Standards in this Framework
Standard | Description |
---|---|
9.AP.1a | Decompose a problem or process into sub-components. |
9.AP.1b | Recognize characteristics or patterns to determine commonalities. |
9.AP.1c | Abstract relevant information to identify essential details. |
9.AP.1d | Use pseudocode and/or flowcharts to address complex problems as algorithms. |
9.AP.2a | Identify the goal and objectives of the program. |
9.AP.2b | Plan for the design or prototype of the program. |
9.AP.2c | Develop an outline for the program’s functionality. |
9.AP.2d | Engage with peers to collect feedback on relevant aspects. |
9.AP.3a | Read and interpret algorithms expressed using plain language, pseudocode, and block-based or text-based programming languages. |
9.AP.3b | Create an algorithm using plain language, pseudocode, or diagrams. |
9.AP.3c | Implement programs that accept input values, use variables, and produce output. |
9.AP.3d | Write and test algorithms using block-based or text-based programming languages. |
9.AP.4a | Trace a program for accuracy. |
9.AP.4b | Analyze and describe the results of a program for validity. |
9.AP.4c | Revise and improve an algorithm to resolve errors or produce desired outcomes. |
9.AP.4d | Document programs to improve the ability to trace, test, and debug. |
9.CSY.1a | Explain the structure and function of hardware and software in computing devices. |
9.CSY.1b | Describe the interactions of hardware and software in computing systems. |
9.CSY.1c | Evaluate the usability of hardware and software from different perspectives. |
9.CSY.2a | Abstract the problems with computing devices and apply appropriate troubleshooting strategies. |
9.CSY.2b | Propose and implement solutions to a variety of hardware and software problems. |
9.CYB.1a | Describe how cyber-attacks can affect a computing system |
9.CYB.1b | Compare and contrast safe and unsafe computing practices. |
9.CYB.1c | Explore how industries and emerging technologies are addressing cyber solutions. |
9.CYB.1d | Model common prevention practices for cyber-attacks. |
9.DA.1a | Identify and use computing technologies to collect data sets. |
9.DA.1b | Evaluate data sets and visualizations for limitations, reliability, and bias. |
9.DA.1c | Identify encoding schemes used to represent similar data. |
9.DA.1d | Transform data utilizing decomposition, pattern recognition, and abstraction to make inferences, predictions, and decisions about real-world phenomena. |
9.DA.1e | Explore how machine learning, Artificial Intelligence (AI), and emerging technologies automate data analysis. |
9.IC.1a | Compare and contrast the benefits and risks of everyday use of computing technologies and their influences on daily life and society. |
9.IC.1b | Discuss issues of digital citizenship, ethics, bias, and accessibility in relation to computing technologies and the Internet. |
9.IC.1c | Identify and describe significant historical figures that made an impact in the computer science field. |
9.IC.2a | Investigate physical health effects associated with excessive screen time to include risk of obesity and related health issues. |
9.IC.2b | Investigate social and emotional effects associated with excessive screen time to include development of social skills and emotional intelligence. |
9.IC.2c | Investigate cognitive effects associated with excessive screen time to include the impact on attention span, concentration, and ability to focus. |
9.IC.2d | Analyze and differentiate between the use of technology and screen time for instructional benefits compared to recreational activities. |
9.IC.2e | Synthesize and report findings of the screen time usage and impact on one’s mental and physical health. |
9.IC.3a | Research computer science and information technology career pathways. |
9.IC.3b | Discuss careers that use computer science skills and practices. |
9.NI.1a | Explain the role of networks and the Internet in different computing contexts: gaming, web browsing, communication, streaming, or other common use cases. |
9.NI.1b | Identify and describe hardware and software components that make up the Internet. |
9.NI.1c | Explain how hardware and software components can be combined to collect and exchange data. |
9.NI.1d | Compare and contrast different methods of data transfer. |