Standards in this Framework
Standard | Description |
---|---|
CS.2.1 | Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices |
CS.2.2 | Design projects that combine hardware and software components to collect and exchange data. |
CS.2.3 | Systematically identify and fix problems with computing devices and their components. |
NI.2.1 | Model the role of protocols in transmitting data across networks and the Internet |
NI.2.2 | Explain how physical and digital security measures protect electronic information |
NI.2.3 | Apply multiple methods of encryption to model the secure transmission of information. |
DA.2.1 | Represent data using multiple encoding schemes. |
DA.2.2 | Collect data using computational tools and transform the data to make it more useful and reliable. |
DA.2.3 | Refine computational models based on the data they have generated. |
AP.2.1 | Use flowcharts and/or pseudocode to address complex problems as algorithms. |
AP.2.2 | Create clearly named variables that represent different data types and perform operations on their values. |
AP.2.3 | Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. [ |
AP.2.4 | Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. [ |
AP.2.5 | Create procedures with parameters to organize code and make it easier to reuse |
AP.2.6 | Seek and incorporate feedback from team members and users to refine a solution that meets user needs. |
AP.2.7 | Incorporate existing code, media, and libraries into original programs and give attribution. |
AP.2.8 | Systematically test and refine programs using a range of test cases. [ |
AP.2.9 | Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. |
AP.2.10 | Document programs in order to make them easier to follow, test, and debug |
IC.2.1 | Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. |
IC.2.2 | Discuss issues of bias and accessibility in the design of existing technologies. |
IC.2.3 | Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. |
IC.2.4 | Describe tradeoffs between allowing information to be public and keeping information private and secure. |