Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
4803.D1.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
|
4803.D1.2
Explain the benefits and responsibilities of being a member of a CTSO. |
|
4803.D1.3
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
|
4803.D1.4
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
|
4803.D2.1
Use supporting evidence from multiple sources such as job postings and workforce data, to examine and describe careers in the career cluster and identify the roles and responsibilities of each. |
|
4803.D2.2
Evaluate resources that keep workers current in career-related knowledge and technology for careers within the career cluster. |
|
4803.D2.3
Identify employers’ expectations, appropriate work habits, ethical conduct, legal responsibilities, and good citizenship skills. |
|
4803.D2.4
Demonstrate the qualities, attributes, and skills necessary to succeed in, or further prepare for a chosen career while effectively contributing to society. |
|
4803.D2.5
Complete one or more career cluster aptitude/interest surveys, analyze the results, and examine how personal career aptitudes align with careers in a field or pathway of interest. |
|
4803.D2.6
Distinguish differences among careers within the career cluster and identify trends related to at least five careers/pathways. |
|
4803.D2.7
Explain opportunities, benefits, and risks of entrepreneurial career pathways in the career cluster. |
|
4803.D2.8
Explore the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing. |
|
4803.D2.9
Describe ethical and legal practices safeguarding the confidentiality of business-and personalrelated information. |
|
4803.D3.1
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise). |
|
4803.D3.2
Define algorithm (a set of clearly defined logical steps to solve a problem). |
|
4803.D3.3
Demonstrate an understanding of algorithms and their practical applications. |
|
4803.D3.4
Create, evaluate, and adjust algorithms to solve a variety of problems. |
|
4803.D3.5
Use an iterative problem-solving process to design and refine solutions to a variety of problems. |
|
4803.D4.1
Explain the importance of Acceptable Use Policies and data and physical security. |
|
4803.D4.2
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society. |
|
4803.D4.3
Evaluate methods of keeping information secret from those whom the information should be kept secret. |
|
4803.D4.4
Evaluate methods of protecting information and information systems from disruption and destruction. |
|
4803.D4.5
Explain the importance of encapsulating resources, i.e., creating well-defined interfaces around resources to set rules for how the resources should interact. |
|
4803.D4.6
Analyze how the connected nature of the Internet allows an adversary to reach a large number of devices. |
|
4803.D4.7
Identify and predict the outcomes of security vulnerabilities at the physical/link layer, the network layer, the transport layer, and the application layer. |
|
4803.D4.8
Identify and distinguish between the purposes of network security devices and technologies. |
|
4803.D4.9
Compare and contrast data protection legislation, policies, and procedures that have been or are being introduced all over the world to protect personal data. |
|
4803.D4.10
Students will identify how hardware and software work together in complex ways to achieve and overall objective. |
|
4803.D5.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed). |
|
4803.D5.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
|
4803.D5.3
Evaluate various solutions to common hardware and software problems. |
|
4803.D5.4
Describe how software and hardware interact. |
|
4803.D5.5
Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compresses/uncompressed files). |
|
4803.D6.1
Define key computing terms (e.g., hardware, software, data, etc.). |
|
4803.D6.2
Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.). |
|
4803.D6.3
Define the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.). |
|
4803.D7.1
Express the design of a program using representations such as flowcharts and pseudocode. |
|
4803.D7.2
Analyze and explain how a particular program functions. |
|
4803.D7.3
Solve problems of increasing complexity using visual block-based programming individually and collaboratively. |
|
4803.D7.4
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for). |
|
4803.D7.5
Differentiate between text and numerical data. |
|
4803.D7.6
Edit, compile/run, test, and debug a program. |
|