Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1.1.1
Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law |
|
1.1.2
Research nationally recognized CTSOs |
|
1.1.3
Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) |
|
1.2.1
Discuss the purpose of parliamentary procedure |
|
1.2.2
Demonstrate the proper use of parliamentary procedure |
|
1.2.3
Differentiate between an office and a committee |
|
1.2.4
Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions |
|
1.2.5
Participate in local, regional, state, or national conferences, events, or competitions |
|
1.2.6
Describe the importance of a constitution and bylaws to the operation of a CTSO chapter |
|
1.3.1
Explore opportunities in community service-related work-based learning (WBL) |
|
1.3.2
Participate in a service learning (program related) and/or community service project or activity |
|
1.3.3
Engage with business and industry partners for community service |
|
1.4.1
Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) |
|
1.4.2
Describe the appropriate professional/workplace attire and its importance |
|
1.4.3
Investigate industry-standard credentials/certifications available within this Career Clusterâ„¢ |
|
1.4.4
Participate in authentic contextualized instructional activities |
|
1.4.5
Demonstrate technical skills in various student organization activities/events |
|
1.5.1
Make a connection between program standards to career pathway(s) |
|
1.5.2
Explain the importance of participation and completion of a program of study |
|
1.5.3
Promote community awareness of local student organizations associated with CTE programs |
|
2.1.1
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests |
|
2.1.2
Describe how artificial intelligence drives many software and physical systems |
|
2.1.4
Use and adapt classic algorithms to solve computational problems |
|
2.2.1
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made |
|
2.2.2
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions |
|
2.3.1
Demonstrate the use of both LinkedLists and ArrayLists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables |
|
2.3.2
Compare and contrast fundamental data structures and their uses |
|
2.3.3
Implement arrays in code |
|
2.3.4
Implement ArrayLists and LinkedLists in code |
|
2.3.5
Implement type-safe variables |
|
2.4.1
Decompose problems into smaller components through systematic analysis using constructs such as procedures, modules, and/or objects |
|
2.4.2
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs |
|
2.5.1
Systematically design and develop programs for broad audiences by incorporating feedback from users |
|
2.5.2
Evaluate software licenses that limit or restrict the use of computational artifacts when using resources such as libraries |
|
2.5.3
Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities |
|
2.5.4
Design and develop computational artifacts while working in team roles and using collaborative tools |
|
2.5.5
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs |
|
3.1.1
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects |
|
3.2.1
Compare levels of abstraction and interactions between application software, system software, and hardware layers |
|
3.2.2
Categorize the roles of operating system software |
|
3.3.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors |
|
3.3.2
Illustrate ways computing systems implement logic, input, and output through hardware components |
|
4.1.1
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation) |
|
4.1.2
Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images |
|
4.2.1
Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena |
|
4.2.2
Use data analysis tools and techniques to identify patterns in data representing complex systems |
|
5.1.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices |
|
5.1.2
Test and refine computational artifacts to reduce bias and equity deficits |
|
5.1.3
Demonstrate ways a given algorithm applies to problems across disciplines |
|
5.1.4
Explain the potential impacts of artificial intelligence on society |
|
5.2.1
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields |
|
5.2.2
Use tools and methods for collaboration to increase the productivity of a team |
|
5.3.1
Explain the beneficial and harmful effects that intellectual property laws can have on innovation |
|
5.3.2
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users |
|
5.3.3
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics |
|
6.2.1
Illustrate how sensitive data can be affected by malware and other attacks |
|
6.2.2
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts |
|
6.2.3
Compare various security measures, considering tradeoffs between the usability and security of a computing system |
|
6.2.4
Explain tradeoffs when selecting and implementing cybersecurity recommendations |
|