Standards in this Framework
Standard | Description |
---|---|
11/12.NI.1 | Identify types of security threats, and then compare and contrast measures that can be used to address, resolve, and/or prevent identified threats. |
11/12.NI.2 | Compare and contrast cryptographic techniques to model the secure transmission of information (data). |
11/12.DA.1 | Refine or create computational artifacts to better represent the relationships among different elements of data collected from factual sources or other processes. |
11/12.AP.1 | Iteratively design and develop computational artifacts for practical, personal, or societal expression that implements an algorithm based on the result of an evaluation or user input. |
11/12.AP.2 | Systematically design and create programs for broad audiences by incorporating feedback from users. |
11/12.AP.3 | Design and develop computational artifacts working in team roles using collaborative tools. |
11/12.AP.4 | Produce documentation to support the decisions made during the design and creation process using text, graphics, presentations, and/or demonstrations in the development of complex programs. |
11/12.IC.1 | Evaluate and discuss the ways computing impacts personal, ethical, social, economic, and cultural practices. |
11/12.IC.2 | Identify impacts of bias and equity deficits on design and implementation of computational artifacts, while evaluating appropriate processes for identifying issues of bias. |
11/12.IC.3 | Demonstrate computational thinking using algorithms to problem solving across multiple disciplines. |