Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
M.CS.1A
Analyze the functions and interactions of core components within a computer system. |
|
M.CS.1B
Explain how hardware and software components work together to perform specific tasks. |
|
M.CS.2A
Evaluate possible solutions to a hardware or software problem. |
|
E.NI.1A
Analyze the various structures and functions of a network. |
|
E.NI.1B
Identify and differentiate the protocols utilized in data sharing across networks. |
|
M.NI.2B
Analyze threats and vulnerabilities to information security for individuals and organizations. |
|
M.NI.2A
Explain how physical and digital security practices and measures proactively address threats to users, data, and devices within and across networks. |
|
M.DA.1A
Analyze and explain the connection between data sets and graphical representations. |
|
M.DA.1B
Evaluate the most efficient and effective ways to arrange, collect, and visually represent data to inform others. |
|
M.DA.2A
Compare and contrast how data is collected using computational and non-computational tools and processes. |
|
M.DA.2B
Analyze scenarios and computing systems to determine the appropriate data entry format for specific tasks. |
|
M.DA.3A
Propose methods to back up data safely and the appropriate practices for data risk management. |
|
M.DA.3B
Describe how different representations of real-world phenomena such as letters, numbers, and images are encoded as data. |
|
M.DA.4A
Utilize tools and techniques to locate, collect, and create visualizations of large-scale data sets. |
|
M.DA.4B
Collect and transform data using computational tools to make functional and reliable data for use in hypothesis testing. |
|
M.DA.5A
Refine computational models based on data generated by the models. |
|
M.DA.5B
Describe and evaluate the accuracy of a modeled system by comparing the generated results with observed data from the system the data represents. |
|
M.AP.1A
Evaluate and use naming conventions for variables to accurately communicate the variables' meaning to other users and programmers. |
|
M.AP.1B
Evaluate algorithms in terms of efficiency, correctness, and clarity. |
|
M.AP.1C
Compare and contrast data constants and variables. |
|
M.AP.2A
Explain the functions of various control structures. Compare and contrast examples of control structure types. |
|
M.AP.2B
Design and iteratively develop programs that combine control structures into advanced control structures. |
|
M.AP.3A
Decompose problems to facilitate program design, implementation, and review. |
|
M.AP.3B
Create procedures with parameters to organize code and promote reusability. |
|
M.AP.4A
Seek and incorporate feedback from peers to employ user-centered design solutions. |
|
M.AP.4B
Use applicable industry practices to test, debug, document, and peer review code. |
|
M.AP.4C
Develop computational artifacts by working as a team, distributing tasks, and maintaining an iterative project timeline. |
|
M.AP.4D
Incorporate existing resources into original programs and give the proper attributions. |
|
M.IC.1A
Identify foundational computational advancements through the use of the technology innovation cycle. |
|
M.IC.1B
Plan and devise new ideas and solutions for problems with inspiration from previous discoveries in computational knowledge. |
|
M.IC.2A
Develop and propose norms for informal versus formal online communications. |
|
M.IC.2B
Analyze communication technologies and then describe how the technology's use influences individuals and society. |
|
M.IC.2C
Generate designs that increase the accessibility and usability of technology for various groups of users. |
|
M.IC.3A
Identify applicable laws that impact personal, industry, or business computing practices. |
|
M.IC.3B
Recommend and propose computing-use guidelines to maintain a user’s personal safety, privacy, and well-being. |
|
M.IC.3C
Describe and categorize factors that affect user's access to computing resources locally, nationally, and globally. |
|