Standards in this Framework
Standard | Description |
---|---|
M.CS.1A | Analyze the functions and interactions of core components within a computer system. |
M.CS.1B | Explain how hardware and software components work together to perform specific tasks. |
M.CS.2A | Evaluate possible solutions to a hardware or software problem. |
E.NI.1A | Analyze the various structures and functions of a network. |
E.NI.1B | Identify and differentiate the protocols utilized in data sharing across networks. |
M.NI.2B | Analyze threats and vulnerabilities to information security for individuals and organizations. |
M.NI.2A | Explain how physical and digital security practices and measures proactively address threats to users, data, and devices within and across networks. |
M.DA.1A | Analyze and explain the connection between data sets and graphical representations. |
M.DA.1B | Evaluate the most efficient and effective ways to arrange, collect, and visually represent data to inform others. |
M.DA.2A | Compare and contrast how data is collected using computational and non-computational tools and processes. |
M.DA.2B | Analyze scenarios and computing systems to determine the appropriate data entry format for specific tasks. |
M.DA.3A | Propose methods to back up data safely and the appropriate practices for data risk management. |
M.DA.3B | Describe how different representations of real-world phenomena such as letters, numbers, and images are encoded as data. |
M.DA.4A | Utilize tools and techniques to locate, collect, and create visualizations of large-scale data sets. |
M.DA.4B | Collect and transform data using computational tools to make functional and reliable data for use in hypothesis testing. |
M.DA.5A | Refine computational models based on data generated by the models. |
M.DA.5B | Describe and evaluate the accuracy of a modeled system by comparing the generated results with observed data from the system the data represents. |
M.AP.1A | Evaluate and use naming conventions for variables to accurately communicate the variables' meaning to other users and programmers. |
M.AP.1B | Evaluate algorithms in terms of efficiency, correctness, and clarity. |
M.AP.1C | Compare and contrast data constants and variables. |
M.AP.2A | Explain the functions of various control structures. Compare and contrast examples of control structure types. |
M.AP.2B | Design and iteratively develop programs that combine control structures into advanced control structures. |
M.AP.3A | Decompose problems to facilitate program design, implementation, and review. |
M.AP.3B | Create procedures with parameters to organize code and promote reusability. |
M.AP.4A | Seek and incorporate feedback from peers to employ user-centered design solutions. |
M.AP.4B | Use applicable industry practices to test, debug, document, and peer review code. |
M.AP.4C | Develop computational artifacts by working as a team, distributing tasks, and maintaining an iterative project timeline. |
M.AP.4D | Incorporate existing resources into original programs and give the proper attributions. |
M.IC.1A | Identify foundational computational advancements through the use of the technology innovation cycle. |
M.IC.1B | Plan and devise new ideas and solutions for problems with inspiration from previous discoveries in computational knowledge. |
M.IC.2A | Develop and propose norms for informal versus formal online communications. |
M.IC.2B | Analyze communication technologies and then describe how the technology's use influences individuals and society. |
M.IC.2C | Generate designs that increase the accessibility and usability of technology for various groups of users. |
M.IC.3A | Identify applicable laws that impact personal, industry, or business computing practices. |
M.IC.3B | Recommend and propose computing-use guidelines to maintain a user’s personal safety, privacy, and well-being. |
M.IC.3C | Describe and categorize factors that affect user's access to computing resources locally, nationally, and globally. |