Standards in this Framework
Standard | Description |
---|---|
4803.D1.1 | Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
4803.D1.2 | Explain the benefits and responsibilities of being a member of a CTSO. |
4803.D1.3 | List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
4803.D1.4 | Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
4803.D2.1 | Use supporting evidence from multiple sources such as job postings and workforce data, to examine and describe careers in the career cluster and identify the roles and responsibilities of each. |
4803.D2.2 | Evaluate resources that keep workers current in career-related knowledge and technology for careers within the career cluster. |
4803.D2.3 | Identify employers’ expectations, appropriate work habits, ethical conduct, legal responsibilities, and good citizenship skills. |
4803.D2.4 | Demonstrate the qualities, attributes, and skills necessary to succeed in, or further prepare for a chosen career while effectively contributing to society. |
4803.D2.5 | Complete one or more career cluster aptitude/interest surveys, analyze the results, and examine how personal career aptitudes align with careers in a field or pathway of interest. |
4803.D2.6 | Distinguish differences among careers within the career cluster and identify trends related to at least five careers/pathways. |
4803.D2.7 | Explain opportunities, benefits, and risks of entrepreneurial career pathways in the career cluster. |
4803.D2.8 | Explore the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing. |
4803.D2.9 | Describe ethical and legal practices safeguarding the confidentiality of business-and personalrelated information. |
4803.D3.1 | Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise). |
4803.D3.2 | Define algorithm (a set of clearly defined logical steps to solve a problem). |
4803.D3.3 | Demonstrate an understanding of algorithms and their practical applications. |
4803.D3.4 | Create, evaluate, and adjust algorithms to solve a variety of problems. |
4803.D3.5 | Use an iterative problem-solving process to design and refine solutions to a variety of problems. |
4803.D4.1 | Explain the importance of Acceptable Use Policies and data and physical security. |
4803.D4.2 | Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society. |
4803.D4.3 | Evaluate methods of keeping information secret from those whom the information should be kept secret. |
4803.D4.4 | Evaluate methods of protecting information and information systems from disruption and destruction. |
4803.D4.5 | Explain the importance of encapsulating resources, i.e., creating well-defined interfaces around resources to set rules for how the resources should interact. |
4803.D4.6 | Analyze how the connected nature of the Internet allows an adversary to reach a large number of devices. |
4803.D4.7 | Identify and predict the outcomes of security vulnerabilities at the physical/link layer, the network layer, the transport layer, and the application layer. |
4803.D4.8 | Identify and distinguish between the purposes of network security devices and technologies. |
4803.D4.9 | Compare and contrast data protection legislation, policies, and procedures that have been or are being introduced all over the world to protect personal data. |
4803.D4.10 | Students will identify how hardware and software work together in complex ways to achieve and overall objective. |
4803.D5.1 | Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed). |
4803.D5.2 | Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
4803.D5.3 | Evaluate various solutions to common hardware and software problems. |
4803.D5.4 | Describe how software and hardware interact. |
4803.D5.5 | Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compresses/uncompressed files). |
4803.D6.1 | Define key computing terms (e.g., hardware, software, data, etc.). |
4803.D6.2 | Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.). |
4803.D6.3 | Define the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.). |
4803.D7.1 | Express the design of a program using representations such as flowcharts and pseudocode. |
4803.D7.2 | Analyze and explain how a particular program functions. |
4803.D7.3 | Solve problems of increasing complexity using visual block-based programming individually and collaboratively. |
4803.D7.4 | Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for). |
4803.D7.5 | Differentiate between text and numerical data. |
4803.D7.6 | Edit, compile/run, test, and debug a program. |