Please enable JavaScript to use CodeHS

South Carolina Information Systems Framework

Standards

Standard Description
A.1 Review school safety policies and procedures. Lessons
A.2 Review classroom safety rules and procedures. Lessons
A.3 Review safety procedures for using equipment in the classroom. Lessons
A.4 Identify major causes of work-related accidents in office environments. Lessons
A.5 Demonstrate safety skills in an office/work environment. Lessons
B.1 Identify the purpose and goals of a Career and Technology Student Organization (CTSO). Lessons
B.2 Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. Lessons
B.3 Explain the benefits and responsibilities of being a member of a CTSO. Lessons
B.4 List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. Lessons
B.5 Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. Lessons
C.1 Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation. Lessons
C.2 Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. Lessons
C.3 Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. Lessons
C.4 Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). Lessons
C.5 Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, Creative Commons, photographs, documents, video, sounds, music, trademarks, and other elements for personal use. Lessons
C.6 Describe ethical and legal practices of safeguarding the confidentiality of business-related information. Lessons
C.7 Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. Lessons
D.1 Demonstrate creativity and innovation. Lessons
D.2 Demonstrate critical thinking and problem-solving skills. Lessons
D.3 Demonstrate initiative and self-direction. Lessons
D.4 Demonstrate integrity. Lessons
D.5 Demonstrate work ethic. Lessons
D.6 Demonstrate conflict resolution. Lessons
D.7 Demonstrate listening and speaking skills. Lessons
D.8 Demonstrate respect for diversity. Lessons
D.9 Demonstrate customer service orientation. Lessons
D.10 Demonstrate teamwork. Lessons
E.1 Demonstrate global or “big picture” thinking Lessons
E.2 Demonstrate career and life management skills and goal-making. Lessons
E.3 Demonstrate continuous learning and adaptability skills to changing job requirements Lessons
E.4 Demonstrate time and resource management skills. Lessons
E.5 Demonstrates information literacy skills. Lessons
E.6 Demonstrates information security skills Lessons
E.7 Demonstrates information technology skills. Lessons
E.8 Demonstrates knowledge and use of job-specific tools and technologies. Lessons
E.9 Demonstrate job-specific mathematics skills. Lessons
E.10 Demonstrates professionalism in the workplace. Lessons
E.11 Demonstrates reading and writing skills. Lessons
E.12 Demonstrates workplace safety. Lessons
F.1 Explain the differences between Information Technology and Information Systems Lessons
F.2 Summarize how and why information systems are used today Lessons
F.3 Create an infographic/chart summarizing the 6 Eras of Computing Lessons
F.4 Explain globalization and the role information systems have played in this evolution Lessons
F.5 Research emerging technologies that enable new forms of communication, collaboration, and partnering Lessons
F.6 Describe how to secure information systems resources, focusing on both human and technological safeguards Lessons
F.7 Construct a model of Systems Development Life Cycle (SDLC) Lessons
G.1 Explain the major components of an information systems infrastructure: computer hardware, computer software, computer networks, databases, and human resources and procedures Lessons
G.2 Explain differences and similarities between elements of an IT infrastructure solution, such as clients, servers, network devices, wired and wireless network links, systems software, and specialized security devices Lessons
G.3 Describe cloud computing and the advantages and disadvantages of its use in an organization Lessons
G.4 Create a chart or model of an information system by identifying its major components Lessons
G.5 Define the term open-source software and identify its primary characteristics Lessons
H.1 Examine and document the consequences resulting from issues involving ethics around security, privacy, identity theft, and copyright infringement Lessons
H.2 Examine and debate cases of cybercrimes related to Information Systems Lessons
H.3 Identify security vulnerabilities of a computer system, software, or hardware that can be exploited by the attacker to gain unauthorized access or compromise a system Lessons
H.4 Examine major information security issues that organizations face, as well as resources, methods, and approaches to make firms more secure Lessons
H.5 Design a model that shows the relationship between ethical, social, and political issues in an information society Lessons
H.6 Describe what the term information systems ethics means and the relevance of ethics to the field of information systems Lessons
H.7 Summarize the standards to safeguard system quality that protects the safety of the individual and society, and preserving values and institutions considered essential to the quality of life in an information society 8 Lessons
H.8 Outline the main points of Information Communication Technology (ICT) Policies Lessons
H.9 Define Information Systems Governance (ISG) Lessons
H.10 Compare and contrast the theories used to explain business ethics Lessons
I.1 Describe the earliest use of big data since the first PC was developed by IBM Lessons
I.2 Compare and contrast Big Data vs Structured Data including storage requirements, characteristics, usage, and security Lessons
I.3 Explain why Big Data is important in the 21st Century and how it’s impacted by the trends in computing such as the Internet of Things Lessons
I.4 Explain how Big Data is used to inform decisions in a variety of settings, e.g. , cybersecurity, personal, healthcare, education, retail, finance, marketing, communications, entertainment and media, and transportation Lessons
I.5 Define and describe the various data collection methods, data analysis tools, and data representation tools for Big Data Lessons
I.6 Describe the various data storage tools for Big Data in gaming and other industries Lessons
