Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
M-NI-01
Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet. |
|
M-NI-02
Model how information is disguised using different methods of encryption to secure it during transmission from one point to another. |
|
M-NI-03
Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data. |
|
M-DA-01
Store data using multiple encoding methods. |
|
M-DA-02
Collect data using computational tools and transform the data to make it more useful and reliable. |
|
M-DA-03
Refine computational models based on the data they have generated. |
|
M-AP-01
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
|
M-AP-02
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. |
|
M-AP-03
Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
|
M-AP-04
Create flowcharts and/or pseudocode to address complex problems as algorithms. |
|
M-AP-05
Create clearly named variables that represent different data types and perform operations on their values. |
|
M-AP-06
Create procedures with parameters to organize code and make it easier to reuse. |
|
M-AP-07
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. |
|
M-AP-08
Incorporate existing code, media, and libraries into original programs, and give attribution. |
|
M-AP-09
Systematically test and refine programs using a range of test cases. |
|
M-AP-10
Document programs in order to make them easier to follow, test, and debug. |
|
M-AP-11
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. |
|
M-AP-12
Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration. |
|
M-IC-01
Discuss issues of bias and accessibility in existing technologies. |
|
M-IC-02
Compare the positive & negative effects of computing technologies on society. |
|
M-IC-03
Collaborate with others using appropriate tools at the local, national, and/or international levels. |
|
M-IC-04
Discuss the benefits and consequences of making information either public or private. |
|
M-CS-01
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices |
|
M-CS-02
Design projects that combine hardware and software components to collect and exchange data. |
|
M-CS-03
Identify and fix problems with computing devices and their components systematically. |
|