Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
A.1
Identify major causes of work-related accidents in offices. |
|
A.2
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks. |
|
A.3
Identify potential abuse and unethical uses of computers and networks. |
|
A.4
Explain the consequences of illegal, social, and unethical uses of information technologies, e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices. |
|
A.5
Differentiate between freeware, shareware, and public domain software copyrights. |
|
A.6
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications. |
|
A.7
Identify netiquette including the use of email, social networking, blogs, texting, and chatting. |
|
A.8
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information. |
|
A.9
Discuss the importance of cyber safety and the impact of cyber bullying. |
|
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
|
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. |
|
B.3
Explain the benefits and responsibilities of being a member of a CTSO. |
|
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
|
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
|
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed). |
|
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
|
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. |
|
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). |
|
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use. |
|
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information. |
|
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. |
|
C.8
Evaluate various solutions to common hardware and software problems. |
|
D.1
Demonstrate creativity and innovation. |
|
D.2
Demonstrate critical thinking and problem-solving skills. |
|
D.3
Demonstrate initiative and self-direction. |
|
D.4
Demonstrate integrity. |
|
D.5
Demonstrate work ethic. |
|
D.6
Demonstrate conflict resolution skills. |
|
D.7
Demonstrate listening and speaking skills. |
|
D.8
Demonstrate respect for diversity. |
|
D.9
Demonstrate customer service orientation. |
|
D.10
Demonstrate teamwork. |
|
E.1
Demonstrate global or “big picture” thinking. |
|
E.2
Demonstrate career and life management skills and goal-making. |
|
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements. |
|
E.4
Demonstrate time and resource management skills. |
|
E.5
Demonstrates information literacy skills. |
|
E.6
Demonstrates information security skills. |
|
E.7
Demonstrates information technology skills. |
|
E.8
Demonstrates knowledge and use of job-specific tools and technologies. |
|
E.9
Demonstrate job-specific mathematics skills. |
|
E.10
Demonstrates professionalism in the workplace. |
|
E.11
Demonstrate reading and writing skills. |
|
E.12
Demonstrates workplace safety. |
|
F.1
Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing. |
|
F.2
Explain the importance of Acceptable Use Policies. |
|
F.3
Explain the importance of data security and physical security. |
|
F.4
Explain the concepts of confidentiality, integrity, and availability (CIA). |
|
F.5
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society. |
|
F.6
Explain the concept of encryption and how it is used on a daily basis. |
|
F.7
Explain the social implications of constant data collection via Wi-Fi-enabled devices (Internet of Things [IoT]). |
|
G.1
Identify and define the functional components of a computing device (input devices, output devices, processor, operating system, software applications, memory, storage, etc.) |
|
G.2
Describe how software and hardware interact. |
|
G.3
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise). |
|
G.4
Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss). |
|
H.1
Evaluate the results of Internet searches and the reliability of information found on Web sites. |
|
H.2
Describe how Web sites are used to communicate and exchange data. |
|
H.3
Plan a web page considering subject, devices, audience, layout, color, links and graphics. |
|
H.4
Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph). |
|
H.5
Create and attach a stylesheet that includes a variety of CSS rule sets to format HTML elements used to organize web page content. |
|
H.6
Incorporate digital media in accordance with copyright and fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use. |
|
I.1
Classify application software according to its primary function (e.g., operating systems, productivity, entertainment, system). |
|
I.2
Demonstrate an understanding of algorithms and their practical applications. |
|
I.3
Create, evaluate, and adjust algorithms to solve a variety of problems using flowcharts and/or pseudocode. |
|
I.4
Analyze and explain how a particular program functions. |
|
I.5
Solve problems of increasing complexity using visual block-based programming individually and collaboratively. |
|
I.6
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for). |
|
I.7
Differentiate between text, numerical and Boolean variables. |
|
I.8
Implement pattern recognition to edit, compile/run, test, and debug a program. |
|
J.1
Define and demonstrate how and why the binary system is used to represent data in a computer (e.g., RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.) |
|
J.2
Describe how a picture, sound/song, and video are digitized and represented in a computer. |
|
J.3
Analyze the importance of data security and physical security. |
|
J.4
Evaluate the concepts of confidentiality, integrity, and availability (CIA). |
|
J.5
Apply the concept of encryption and decryption and how it is used on a daily basis. |
|
J.6
Collect data using various methods and transform it to make it more useful and reliable. |
|
J.7
Develop a visual representation of data that assists in making a decision or recommendation. |
|
K.1
Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering. |
|
K.2
Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges. |
|
K.3
Identify gender, diversity and geographic related issues in computing. |
|
K.4
Identify how computing is used in other career fields. |
|
K.5
Identify key individuals and their impact on the field of computing. |
|
L.1
Identify the role physical computing plays in the Internet of Things (IoT). |
|
L.2
Identify and categorize physical sensors based on capability (e.g., light, sound, temperature, movement.) |
|
L.3
Differentiate and apply inputs and outputs that are available on a physical device vs software development. |
|
L.4
Use an API to develop code that controls a physical computing device. |
|
L.5
Create prototypes that use a physical device to solve real-world problems. |
|
M.1
Identify how machine learning impacts data-driven decision making. |
|
M.2
Analyze patterns in data to determine the features that predict categorization. |
|
M.3
Evaluate a dataset with features to illustrate how computers can learn to classify things. |
|
M.4
Explain the importance of avoiding bias when creating machine learning models. |
|
M.5
Contrast the unique characteristics of human learning with the ways machine learning operates. |
|