I.7 Identify and describe gaming applications that use Big Data and how they benefit from Big Data including tracking information on gamers, revenue, usage, and other information Lessons
I.8 Explain the Big Data file formats and how they are used in Industry Lessons
I.9 Describe and locate a big data set that could be used to solve a real world problem Lessons
J.1 Discuss how much of daily life is “data driven” including your student information, games, phone apps, and why data now is so important. Lessons
J.2 Identify “real world” instances where you know that your data is stored and used. Lessons
J.3 Research how structured data is organized so it becomes meaningful and can be easily retrieved and reported (analogy of a “messy” home). Lessons
J.4 Create a glossary of important database terms (i.e. character, field, record, file, primary key, foreign key, normalization, entity, relationship, attribute). Lessons
J.5 Identify the purpose of a Database Management System (DBMS). Lessons
J.6 Identify DBMS software such as, for example, Oracle, MySQL, and DB2. Lessons
J.7 Compare and contrast the use of spreadsheets and the use of a DBMS. a. Give examples of the benefits of a DBMS. b. Give examples of DBMS systems. c. Identify when it is appropriate to use a Spreadsheet vs a DBMS Lessons
J.8 Transform datasets into structured normalized data using 1st Normal Form, 2nd Normal Form, and 3rd Normal form (Codd). Lessons
J.9 Identify the following from a raw unstructured CSV or TXT file: a. Extract information about entities (tables/noun) from a raw (unstructured) file such as a CSV file. b. Define the attributes (fields/adjective) of an entity. c. Document the relationship (parent/child, 1-1, 1-many) between the entities. d. Normalize to 3NF the entities and their attributes. Lessons
J.10 Using a downloaded csv or txt file from a legitimate website, construct data models. Lessons
J.11 Draw the data model using a cloud based tool such as Draw.io using entities and their attributes and identify pk/fk pairs. Lessons
J.12 Implement the data models using for example, MySQL, MS Access or another DBMS tool including: a. normalized tables; b. relationships between the tables using primary keys and foreign keys; c. indexes to speed sorts and searching; d. constraints at both the table and field levels Lessons
K.1 Illustrate and quantify how much time a day, a week, a month a typical high school student consumes data. Lessons
K.2 Categorize and research various data collection tools including: a. questionnaires b. surveys c. interviews d. tests e. sensors f. geocoding Lessons
K.3 Describe what should be considered to collect detailed, meaningful data. Lessons
K.4 Design a data collection method and specify the target audience for a real life situation. Lessons
K.5 Evaluate the importance of the collection objectives and design of the data collection tool. Lessons
K.6 Compare and contrast the difference between quantitative and qualitative information. Lessons
K.7 Collect data and store the data in a database. Lessons
K.8 Describe the various data storage tools for a. Spreadsheets including MS Excel; b. Big Data including NoSQL, Apache Hadoop, MongoDB, Azure HDInsight; c. Structured Databases like Oracle, MySQL, etc.; d. Image Hosting Lessons
K.9 Describe the various data storage formats in regards to: a. Spreadsheets; b. Big Data including NoSQL, Apache Hadoop, MongoDB, Azure HDInsight; c. Structured DBMS Lessons
K.10 Research various cloud based solutions for data collection and storage. Lessons
K.11 Implement a cloud based solution for a survey, collect the data, and pull the data into MS Access for storage and later analysis. Lessons
K.12 Describe the implications of the Internet of Things and the amount of data generated by “things” with sensors and time/stamped information. Lessons
L.1 Create data sets that could be used to explore a real world phenomenon or support a claim. Lessons
L.2 Evaluate the use of large data sets to explore a real world phenomenon or support a claim. Lessons
L.3 Evaluate the limitations of a computational model and the accuracy of inferences. Lessons
L.4 Create a computational model using large data sets, make inferences, and address the limitations of the model. Lessons
M.1 Identify a data set that could be used to solve a real-world problem Lessons
M.2 Evaluate how the same data set can be visualized and reconstructed to support multiple sides of an issue Lessons
M.3 Implement a variety of built-in database functions to extract, query, aggregate, filter, sort, etc. to support and explain ideas regarding patterns and trends in data Lessons
M.4 Construct a data visualization to solve a real-world problem using software tools or programming (e.g. , generated scatter, bar, and line charts) Lessons
M.5 Analyze patterns in a data visualization then select a collection tool to validate a claim or share information with a group of people Lessons
M.6 Organize collected data to communicate the solution to a real-world phenomenon and support a claim Lessons
M.7 Compare and contrast data visualizations for exploring real-world phenomena or supporting a claim Lessons
M.8 Evaluate possible computational models for data visualizations that aid in solving a variety of problems Lessons
M.9 Create a computational model for data visualization Lessons
N.1 Research, compare, and contrast information management careers (e.g., characteristics needed, skills required, education required, industry certifications, advantages and disadvantages of information management careers, the need for information management workers, etc.). Lessons
N.2 Describe the variety of occupations and professions within the world of Information Management. Lessons
N.3 Describe job requirements for the variety of occupations and professions within the global world of information management. Lessons
N.4 Analyze personal skills and aptitudes in comparison with information management career opportunities. Lessons
N.5 Refine and implement a plan to facilitate personal growth and skill development related to information management career opportunities. Lessons