Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CSP.AP.1a
Identify and categorize real-world problems as classification, prediction, and sequential decision. |
|
CSP.AP.1b
Identify the process used by specialized algorithms for perceptual tasks using sensory inputs. |
|
CSP.AP.1c
Decompose a computational problem or process into sub-components. |
|
CSP.AP.1d
Use abstraction to improve program modularity, reusability, and readability. |
|
CSP.AP.1e
Create a prototype that uses algorithms to address a complex computational problem. |
|
CSP.AP.1f
Justify selected control structure(s) used to design an algorithm. |
|
CSP.AP.2a
Determine appropriate data structures to implement when given a programming problem or task. |
|
CSP.AP.2b
Create, modify, store data in, and manipulate primitive data types like numbers, strings/characters, or Boolean values. |
|
CSP.AP.2c
Create, modify, store data in, and manipulate linear and non-linear collections containing primitive and higher-order data types: arrays, lists, objectives, or key-values structures. |
|
CSP.AP.2d
Read and write programs that include linear data structures and process a collection of data. |
|
CSP.AP.3a
Use project management skills to work individually and in teams. |
|
CSP.AP.3b
Design an interactive program that accepts input from a variety of sources and produces output based on input. |
|
CSP.AP.3c
Create a design specification document. |
|
CSP.AP.3d
Design and create programs for various computing platforms. |
|
CSP.AP.3e
Document programs to improve the ability to trace, test, and debug. |
|
CSP.AP.3f
Trace the execution of an algorithm and predict its results. |
|
CSP.AP.3g
Use proper attribution to incorporate code written by others. |
|
CSP.AP.3h
Use multiple test cases to verify and refine programs. |
|
CSP.AP.3i
Revise and improve an algorithm to resolve errors or produce desired outcomes. |
|
CSP.AP.3j
Solicit and synthesize user feedback to test and refine the program. |
|
CSP.AP.3k
Apply best practices in developing programs: program development cycle, code styling, documentation, and version control. |
|
CSP.AP.4a
Compare and contrast schematic representation, pictorial representation, and other coding representations. |
|
CSP.AP.4b
Generalize programming concepts, structures, and practices across coding representations. |
|
CSP.AP.4c
Communicate the ways a coding representation or approach shapes solutions to problems. |
|
CSP.AP.4d
Evaluate coding languages for specific real-world applications. |
|
CSP.CSY.1a
Explain the role of abstraction and computing systems for user usability. |
|
CSP.CSY.1b
Explore the interdependent relationship between hardware and software and the effect on functionality and system architecture. |
|
CSP.CSY.1c
Analyze the components of hardware and software and propose solutions to increase functionality. |
|
CSP.CSY.1d
Describe the functions of an operating system, including resource management and process execution. |
|
CSP.CSY.1e
Construct a model to show the hierarchy of hardware, system software, and application software. |
|
CSP.CYB.1a
Explain the C-I-A (Confidentiality, Integrity, and Availability) Triad. |
|
CSP.CYB.1b
Solve a cybersecurity problem and propose security measures related to confidentiality, integrity, and availability. |
|
CSP.CYB.1c
Compare information security and physical security measures to assess potential threats and vulnerabilities. |
|
CSP.CYB.2a
Describe state and federal laws that relate to cybersecurity and privacy. |
|
CSP.CYB.2b
Compare and contrast ethical and unethical hacking. |
|
CSP.CYB.2c
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. |
|
CSP.CYB.3a
Examine measures to prevent the disclosure of personally identifiable information (PII). |
|
CSP.CYB.3b
Compare and contrast ways to conduct threat analysis and to protect data and computing systems from data breaches. |
|
CSP.CYB.3c
Analyze scenarios and propose computing practices to protect personal information and reduce the risk of a data breach. |
|
CSP.DA.1a
Identify the role of relational databases in storing data and in data utilization. |
