for Ohio 9-12 Foundational — AP Computer Science Principles
Total Standards: 52Mapped: 33Completion: 63%
CS.D.9-12.F.a
Identify different multifunctional computing devices and connection technologies, both virtual and physical, to describe their purpose.
12.1 Intro to the Internet
12.2 Internet Hardware
12.3 Internet Addresses
12.4 DNS
12.5 Routing
12.6 Packets and Protocols
CS.D.9-12.F.b
Develop and apply criteria to evaluate computing systems for a given purpose.
12.1 Intro to the Internet
12.2 Internet Hardware
12.3 Internet Addresses
12.4 DNS
12.5 Routing
12.6 Packets and Protocols
CS.D.9-12.F.c
Create an artifact to demonstrate the roles and interactions of computing systems embedded in everyday objects.
13.1 Practice PT: The Effects of the Internet
CS.D.9-12.F.d
Evaluate alternative computing architectures for emerging technologies, including cluster and quantum computing.
CS.HS.9-12.F.a
Compare and contrast interactions between application software, system software and hardware.
12.2 Internet Hardware
CS.T.9-12.F.a
Apply a systemic process to identify problems and take steps to correct them within an integrated computing system.
12.1 Intro to the Internet
12.2 Internet Hardware
12.3 Internet Addresses
12.4 DNS
12.5 Routing
12.6 Packets and Protocols
CS.T.9-12.F.b
Analyze an IT device to determine either what repairs are needed or how to build it.
12.1 Intro to the Internet
12.2 Internet Hardware
12.3 Internet Addresses
12.4 DNS
12.5 Routing
12.6 Packets and Protocols
NI.N.9-12.F.a
Evaluate and select networking devices to establish scalable communications.
12.4 DNS
12.5 Routing
12.6 Packets and Protocols
NI.N.9-12.F.b
Evaluate and select networking protocols for classical, clustered and quantum computing to establish network communication.
12.4 DNS
12.5 Routing
12.6 Packets and Protocols
NI.N.9-12.F.c
Understand scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together.
12.5 Routing
12.6 Packets and Protocols
NI.C.9-12.F.a
Examine and employ principles of cybersecurity.
12.8 Cybersecurity
NI.C.9-12.F.b
Identify physical, social and digital security risks to address possible attacks from both existing and emergent technologies, including cluster computing and quantum key distribution.
12.8 Cybersecurity
NI.C.9-12.F.c
Compare and contrast examples of various threat actors, such as nation-states, cyber terrorist groups, organized crime or hacktivists.
12.8 Cybersecurity
NI.C.9-12.F.d
Explore and utilize examples of encryption methods, e.g., Vigenere, Bacon’s cipher, and Enigma.
9.10 Cryptography
10.1 Practice PT: Steganography
12.8 Cybersecurity
NI.IOT.9-12.F.a
Design an IoT life cycle scenario that encompasses data gathering, transmission, reception and data analysis to demonstrate how the IoT operates and apply these skills to design products that model the process.
NI.IOT.9-12.F.b
Explore and plan career pathways related to IoT to identify careers associated with the computer science field.
DA.DCS.9-12.F.a
Analyze patterns in a real-world data store through hypothesis, testing and use of data tools to gain insight and knowledge.
14.2 Visualizing and Interpreting Data
15.1 Practice PT: Present a Data-Driven Insight
DA.DCS.9-12.F.b
Investigate data storage systems to compare and contrast how data is stored and accessed.
DA.VC.9-12.F.a
Analyze the benefits and limitations of data visualization or multisensory artifacts and tools to communicate which is most appropriate to solve a real-world problem.
15.1 Practice PT: Present a Data-Driven Insight
DA.IM.9-12.F.a
Evaluate a model by creating a hypothesis, testing it and refining it to discover connections and trends in the data.
14.2 Visualizing and Interpreting Data
15.1 Practice PT: Present a Data-Driven Insight
ATP.A.9-12.F.a
Define and use appropriate problem solving strategies and visual artifacts to create and refine a solution to a real-world problem.
15.1 Practice PT: Present a Data-Driven Insight
ATP.A.9-12.F.b
Define and implement an algorithm by decomposing problem requirements from a problem statement to solve a problem.
2.7 Top Down Design and Decomposition in Karel
2.17 Karel Algorithms
2.20 Karel Challenges
ATP.A.9-12.F.c
Define and explain iterative algorithms to understand how and when to apply them.
