| 9-12.AP.A.1 | 
                Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.V.1 | 
                Demonstrate the use of both linked lists and arrays to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.C.1 | 
                Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.C.2 | 
                Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.M.1 | 
                Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.M.2 | 
                Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.PD.1 | 
                Systematically design and develop programs for broad audiences by incorporating feedback from users. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.PD.2 | 
                Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.PD.3 | 
                Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.PD.4 | 
                Design and develop computational artifacts working in team roles using collaborative tools. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.AP.PD.5 | 
                Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.CS.D.1 | 
                Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.CS.HS.1 | 
                Compare levels of abstraction and interactions between application software, system software, and hardware layers. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.CS.T.1 | 
                Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.DA.S.1 | 
                Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation). | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.DA.S.2 | 
                Evaluate the tradeoffs in how data elements are organized and where data is stored. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.DA.CVT.1 | 
                Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.DA.IM.1 | 
                Create computational models that represent the relationships among different elements of data collected from a phenomenon, process, or model. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.C.1 | 
                Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.C.2 | 
                Test and refine computational artifacts to reduce bias and equity deficits. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.C.3 | 
                Demonstrate ways a given algorithm applies to problems across disciplines. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.C.4 | 
                Explain the potential impacts of artificial intelligence on society. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.SI.1 | 
                Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.SLE.1 | 
                Explain the beneficial and harmful effects that intellectual property laws can have on innovation. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.SLE.2 | 
                Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.IC.SLE.3 | 
                Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.NI.NCO.1 | 
                Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.NI.C.1 | 
                Give examples to illustrate how sensitive data can be affected by malware and other attacks. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.NI.C.2 | 
                Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.NI.C.3 | 
                Compare various security measures, considering tradeoffs between the usability and security of a computing system. | 
                
                    Lessons
                 | 
            
            
            
                | 9-12.NI.C.4 | 
                Explain tradeoffs when selecting and implementing cybersecurity recommendations. | 
                
                    Lessons
                 |