|
CSP.DA.1b
Analyze tradeoffs inherent in distilling raw data into data representations. |
|
CSP.DA.1c
Evaluate data reliability and scalability. |
|
CSP.DA.1d
Identify potential bias present in data representation practices. |
|
CSP.DA.1e
Discuss the potential effect of data bias and provide recommendations on how to mitigate data bias. |
|
CSP.DA.2a
Collect and clean diverse data sets to improve data quality and relevance. |
|
CSP.DA.2b
Apply preprocessing techniques: missing values, normalization, and encoding categorical variables. |
|
CSP.DA.2c
Create subsets of training data for training, validation, and testing. |
|
CSP.DA.2d
Investigate potential imbalances within training data that could result in a biased model. |
|
CSP.DA.3a
Explain the difference between labeled and unlabeled data. |
|
CSP.DA.3b
Evaluate a dataset used to train an artificial intelligence system. |
|
CSP.DA.3c
Apply mathematical operations and algorithms to manipulate and extract insights from data sets. |
|
CSP.DA.3d
Describe how supervised or unsupervised learning algorithms find patterns and make predictions. |
|
CSP.DA.3e
Discuss how machines learn from data sets and derive new knowledge. |
|
CSP.DA.3f
Describe how natural language processors (NLP) analyze data and produce output. |
|
CSP.DA.4a
Create and refine models or computational artifacts that can be used to make predictions and communicate effectively. |
|
CSP.DA.4b
Justify tools and data visualizations selected to create and assess the model for accuracy. |
|
CSP.IC.1a
Assess the impact of manufacturing and energy use on communities and the environment. |
|
CSP.IC.1b
Analyze ways in which global collaboration is supported by new technologies. |
|
CSP.IC.1c
Identify applications of quantum computing in various fields: scientific research, nonprofit entities, government agencies, and/or business industries. |
|
CSP.IC.2a
Research and analyze the prevalence, causes, and long-term consequences of extended screen time usage. |
|
CSP.IC.2b
Identify indicators of excessive social media use. |
|
CSP.IC.2c
Propose techniques and strategies to mitigate or reduce the impact of excessive screen time usage. |
|
CSP.IC.2d
Examine and discuss the impact of screen time and social media on academic or workplace performance. |
|
CSP.IC.3a
Analyze and evaluate equity, access, and influence on the distribution of computing resources in a global society. |
|
CSP.IC.3b
Analyze the implications of emerging computing technologies to design solutions. |
|
CSP.IC.3c
Create computing artifact(s) that illustrates a solution to solve a problem locally or globally. |
|
CSP.IC.4a
Engage in work-based learning experiences involving computer science and related pathways. |
|
CSP.IC.4b
Create a plan to navigate career pathways that include computer science skills and practices. |
|
CSP.IC.5a
Identify ways Artificial Intelligence applications can modify their behavior to respond to different people’s emotional states. |
|
CSP.IC.5b
Describe the role of natural language processing in computing technologies. |
|
CSP.IC.5c
Examine ethical and privacy concerns related to Artificial Intelligence and propose recommendations to address these concerns. |
|
CSP.NI.1a
Explain abstraction enabling computing devices to communicate to one another over an Internet connection. |
|
CSP.NI.1b
Model abstractions and protocols enabling computers to transmit, receive, and interpret data within networks and over the Internet. |
|
CSP.NI.1c
Explain how abstraction enables different layers of Internet technology to build on one another. |
|
CSP.NI.1d
Describe the seven layers of the OSI model. |
|
CSP.NI.1e
Analyze issues pertaining to networks through the seven layers of the OSI model. |
|
CSP.NI.2a
Explain design principles that permit scalability and reliability of connected devices on a network |
|
CSP.NI.2b
Describe issues that impact network functionality, scalability, and reliability and recommend solutions |
|
CSP.NI.2c
Create a diagram to illustrate the communication connection between two distant devices. |
|