Please enable JavaScript to use CodeHS

North Dakota 9-12 Framework

Standards

Standard Description
9.NI.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). Lessons
10.NI.1 Identify and define different network connection types (e.g., wifi, mobile data, ethernet). Lessons
11.NI.1 Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet). Lessons
12.NI.1 Choose an appropriate network connection given a scenario or situation. Lessons
9.NI.2 Understand the implications of accessing publicly available Internet connections. Lessons
10.NI.2 Identify networkable devices. Lessons
11.NI.2 Understand the global impact of networkable devices. Lessons
12.NI.2 Compare and contrast the benefits and security risks of networkable devices. Lessons
9.HS.1 Compare and contrast appropriate device/hardware/software to complete a task. Lessons
9.HS.2 Define software and security patches/update. Lessons
10.HS.2 Recognize the importance of and effectively perform software and security patches/updates. Lessons
11.HS.2 Identify and choose hardware and software to help protect a system. Lessons
9.HS.3 Explain why a backup is necessary. Lessons
10.HS.3 Identify important data or systems that need redundancy. Lessons
11.HS.3 Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). Lessons
12.HS.3 Implement redundancy. Lessons
9.T.1 Describe basic hardware and software problems using appropriate and accurate terminology. Lessons
10.T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. Lessons
12.T.1 Implement systematic troubleshooting strategies to identify and fix errors. Lessons
9.PSA.1 Identify, recognize, and use an algorithm to solve a complex problem across disciplines. Lessons
10.PSA.1 Create and test an algorithm to solve a complex problem across disciplines. Lessons
11.PSA.1 Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made. Lessons
12.PSA.1 Use and adapt common algorithms to solve computational problems. Lessons
9.DCA.1 Collect and analyze complex data. Lessons
10.DCA.1 Represent complex data in more than one way to support a claim. Lessons
11.DCA.1 Represent complex data in multiple ways to defend a student-generated claim. Lessons
12.DCA.1 Represent complex data using interactive data visualizations or computational models. Lessons
9.A.1 Plan and employ effective research strategies to locate information. Lessons
10.A.1 Curate relevant information from digital resources using a variety of tools and methods. Lessons
11.A.1 Devise new search strategies based on information gaps and new understanding. Lessons
12.A.1 Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions. Lessons
9.E.1 Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources. Lessons
10.E.1 Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. Lessons
11.E.1 Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. Lessons
12.E.1 Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources. Lessons
9.C.1 Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea. Lessons
10.C.1 Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication. Lessons
11.C.1 Publish or present content that customizes the message and medium for their intended audiences to communicate their idea. Lessons
12.C.1 Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process. Lessons
9.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain. Lessons
10.IP.1 Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property. Lessons
11.IP.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration. Lessons
12.IP.1 Debate laws and regulations that impact the development and use of software. Lessons
9.IP.2 Cite sources in a standard format to ethically reference the intellectual property of others. Lessons
9.IP.3 Engage in positive, safe, legal and ethical behavior when using technology. Lessons
11.IP.3 Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics. Lessons
9.IC.1 Evaluate how technology has impacted the workforce positively and negatively. Lessons
10.IC.1 Evaluate the social, personal, and economic implications technology has on society and the economy. Lessons
11.IC.1 Explain how computing may change cultural aspects of society. Lessons
12.IC.1 Predict how computing may impact the workplace and personal lives. Lessons
9.SI.1 Identify how technology has affected our means of communication. Lessons
10.SI.1 Evaluate the impacts of technology on social interactions. Lessons
11.SI.1 Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society Lessons
12.SI.1 Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society. Lessons
9.SE.1 Recognize the effects sharing information online can have on others' privacy. Lessons
10.SE.1 Implement best practices to secure personal information. Lessons
11.SE.1 Understand encryption and how it is used to protect data. Lessons
9.SE.2 Know how to modify account settings to protect privacy and security. Lessons
10.SE.2 Recognize the importance of monitoring your private data. Lessons
11.SE.2 Explain the privacy concerns related to the collection and generation of data through automated processes. Lessons
12.SE.2 Illustrate how sensitive data can be affected by malware and other attacks. Lessons
9.SE.3 Recognize that datacollection technology can be used to track navigation online. Lessons
10.SE.3 Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors. Lessons
9.SE.4 Describe ways to prevent identity theft. Lessons
10.SE.4 Identify if their private data has been altered and can react appropriately. Lessons
11.SE.4 Develop a plan to recover from an incident that was tied to unauthorized access. Lessons
9.RU.1 Apply cyberbullying prevention strategies. Lessons
9.RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. Lessons
9.RU.4 Understand the purpose of and comply with Acceptable Use Policies. Lessons
10.RU.4 Understand the purpose of and comply with Acceptable Use Policies. Lessons
11.RU.4 Understand the purpose of and comply with Acceptable Use Policies. Lessons
12.RU.4 Understand the purpose of and comply with Acceptable Use Policies. Lessons
9.DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. Lessons