Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons | 
|---|---|
| 4803.D1.1 Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |  | 
| 4803.D1.2 Explain the benefits and responsibilities of being a member of a CTSO. |  | 
| 4803.D1.3 List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |  | 
| 4803.D1.4 Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |  | 
| 4803.D2.1 Use supporting evidence from multiple sources such as job postings and workforce data, to examine and describe careers in the career cluster and identify the roles and responsibilities of each. | 
 | 
| 4803.D2.2 Evaluate resources that keep workers current in career-related knowledge and technology for careers within the career cluster. |  | 
| 4803.D2.3 Identify employers’ expectations, appropriate work habits, ethical conduct, legal responsibilities, and good citizenship skills. | 
 | 
| 4803.D2.4 Demonstrate the qualities, attributes, and skills necessary to succeed in, or further prepare for a chosen career while effectively contributing to society. | 
 | 
| 4803.D2.5 Complete one or more career cluster aptitude/interest surveys, analyze the results, and examine how personal career aptitudes align with careers in a field or pathway of interest. |  | 
| 4803.D2.6 Distinguish differences among careers within the career cluster and identify trends related to at least five careers/pathways. |  | 
| 4803.D2.7 Explain opportunities, benefits, and risks of entrepreneurial career pathways in the career cluster. |  | 
| 4803.D2.8 Explore the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing. | 
 | 
| 4803.D2.9 Describe ethical and legal practices safeguarding the confidentiality of business-and personalrelated information. | 
 | 
| 4803.D3.1 Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise). | 
 | 
| 4803.D3.2 Define algorithm (a set of clearly defined logical steps to solve a problem). | 
 | 
| 4803.D3.3 Demonstrate an understanding of algorithms and their practical applications. | 
 | 
| 4803.D3.4 Create, evaluate, and adjust algorithms to solve a variety of problems. | 
 | 
| 4803.D3.5 Use an iterative problem-solving process to design and refine solutions to a variety of problems. | 
 | 
| 4803.D4.1 Explain the importance of Acceptable Use Policies and data and physical security. | 
 | 
| 4803.D4.2 Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society. | 
 | 
| 4803.D4.3 Evaluate methods of keeping information secret from those whom the information should be kept secret. | 
 | 
| 4803.D4.4 Evaluate methods of protecting information and information systems from disruption and destruction. | 
 | 
| 4803.D4.5 Explain the importance of encapsulating resources, i.e., creating well-defined interfaces around resources to set rules for how the resources should interact. |  | 
| 4803.D4.6 Analyze how the connected nature of the Internet allows an adversary to reach a large number of devices. | 
 | 
| 4803.D4.7 Identify and predict the outcomes of security vulnerabilities at the physical/link layer, the network layer, the transport layer, and the application layer. |  | 
| 4803.D4.8 Identify and distinguish between the purposes of network security devices and technologies. |  | 
| 4803.D4.9 Compare and contrast data protection legislation, policies, and procedures that have been or are being introduced all over the world to protect personal data. | 
 | 
| 4803.D4.10 Students will identify how hardware and software work together in complex ways to achieve and overall objective. | 
 | 
| 4803.D5.1 Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed). |  | 
| 4803.D5.2 Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. | 
 | 
| 4803.D5.3 Evaluate various solutions to common hardware and software problems. |  | 
| 4803.D5.4 Describe how software and hardware interact. | 
 | 
| 4803.D5.5 Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compresses/uncompressed files). |  | 
| 4803.D6.1 Define key computing terms (e.g., hardware, software, data, etc.). | 
 | 
| 4803.D6.2 Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.). | 
 | 
| 4803.D6.3 Define the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.). | 
 | 
| 4803.D7.1 Express the design of a program using representations such as flowcharts and pseudocode. | 
 | 
| 4803.D7.2 Analyze and explain how a particular program functions. | 
 | 
| 4803.D7.3 Solve problems of increasing complexity using visual block-based programming individually and collaboratively. | 
 | 
| 4803.D7.4 Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for). | 
 | 
| 4803.D7.5 Differentiate between text and numerical data. | 
 | 
| 4803.D7.6 Edit, compile/run, test, and debug a program. | 
 |