Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CSF.AP.1.a
Identify real-world problems that are classification and prediction problems. |
|
CSF.AP.1.b
Decompose a problem or process into sub-components. |
|
CSF.AP.1.c
Implement abstractions to improve program modularity, reusability, and readability. |
|
CSF.AP.1.d
Identify computing-based solutions to address a computational problem. |
|
CSF.AP.2.a
Create programs using a text-based programming language. |
|
CSF.AP.2.b
Document programs to improve the ability to trace, test, and debug. |
|
CSF.AP.2.c
Trace the execution of an algorithm and predict its results. |
|
CSF.AP.2.d
Analyze the outcomes of programs to identify logic and syntax errors. |
|
CSF.AP.2.e
Use multiple test cases to verify and refine the program. |
|
CSF.AP.2.f
Revise and improve an algorithm to resolve errors or produce desired outcomes. |
|
CSF.AP.2.g
Use version control and incorporate user feedback to refine program. |
|
CSF.AP.3.a
Read and interpret algorithms and programs expressed using plain language, pseudocode, and text-based programming languages. |
|
CSF.AP.3.b
Create design documents using plain language, pseudocode, or diagrams. |
|
CSF.AP.3.c
Read and write algorithms and programs that accept multiple input values, use variables, and produce output. |
|
CSF.AP.3.d
Read and write algorithms and programs that include predefined functions and procedures with parameters and returns. |
|
CSF.AP.3.e
Compare several implementations of the same algorithm using different control structures. |
|
CSF.AP.4.a
Determine appropriate data structures to address program specifications. |
|
CSF.AP.4.b
Apply basic computations on numeric and non-numeric data types. |
|
CSF.AP.4.c
Read and write programs that create, store, and manipulate primitive data. |
|
CSF.AP.4.d
Read and write programs that create, store, and manipulate linear collections of primitive data types: arrays or list. |
|
CSF.AP.4.e
Read and write programs that use relational, logical, and arithmetic expressions. |
|
CSF.AP.4.f
Read and write programs that traverse and manipulate data structures. |
|
CSF.AP.5.a
Define and describe neural network learning algorithms. |
|
CSF.AP.5.b
Illustrate and describe a neural network structure. |
|
CSF.AP.5.c
Identify and discuss examples of computing technologies that utilize neural networks. |
|
CSF.AP.5.d
Compare and contrast a decision tree learning algorithm and a neural network learning algorithm. |
|
CSF.AP.6.a
Identify and describe characteristics of block-based and text-based coding languages. |
|
CSF.AP.6.b
Analyze the advantages and disadvantages of block-based and text-based coding languages. |
|
CSF.AP.6.c
Analyze the advantages and disadvantages of various text-based coding languages. |
|
CSF.AP.7.a
Define the concept and role of a search algorithm. |
|
CSF.AP.7.b
Define the concept and role of a sort algorithm. |
|
CSF.AP.7.c
Compare and contrast bubble sort, quick sort, and merge sort. |
|
CSF.AP.7.d
Compare and contrast linear search and binary search. |
|
CSF.AP.7.e
Evaluate and determine the best search or sort algorithm to use based on intended results. |
|
CSF.AP.8.a
Identify project management frameworks and methodologies that emphasize iteration. |
|
CSF.AP.8.b
Discuss the significance of communication and methods of communication when working collaboratively. |
|
CSF.AP.8.c
Distribute roles and responsibilities and adhere to predetermined timeline and/or project scope. |
|
CSF.AP.8.d
Collaboratively plan, design, and revise programs. |
|
CSF.AP.8.e
Provide constructive feedback through peer review. |
|
CSF.AP.8.f
Use project management tools to support collaboration. |
|
CSF.AP.8.g
Justify and explain design choices, including constraints, and audiences. |
|
CSF.AP.8.h
Reflect and discuss collaborative experience with team. |
|
CSF.CSY.1.a
Provide real-world examples of abstraction in computing. |
|
CSF.CSY.1.b
Explain the role of abstraction to simplify complex systems. |
|
CSF.CSY.1.c
Identify and describe levels of abstraction between application software, system software, and hardware layers. |
|
CSF.CSY.2.a
Describe how computers receive visual data from various sensors and tools. |
|
CSF.CSY.2.b
Describe image processing techniques to include filtering, segmentation, and feature extraction. |
|
CSF.CSY.2.c
Explain how computers use pattern recognition and classify data to interpret and make decisions. |
|
CSF.CSY.2.d
Discuss ethical considerations related to the use of visual data and computer vision technologies. |
|
CSF.CSY.3.a
Describe the parts of a network diagram and how they are related. |
|
CSF.CSY.3.b
Explain the relationship between nodes, links, and other components of graphs. |
|
CSF.CSY.3.c
Explain how a computer can solve a maze, find a route on a map, and use reasoning to solve problems. |
|
CSF.CSY.4.a
Compare and contrast the learning process of humans and computers. |
|
CSF.CSY.4.b
Identify mathematical models used by supervised learning to produce classifications and predictions. |
