L1.CS.D.01 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
-
1.9 Abstraction
-
8.1 Intro to Digital Information
|
L2.CS.D.02 |
Describe how internal and external parts of computing devices function to form a system. |
|
L1.CS.HS.01 |
Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
-
11.2 Internet Hardware
|
L2.CS.HS.01 |
Categorize the roles of operating system software. |
|
L1.CS.HS.02 |
Compare computer systems and determine advantages and drawbacks of each system. |
-
11.8 Sequential, Parallel & Distributed Computing
|
L2.CS.HS.02 |
Compare options for building a computer systems and determine advantages and drawbacks of each piece and how it will affect the overall performance. |
-
11.8 Sequential, Parallel & Distributed Computing
|
L1.CS.IO.01 |
Demonstrate efficeint use of input and output devices |
|
L2.CS.IO.01 |
Demonstrate use of course specific advanced input and output devices related to field |
|
L1.CS.T.01 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
-
1.16 Debugging Strategies
|
L2.CS.T.01 |
Illustrate ways computing systems implement logic, input, and output through hardware components. |
-
11.2 Internet Hardware
|
L1.NI.NCO.01 |
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. |
-
11.3 Internet Addresses
|
L2.NI.NCO.01 |
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). |
-
11.3 Internet Addresses
|
L1.NI.NCO.02 |
Compare various security measures, considering tradeoffs between the usability and security of a computing system. |
-
11.9 Cybersecurity
|
L2.NI.NCO.02 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks. |
-
11.9 Cybersecurity
|
L1.NI.C.01 |
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. |
-
11.9 Cybersecurity
|
L2.NI.C.01 |
Compare ways software developers protect devices and information from unauthorized access. |
|
L1.NI.C.02 |
Explain tradeoffs when selecting and implementing cybersecurity recommendations. |
-
11.9 Cybersecurity
|
L2.NI.C.02 |
Use encryption and decryption algorithms to transmit/ receive an encrypted message. |
-
8.10 Cryptography
-
11.9 Cybersecurity
|
L1.DA.S.01 |
Analyze storage types and locations. |
|
L2.DA.S.01 |
Translate and compare different bit representations of data types, such as characters, numbers, and images. |
-
8.1 Intro to Digital Information
-
8.2 Number Systems
-
8.3 Encoding Text with Binary
-
8.4 Pixel Images
|
L1.DA.S.02 |
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
|
L2.DA.S.02 |
Analyze file systems created for keeping track of files on the hard disk. |
|
L1.DA.C.01 |
Collect and analyze data. |
-
13.1 Getting Started with Data
-
13.2 Visualizing and Interpreting Data
|
L2.DA.C.01 |
Select data collection tools and techniques to generate data sets that support a claim or communicate information. |
-
13.1 Getting Started with Data
-
13.3 Data Collection & Limitations
|
L1.DA.VT.01 |
Create interactive data visualizations using software tools to help others better understand real-world phenomena. |
-
13.1 Getting Started with Data
-
13.2 Visualizing and Interpreting Data
-
13.3 Data Collection & Limitations
-
14.1 Present a Data-Driven Insight
|
L2.DA.VT.01 |
Use data analysis tools and techniques to identify patterns in data representing complex systems. |
-
13.2 Visualizing and Interpreting Data
-
13.3 Data Collection & Limitations
-
14.1 Present a Data-Driven Insight
|
L1.DA.IM.01 |
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process. |
-
13.2 Visualizing and Interpreting Data
-
13.3 Data Collection & Limitations
-
14.1 Present a Data-Driven Insight
|
L2.DA.IM.01 |
Evaluate the ability of models and simulations to test and support the refinement of hypotheses. (e.g., flocking behaviors, life cycles, etc.) |
-
14.1 Present a Data-Driven Insight
|
L1.AP.A.01 |
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. |
-
2.1 Practice PT: Pair-Programming Paint!
-
6.1 Project: Tell a Story
-
10.1 Practice PT: Create an Image Filter!
|
L2.AP.A.01 |
Describe how artificial intelligence algorithms drive many software and physical systems (e.g., digital advertising, autonomous robots, computer vision, pattern recognition, text analysis). |
|
L1.AP.V.01 |
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
-
7.1 Intro to Lists/Arrays
-
7.2 Indexing Into an Array
-
7.3 Adding/Removing From an Array
-
7.4 Array Length and Looping Through Arrays
-
7.5 Iterating Over an Array
-
7.7 Removing an Element From an Array
|
L2.AP.A.02 |
Describe how artificial intelligence drives many software and physical systems. |
|
L1.AP.C.01 |
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. |
-
1.15 Control Structures Example
|
L2.AP.A.03 |
Critically examine and trace classic algorithms (e.g., selection sort, insertion sort, binary search, linear search). |
