Standards in this Framework
Standard | Description |
---|---|
L1.CS.D.01 | Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
L1.CS.HS.01 | Explain the interactions between application software, system software, and hardware. |
L1.CS.T.01 | Develop and apply criteria for systematic discovery of errors and systematic strategies for correction of errors in computing systems. |
L1.NI.NCO.01 | Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers, etc.) and network protocols (e.g., IP, DNS, etc.). |
L1.NI.C.01 | Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system. |
L1.NI.C.02 | Illustrate how sensitive data can be affected by attacks. |
L1.NI.C.03 | Recommend security measures to address various scenarios based on information security principles. |
L1.NI.C.04 | Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government. |
L1.DA.S.01 | Translate and compare different bit representations of data types, such as characters, numbers, and images. |
L1.DA.S.02 | Evaluate the trade-offs in how data is organized and stored digitally. |
L1.DA.CVT.01 | Use tools and techniques to locate, collect, and create visualizations of small- and largescale data sets (e.g., paper surveys and online data sets). |
L1.DA.IM.01 | Show the relationships between collected data elements using computational models. |
L1.AP.A.01 | Create a prototype that uses algorithms (e. g., searching, sorting, finding shortest distance) to provide a possible solution for a real-world problem. |
L1.AP.V.01 | Demonstrate the use of lists (e.g., arrays) to simplify solutions, generalizing computational problems instead of repeatedly using primitive variables. |
L1.AP.C.01 | Justify the selection of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance, and memory usage. |
L1.AP.M.01 | Break down a solution into procedures using systematic analysis and design. |
L1.AP.M.02 | Create computational artifacts by systematically organizing, manipulating and/or processing data. |
L1.AP.PD.01 | Create software by analyzing a problem and/or process, developing and documenting a solution, testing outcomes, and adapting the program for a variety of users. |
L1.AP.PD.02 | Define and classify a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development. |
L1.AP.PD.03 | While working in a team, develop, test, and refine event-based programs that solve practical problems or allow self expression. |
L1.AP.PD.04 | Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a complex program. |
L1.AP.PD.05 | Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible. |
L1.IC.C.01 | Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
L1.IC.C.02 | Test and refine computational artifacts to reduce bias and equity deficits. |
L1.IC.C.03 | Demonstrate how a given algorithm applies to problems across disciplines. |
L1.IC.SI.01 | Demonstrate how computing increases connectivity among people of various cultures. |
L1.IC.SLE.01 | Explain the beneficial and harmful effects that intellectual property laws can have on innovation. |
L1.IC.SLE.02 | Explain the privacy concerns related to the large-scale collection and analysis of information about individuals (e.g., how businesses, social media, and the government collects and uses data) that may not be evident to users. |
L1.IC.SLE.03 | Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity. |