Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
SD.CSE.1.1
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
|
SD.CSE.1.2
Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
|
SD.CSE.1.3
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
|
SD.CSE.2.1
Identify network components by describing the relationship between routers, switches, servers, topology, and addressing. |
|
SD.CSE.2.2
Give examples to illustrate how sensitive data can be affected by malware and other attacks |
|
SD.CSE.2.3
Identify security measures to address various scenarios based on the CIA Triad (confidentiality, integrity, and availability). |
|
SD.CSE.2.4
Compare various security measures, considering tradeoffs between the usability and security of a computing system. |
|
SD.CSE.3.1
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. |
|
SD.CSE.3.2
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
|
SD.CSE.4.1
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
|
SD.CSE.4.2
Investigate specific control structures and tradeoffs involving implementation, readability, and program performance. |
|
SD.CSE.4.3
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
|
SD.CSE.4.4
Understand the purpose of gathering feedback when creating software |
|
SD.CSE.4.5
Examine software licenses, including copyright, freeware, and open-source licensing. |
|
SD.CSE.4.6
Evaluate computer programs for intended outcomes. |
|
SD.CSE.5.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
|
SD.CSE.5.2
Examine and identify bias and equity deficits in existing computer programs. |
|
SD.CSE.5.3
Identify and use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
|
SD.CSE.5.4
Explore privacy concerns and intellectual property laws related to computing. |
|
SD.CSE.5.5
Explore careers in computer science. |
|