Standards in this Framework
Standard | Description |
---|---|
SD.CSE.1.1 | Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
SD.CSE.1.2 | Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
SD.CSE.1.3 | Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
SD.CSE.2.1 | Identify network components by describing the relationship between routers, switches, servers, topology, and addressing. |
SD.CSE.2.2 | Give examples to illustrate how sensitive data can be affected by malware and other attacks |
SD.CSE.2.3 | Identify security measures to address various scenarios based on the CIA Triad (confidentiality, integrity, and availability). |
SD.CSE.2.4 | Compare various security measures, considering tradeoffs between the usability and security of a computing system. |
SD.CSE.3.1 | Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. |
SD.CSE.3.2 | Evaluate the tradeoffs in how data elements are organized and where data is stored. |
SD.CSE.4.1 | Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
SD.CSE.4.2 | Investigate specific control structures and tradeoffs involving implementation, readability, and program performance. |
SD.CSE.4.3 | Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
SD.CSE.4.4 | Understand the purpose of gathering feedback when creating software |
SD.CSE.4.5 | Examine software licenses, including copyright, freeware, and open-source licensing. |
SD.CSE.4.6 | Evaluate computer programs for intended outcomes. |
SD.CSE.5.1 | Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
SD.CSE.5.2 | Examine and identify bias and equity deficits in existing computer programs. |
SD.CSE.5.3 | Identify and use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
SD.CSE.5.4 | Explore privacy concerns and intellectual property laws related to computing. |
SD.CSE.5.5 | Explore careers in computer science. |