can be used to solve a problem. |
CSII-3.6 | Apply Boolean logic and relational operations. |
CSII-3.7 | Demonstrate iteration in an algorithm. |
CSII-3.8 | Evaluate algorithms in terms of their efficiency, correctness, and clarity. |
CSII-3.9 | Illustrate the flow of execution of a recursive algorithm. |
CSII-3.10 | Integrate classic algorithms (sorting and searching) to solve computational problems. |
CSII-3.11 | Demonstrate the different methods for encoding data such as binary, decimal, hexadecimal, ASCII, and Unicode. |
CSII-4.1 | Define the process of programming. |
CSII-4.2 | Plan and develop programs for broad audiences using a software development lifecycle process (such as: Agile, waterfall, and spiral). |
CSII-4.3 | Adhere to industry standard programming conventions for accuracy and readability. |
CSII-4.4 | Demonstrate code reuse by creating programming solutions using libraries and APIs. |
CSII-4.5 | Create an advanced computer program that corresponds to an algorithm or proposed solution. |
CSII-4.6 | Implement fundamental programming constructs, including data types, control structures, methods, and arrays. |
CSII-4.7 | Compare local scope and global scope. |
CSII-4.8 | Create programmer defined functions and methods to break down program logic and support reuse. |
CSII-4.9 | Recognize the order of operations used by a computer when performing calculations. |
CSII-4.10 | Implement simple and compound conditionals (Boolean - not, and, or). |
CSII-4.11 | Demonstrate the relationship between classes and objects (instances). |
CSII-4.12 | Demonstrate the differences between instance variables and class variables |
CSII-4.13 | Demonstrate the differences between instance methods and class methods. |
CSII-4.14 | Apply inheritance, polymorphism, encapsulation, and abstraction in the context of Object Oriented Programming. |
CSII-4.15 | Compare the graphical user interface and the command line interface. |
CSII-5.1 | Predict and explain programming outcomes. |
CSII-52 | Identify cause/effect for input/output. |
CSII-5.3 | Understand input validation |
CSII-5.4 | Develop and use a series of test cases to verify that a program performs according to its design specifications. |
CSII-5.5 | Peer review documentation and code. |
CSII-5.6 | Differentiate between syntax, logic, and semantic errors. |
CSII-5.7 | Debug code using techniques such as: code tracing, print statements, boundary testing, breakpoints, etc. |
CSII-5.8 | Review computing artifacts to reduce bias, increase equity, and support accessibility. |
CSII-6.1 | Describe the function of a computing artifact (for example, code or design). |
CSII-6.2 | Identify the purposes of a computing artifact. |
CSII-6.3 | Explain concepts related to a computing artifact. |
CSII-6.4 | Describe how to use a computing artifact. |
CSII-6.5 | Explain cause/effect by interpreting input and output. |
CSII-6.6 | Create documentation for computing artifact such as comments or user manual/readme. |
CSII-7.1 | Examine the dynamic between privacy and security. |
CSII-7.2 | Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes. |
CSII-7.3 | Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics. |
CSII-7.4 | Give examples to illustrate how sensitive data can be affected by malware and other attacks. |
CSII-7.5 | Discuss the concepts and justifications for using secure design techniques. |
CSII-7.6 | Discuss the laws surrounding intellectual property. |
CSII-8.1 | Identify computer science occupations and the roles and responsibilities of each. |
CSII-8.2 | Report job outlook, demand, and projected wages for computer science careers. |
CSII-8.3 | Explore the job opportunities that are available in computer science. |
CSII-8.4 | Investigate post-secondary training opportunities and industry certifications that are available. |