Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
L1.CS.D.01
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
|
L1.CS.HS.01
Explain the interactions between application software, system software, and hardware. |
|
L1.CS.T.01
Develop and apply criteria for systematic discovery of errors and systematic strategies for correction of errors in computing systems. |
|
L1.NI.NCO.01
Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers, etc.) and network protocols (e.g., IP, DNS, etc.). |
|
L1.NI.C.01
Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system. |
|
L1.NI.C.02
Illustrate how sensitive data can be affected by attacks. |
|
L1.NI.C.03
Recommend security measures to address various scenarios based on information security principles. |
|
L1.NI.C.04
Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government. |
|
L1.DA.S.01
Translate and compare different bit representations of data types, such as characters, numbers, and images. |
|
L1.DA.S.02
Evaluate the trade-offs in how data is organized and stored digitally. |
|
L1.DA.CVT.01
Use tools and techniques to locate, collect, and create visualizations of small- and largescale data sets (e.g., paper surveys and online data sets). |
|
L1.DA.IM.01
Show the relationships between collected data elements using computational models. |
|
L1.AP.A.01
Create a prototype that uses algorithms (e. g., searching, sorting, finding shortest distance) to provide a possible solution for a real-world problem. |
|
L1.AP.V.01
Demonstrate the use of lists (e.g., arrays) to simplify solutions, generalizing computational problems instead of repeatedly using primitive variables. |
|
L1.AP.C.01
Justify the selection of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance, and memory usage. |
|
L1.AP.M.01
Break down a solution into procedures using systematic analysis and design. |
|
L1.AP.M.02
Create computational artifacts by systematically organizing, manipulating and/or processing data. |
|
L1.AP.PD.01
Create software by analyzing a problem and/or process, developing and documenting a solution, testing outcomes, and adapting the program for a variety of users. |
|
L1.AP.PD.02
Define and classify a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development. |
|
L1.AP.PD.03
While working in a team, develop, test, and refine event-based programs that solve practical problems or allow self expression. |
|
L1.AP.PD.04
Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a complex program. |
|
L1.AP.PD.05
Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible. |
|
L1.IC.C.01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
|
L1.IC.C.02
Test and refine computational artifacts to reduce bias and equity deficits. |
|
L1.IC.C.03
Demonstrate how a given algorithm applies to problems across disciplines. |
|
L1.IC.SI.01
Demonstrate how computing increases connectivity among people of various cultures. |
|
L1.IC.SLE.01
Explain the beneficial and harmful effects that intellectual property laws can have on innovation. |
|
L1.IC.SLE.02
Explain the privacy concerns related to the large-scale collection and analysis of information about individuals (e.g., how businesses, social media, and the government collects and uses data) that may not be evident to users. |
|
L1.IC.SLE.03
Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity. |
|