|
CSF.CYB.1.a
Describe ways data and computing systems can be threatened by malware, ransomware, social engineering, phishing, and other cyberattacks. |
|
CSF.CYB.1.b
Compare strategies to protect data and computing systems from malware, ransomware, social engineering, phishing, and other cyberattacks. |
|
CSF.CYB.2.a
Identify common targets and perpetrators of cyberattacks. |
|
CSF.CYB.2.b
Identify ways data is automatically collected and generated that may or may not be evident to users. |
|
CSF.CYB.2.c
Describe potential vulnerabilities when using publicly available networks. |
|
CSF.CYB.2.d
Assess the impact of cyber threats on systems and people with diverse backgrounds, technical knowledge, or threat profiles. |
|
CSF.CYB.3.a
Evaluate tradeoffs between usability and security. |
|
CSF.CYB.3.b
Analyze scenarios to determine tradeoffs between usability and security. |
|
CSF.CYB.3.c
Propose recommendations for optimizing balance between usability and security in a given computing system. |
|
CSF.DA.1.a
Describe the types of data that business, industry, and government entities collect and maintain. |
|
CSF.DA.1.b
Identify privacy and consumer protection issues that impact data representation. |
|
CSF.DA.1.c
Identify real-world problems that can be addressed through data analysis. |
|
CSF.DA.1.d
Compare two real-world datasets to identify how the values of features are encoded and represented. |
|
CSF.DA.1.e
Formulate questions to decompose a problem and develop a data project plan. |
|
CSF.DA.2a
Identify methods for collecting and storing data of different data sizes. |
|
CSF.DA.2b
Evaluate the technical and ethical implications of collecting and storing data from the perspectives of users, programmers, companies, and communities. |
|
CSF.DA.2c
Identify impacts of bias in data collection and storage practices. |
|
CSF.DA.2d
Analyze the impact of data quality, quantity, diversity, and other factors on the accuracy and reliability of data visualizations. |
|
CSF.DA.2e
Research emerging technologies that have the capability to construct reasoning from stakeholder data. |
|
CSF.DA.3a
Evaluate the quality of training data: completeness, accuracy, consistency, and relevance. |
|
CSF.DA.3b
Analyze and discuss the ethical implications and social and economic impact of training data choices. |
|
CSF.DA.4a
Explain the use of training data and the role it has in the development of machine learning models. |
|
CSF.DA.4b
Explain the use of reasoning models and the role it has in the development of machine learning models. |
|
CSF.DA.4c
Identify and discuss the similarities and differences between training data and reasoning models in artificial intelligence systems. |
|
CSF.DA.5a
Formulate questions that require data collection. |
|
CSF.DA.5b
Identify appropriate data to address a predetermined question. |
|
CSF.DA.5c
Define the stages of the data cycle and the interrelationship between each stage. |
|
CSF.DA.5d
Identify and explain constraints of a data-driven approach. |
|
CSF.DA.5e
Create a computational artifact of the data analysis results. |
|
CSF.IC.1a
Identify the societal impacts of computing technologies and the various aspects of daily life and industry. |
|
CSF.IC.1b
Evaluate the effect of advances in information technology on the economy, environment, and ethics, including advancements of AI, quantum computing, and technologies. |
|
CSF.IC.1c
Examine the environmental impact of computing technologies. |
|
CSF.IC.1d
Propose strategies to address the ethical impacts and potential challenges of computing technologies. |
|
CSF.IC.2a
Identify digital tools and applications designed to monitor or regulate screen time usage. |
|
CSF.IC.2b
Evaluate the impact of screen time management on productivity and well-being. |
|
CSF.IC.2c
Examine and discuss the impact of screen time and social media on academic or workplace performance. |
|
CSF.IC.3a
Examine correlations between historical developments in computing technologies and changes in society. |
|
CSF.IC.3b
Appraise contributions of pioneers in the field of computer science. |
|
CSF.IC.3c
Explore the impact of Moore’s Law on scientific and mathematical advancements. |
|
CSF.IC.4a
Research and explain the preparation and job outlook for computer science careers. |
|
CSF.IC.4b
Examine current and future computer science career pathways involving emerging technologies. |
|
CSF.NI.1a
Identify the roles of computing devices: routers, switches, servers, and clients. |
|
CSF.NI.1b
Explain the role of Internet protocols: Hypertext Transfer Protocol Secure (HTTPS) and Transmission Control Protocol/Internet Protocol (TCP/IP) to provide reliable and secure data. |
|
CSF.NI.1c
Analyze and create network topology diagrams. |
|
CSF.NI.1d
Model how computing devices communicate via networks using TCP/IP protocols. |
|
CSF.NI.1e
Identify common problems that impact network functionality. |
|
CSF.NI.1f
Identify solutions to resolve common network issues. |
|