8.1 Intro to Lists/Arrays
8.3 Adding/Removing From an Array
8.4 Array Length and Looping Through Arrays
8.5 Iterating Over an Array
8.6 Finding an Element in a List
8.7 Removing an Element From an Array
ATP.A.9-12.F.d
Define and explain recursive algorithms to understand how and when to apply them.
ATP.VDR.9-12.F.a
Identify types of variables and data and utilize them to create a computer program that stores data in appropriate ways.
4.4 Variables
8.1 Intro to Lists/Arrays
ATP.CS.9-12.F.a
Define control structures and Boolean logic and use them to solve real-world scenarios.
2.11 For Loops
2.12 If Statements
2.13 If/Else Statements
2.14 While Loops in Karel
2.15 Control Structures Example
2.17 Karel Algorithms
5.1 Booleans
5.4 If Statements
5.5 For Loops in JavaScript
5.6 General For Loops
5.7 For Loop Practice
ATP.CS.9-12.F.b
Use appropriate syntax to create and use a method.
6.1 Functions and Parameters 1
6.2 Functions and Parameters 2
6.3 Functions and Parameters 3
6.4 Functions and Return Values 1
6.5 Functions and Return Values 2
6.8 Basic JavaScript and Graphics Challenges
ATP.CS.9-12.F.c
Use data scoping to isolate data.
6.6 Local Variables and Scope
ATP.M.9-12.F.a
Break down a solution into procedures using systematic analysis and design.
16.1 Intro to Design Thinking
16.2 Prototype
16.3 Test
16.4 Project Prep and Development
ATP.M.9-12.F.b
Create computational artifacts by systematically organizing, manipulating and/or processing data
15.1 Practice PT: Present a Data-Driven Insight
ATP.PD.9-12.F.a
Investigate software development methodologies to select the appropriate one for a project to complete as a team.
ATP.PD.9-12.F.b
Compare test methodologies to evaluate why each is used and to determine their benefits and costs.
3.1 Practice PT: Pair-Programming Paint!
ATP.PD.9-12.F.c
Correctly use consistent naming conventions, version control and comments to demonstrate why these are important for future use, maintenance and reuse of code.
2.8 Commenting Your Code
2.18 How to Indent Your Code
4.4 Variables
AI.P.9-12.F.a
Explain how radar, lidar, GPS and accelerometer data are represented.
AI.P.9-12.F.b
Describe the limitations and advantages of various types of computer sensors.
AI.RR.9-12.F.a
Categorize real-world problems as classification, prediction, sequential decision problems, combination search, heuristic search, adversarial search, logical deduction or statistical inference.
AI.RR.9-12.F.b
For each of these types of reasoning problems (classification, prediction, sequential decision-making, combinatorial search, heuristic search, adversarial search, logical deduction and statistical inference), list an algorithm that could be used to solve that problem.
AI.RR.9-12.F.c
Describe the differences between types of search algorithms.
AI.ML.9-12.F.a
Illustrate what happens during each of the steps required when using machine learning to construct a classifier or predictor.
AI.ML.9-12.F.b
Use either a supervised or unsupervised learning algorithm to train a model on real-world data, then evaluate the results.
AI.NI.9-12.F.a
Construct context-free grammar to parse simple languages and use language-processing tools to construct a chatbot. Use sentiment analysis tools to extract emotional tone from text.
AI.NI.9-12.F.b
Demonstrate how sentence parsers handle ambiguity.
AI.NI.9-12.F.c
Describe how artificial intelligence drives many software and physical systems.
AI.SI.9-12.F.a
Critically explore the positive and negative impacts of an AI system.
IC.Cu.9-12.F.a
Analyze new technology to predict realistic impacts on society.
12.9 The Impact of the Internet
13.1 Practice PT: The Effects of the Internet
IC.Cu.9-12.F.b
Identify how existing and emerging computing architecture has and will impact other professions, both positively and negatively.
12.9 The Impact of the Internet
13.1 Practice PT: The Effects of the Internet
IC.SI.9-12.F.a
Evaluate tools to increase connectivity of people in different cultures and career fields.
16.1 Intro to Design Thinking
16.2 Prototype
16.3 Test
16.4 Project Prep and Development
IC.SI.9-12.F.b
Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users.
12.9 The Impact of the Internet
IC.SLE.9-12.F.a
Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact.
12.8 Cybersecurity
12.9 The Impact of the Internet
IC.SLE.9-12.F.b
Analyze the concepts of usability and security to explain typical tradeoffs between them.
IC.SLE.9-12.F.c
Analyze the collection and generation of data through automated processes to explain the legal concerns that are not always evident to users.
IC.SLE.9-12.F.d
Explain the beneficial and harmful effects of intellectual property laws to determine the impacts on innovation.