-
7.4 Array Length and Looping Through Arrays
|
L1.AP.C.02 |
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. |
-
2.1 Practice PT: Pair-Programming Paint!
-
6.1 Project: Tell a Story
-
12.1 The Effects of the Internet
-
14.1 Present a Data-Driven Insight
|
L2.AP.A.04 |
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem. |
|
L1.AP.C.03 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
-
1.7 Top Down Design and Decomposition in Karel
|
L2.AP.A.05 |
Use and adapt classic algorithms to solve computational problems. |
-
3.6 Basic Math in JavaScript
-
4.9 Random Numbers
|
L1.AP.M.01 |
Create computational artifacts by systematically organizing, manipulating and/or processing data. |
-
13.3 Data Collection & Limitations
|
L2.AP.A.06 |
Evaluate algorithms in terms of their efficiency, correctness, and clarity. |
|
L1.AP.M.02 |
Systematically design and develop programs for broad audiences by incorporating feedback from users. |
-
18.1 Intro to Design Thinking
-
18.2 Prototype
-
18.3 Test
-
18.4 Project Prep and Development
|
L2.AP.V.01 |
Compare and contrast simple data structures and their uses to simplify solutions, generalizing computational problems instead of repeatedly using primitive variables. |
-
7.1 Intro to Lists/Arrays
|
L1.AP.PD.01 |
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. |
|
L2.AP.C.01 |
Trace the execution of repetition (e.g., loops, recursion), illustrating output and changes in values of named variables. |
-
4.6 For Loops in JavaScript
-
4.7 General For Loops
-
4.8 For Loop Practice
-
4.10 While Loops
-
4.11 Loop and a Half
|
L1.AP.PD.02 |
Evaluate and refine computational artifacts to make them more usable and accessible. |
-
5.1 Functions and Parameters 1
-
5.2 Functions and Parameters 2
-
5.3 Functions and Parameters 3
-
5.4 Functions and Return Values 1
-
5.5 Functions and Return Values 2
|
L2.AP.M.01 |
Construct solutions to problems using student-created components, such as procedures, modules and/or objects. |
-
5.1 Functions and Parameters 1
-
5.2 Functions and Parameters 2
-
5.3 Functions and Parameters 3
-
5.4 Functions and Return Values 1
-
5.5 Functions and Return Values 2
|
L1.AP.PD.03 |
Design and develop computational artifacts working in team roles using collaborative tools. |
-
2.1 Practice PT: Pair-Programming Paint!
|
L2.AP.M.02 |
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution. |
|
L1.AP.PD.04 |
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs. |
-
18.2 Prototype
|
L2.AP.M.03 |
Demonstrate code reuse by creating programming solutions using libraries and APIs. |
-
1.10 Super Karel
-
1.19 Ultra Karel
-
3.6 Basic Math in JavaScript
-
3.7 Using Graphics in JavaScript
-
5.7 JavaScript vs Karel
|
L1.IC.C.01 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
-
11.10 The Impact of the Internet
-
12.1 The Effects of the Internet
|
L2.AP.PD.01 |
Plan and develop programs for broad audiences using a software life cycle process. |
-
18.1 Intro to Design Thinking
-
18.2 Prototype
-
18.3 Test
|
L1.IC.C.02 |
Test and refine computational artifacts to reduce bias and equity deficits. |
-
18.1 Intro to Design Thinking
-
18.2 Prototype
-
18.3 Test
|
L2.AP.PD.02 |
Explain security issues that might lead to compromised computer programs. |
-
11.9 Cybersecurity
|
L1.IC.C.03 |
Demonstrate how a given algorithm applies to problems across disciplines. |
|
L2.AP.PD.03 |
Develop programs for multiple computing platforms. |
|
L2.AP.PD.04 |
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project. |
-
2.1 Practice PT: Pair-Programming Paint!
-
18.4 Project Prep and Development
|
L2.IC.SI.01 |
Compare and contrast the benefits and drawbacks of social media. |
|
L1.IC.H.01 |
Hypothesize the impact of the innovations of computing systems for the next decade. |
|
L2.AP.PD.05 |
Develop and use a series of test cases to verify that a program performs according to its design specifications. |
-
3.6 Basic Math in JavaScript
|
L1.IC.SLE.01 |
Explain the beneficial and harmful effects that intellectual property laws can have on innovation. |
-
11.11 Creative Credit & Copyright
|
L2.AP.PD.06 |
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality). |
|
L1.IC.SLE.02 |
Explain the privacy concerns related to the collection and generation of data through automated processes (e.g., how businesses, social media, and the government collects and uses data) that may not be evident to users. |
-
11.9 Cybersecurity
|
L2.AP.PD.07 |
Evaluate key qualities of a program through a process such as a code review. |
|
L1.IC.SLE.03 |
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. |
|
L2.AP.PD.08 |
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems. |
-
3.1 What is Code
|
L1.IC.CP.01 |
Explore computing, software, and data storage systems in local industries. |
|
L2.IC.C.01 |
Evaluate the beneficial and harmful effects that computational artifacts and innovations have on society. |
-
11.10 The Impact of the Internet
-
12.1 The Effects of the Internet
|
L2.IC.C.02 |
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society. |
-
11.10 The Impact of the Internet
-
12.1 The Effects of the Internet
|
L2.IC.C.03 |
Design and implement a study that evaluates or predicts how computing has revolutionized an aspect of our culture and how it might evolve (e.g., education, healthcare, art/entertainment, energy). |
|
L1.IC.SI.01 |
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
|
L2.IC.H.01 |
Analyze trends of computing and how those trends have changed over time. |
|
L2.IC.SLE.01 |
Debate laws and regulations that impact the development and use of software. |
|
L2.IC.SLE.02 |
Determine ways to test the validity of information located online. |
|
L2.IC.SLE.03 |
Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity. |
|
L2.IC.CP.01 |
Collaborate with local industry partners to design and implement a viable mentorship. |
|