Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons |
|---|---|
|
DLCS25.8.1
Utilize a programming language to create algorithms that include sequencing, selection, and iteration. |
|
|
DLCS25.8.2
Design multi-branched flowcharts and corresponding pseudocode. |
|
|
DLCS25.8.3
Evaluate programs containing nested logic by applying relational and logical operators to trace conditions, and debug when those conditions do not behave as expected. |
|
|
DLCS25.8.4
Decompose a problem into multiple parts to identify each part’s functionality and support maintenance and future improvements. |
|
|
DLCS25.8.5
Create reusable functions that include inputs to change how the function works and explain how using functions makes code easier to reuse and understand. |
|
|
DLCS25.8.6
Improve an existing program by adding new features or increase its efficiency. |
|
|
DLCS25.8.7
Explain how software is developed, tested, and maintained to ensure quality. |
|
|
DLCS25.8.8
Design a data store and apply validation techniques. |
|
|
DLCS25.8.9
Explain how binary data is used in computing systems to represent and process different types of information. |
|
|
DLCS25.8.10
Explain how data size and format affect storage and performance. |
|
|
DLCS25.8.11
Use digital tools or visualizations to analyze datasets, detect anomalies, and develop narratives based on findings. |
|
|
DLCS25.8.12
Explain how AI systems use data to make decisions and predictions. [AI] |
|
|
DLCS25.8.13
Develop a model or simulation and evaluate its accuracy and limitations. |
|
|
DLCS25.8.14
Create a diagram of a network to meet specific needs, including modems, routers, and servers. |
|
|
DLCS25.8.15
Explain how data is broken into packets, sent across the Internet, and reassembled, including how multiple protocols work together for communication. |
|
|
DLCS25.8.16
Explain how cloud computing enables data access, including the advantages and limitations of technologies that enable data access. |
|
|
DLCS25.8.17
Dissect a previously occurred cybersecurity breach, identify failure points, and explain how better safeguards could have prevented the attack. |
|
|
DLCS25.8.18
Evaluate cybersecurity risks across networks, applications, and cloud-based systems and recommend improvements. |
|
|
DLCS25.8.19
Create a personal cybersecurity plan which includes identifying online risks, evaluating their own digital footprint, adjusting privacy settings, and describing steps to protect their accounts and personal information. |
|
|
DLCS25.8.20
Demonstrate how hardware components work together in the data processing cycle to perform computing tasks. |
|
|
DLCS25.8.21
Complete a project by combining multiple software applications. |
|
|
DLCS25.8.22
Evaluate the advantages and disadvantages of open-source and proprietary software in different scenarios. |
|
|
DLCS25.8.23
Research and report on the responsibilities of various careers that use computer science expertise. |
|
|
DLCS25.8.24
Demonstrate safe, legal, and ethical habits when creating and sharing digital content. |
|
|
DLCS25.8.25
Evaluate ethical dimensions and societal impacts of AI technologies. [AI] |
|
|
DLCS25.8.26
Analyze how computing technologies impact laws and influence social structures over time. |
|
|
DLCS25.8.27
Research the use of emerging technologies in everyday life, and report on their benefits and limitations. [AI] |
|
|
DLCS25.8.28
Design and implement solutions that address specific accessibility needs, considering feedback and making adjustments. |
|
|
DLCS25.8.29
Research and report on provisions of the Americans with Disabilities Act (ADA) regarding the accessibility of technology. |
|
|
DLCS25.8.30
Synthesize information from credible sources to create an original product. |
|
|
DLCS25.8.31
Explain how digital manipulation influences actions, perceptions, and public opinion. [AI] |
|
|
DLCS25.8.32
Develop strategies to manage screen time, handle multitasking, and balance the use of technology in daily life. |
|
|
DLCS25.8.33
Evaluate the effectiveness of digital tools for communication and project-based collaboration. |
|
|
DLCS25.8.34
Compose professional emails and presentations, demonstrating clear purpose, tone, and etiquette across digital platforms. |
|
|
DLCS25.8.35
Produce new content through guided collaboration with AI systems. [AI] |
|
|
DLCS25.8.36
Input text at a rate of 35 words per minute via keyboard or alternative text input method. |
|