Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
H.CS.1A
Analyze the levels of interactions between application software and system software as well as the hardware layers. |
|
H.CS.1B
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday things |
|
H.CS.2A
Generate guidelines that convey systematic troubleshooting strategies that other users can utilize to identify and fix errors. |
|
E.NI.1A
Evaluate a network's scalability, reliability, and appropriateness by describing the relationship between routers, switches, devices, topology, and addressing (MAC, IP, Subnet, Gateway). |
|
E.NI.1B
Illustrate how to trace data through a network model, explaining the interactions that occur throughout the process. |
|
E.NI.1C
Describe and evaluate the internet as a digital public infrastructure (DPI) from the highest level to the private service provider level. |
|
H.NI.2B
Recommend security measures to address factors that create trade-offs between the usability and security of a computing system. |
|
H.NI.2A
Interpret and analyze mechanisms through which malware and other types of cyber attacks can impact hardware, software, and sensitive data. |
|
H.NI.2C
Compare and contrast how software developers protect computing systems and information from unauthorized user access. |
|
H.DA.1A
Evaluate data representations, propose strategies to reconstruct the data, and visualize data in a variety of ways. |
|
H.DA.1B
Define and describe database structures to optimize the search and retrieval of data. |
|
H.DA.2A
Explain and describe the impacts of uncertainty and the limitations of data collection technology and tools. |
|
H.DA.2B
Describe the personal and legal impacts of accumulated data, both collected and derived, for given scenarios. Propose tools and techniques to manage the accumulated data appropriately |
|
H.DA.3A
Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity. |
|
H.DA.3B
Explain and utilize the appropriate data structural organization system to collaborate and communicate data within a team or user group in given scenarios. |
|
H.DA.4A
Create interactive data visualizations using software tools that explain complex data to others. |
|
H.DA.4B
Utilize data analysis tools to ingest (extract, transform, and load) and process data into relevant information. |
|
H.DA.5A
Create a model utilizing data with the appropriate simulated variables to develop predictions for real-world phenomena. |
|
H.DA.5B
Apply and evaluate data analysis techniques to identify patterns represented in complex systems. |
|
H.DA.5C
Analyze patterns in data visualizations, then select a collection tool to test a hypothesis and communicate the relevant information to others. |
|
H.DA.5D
Evaluate the impacts of the variables and the model on the performance of a simulation to refine a hypothesis. |
|
H.AP.1A
Assess variables, then classify the scope and type of variable. |
|
H.AP.1B
Design algorithms that can be adapted to express an idea or solve a problem. |
|
H.AP.1C
Use and adapt classical algorithms to solve computational problems. |
|
H.AP.1D
Explain what computer memory is and how variables are stored and retrieved. |
|
H.AP.1E
Identify and explain how a derived data type can be utilized in a real-world scenario. |
|
H.AP.2A
Justify the selection of control structures to balance implementation complexity, maintainability, and program performance. |
|
H.AP.2B
Design and iteratively develop computational artifacts using events to initiate instructions. |
|
H.AP.3A
Decompose problems into smaller components using constructs such as procedures, modules, and/or objects. |
|
H.AP.3B
Create computational artifacts using procedures within a program, combinations of data and procedures, or independent but interrelated programs. |
|
H.AP.4A
Utilize the Software Development Life Cycle (SDLC) to create software that is a minimum viable product. |
|
H.AP.4B
Develop and utilize test cases to verify that a program performs according to the program’s design specifications. |
|
H.AP.4C
Design and develop programs by working in team roles using version control systems, integrated development environments (IDEs), and collaborative tools and practices. |
|
H.AP.4D
Evaluate licenses that limit or restrict the use of computational artifacts when utilizing resources such as libraries. |
|
H.IC.1A
Analyze the key milestones of computer science, historical events influenced by computer science, and the people connected to these achievements. |
|
H.IC.1B
Explain how innovations in computer science and technology enable advancements in other fields of study. |
|
H.IC.2A
Evaluate the adoption and adaptation of social norms from the physical world to the cyber world. |
|
H.IC.2B
Describe how cyberspace is becoming a universal medium for connecting humans, the economy, business, and computing. |
|
H.IC.2C
Describe and critique how algorithmic feedback loops can shape perceptions, reinforce a limited data set, and limit the sources of information that may inform the individual user. |
|
H.IC.3A
Debate laws and industry regulations that impact the development and use of computational artifacts. |
|
H.IC.3B
Describe and analyze the motives of online threat actors to a user’s personal safety, privacy, and well-being. |
|
H.IC.3C
Compare and contrast the varied approaches to govern data, intellectual property, control information access, and various ways for users to be aware of guidance. |
|
H.IC.3D
Explain how the interconnectedness of cyberspace can lead to physical and digital vulnerabilities. |
|
H.IC.3E
Debate the ethical considerations of creating and publishing computational artifacts. |
|
H.IC.3F
Analyze the data provenance of computational artifacts. |
|
H.IC.3G
Explain how individuals and organizations can exert influence on personal and societal perceptions and practices through computing technologies. |
|