Standards in this Framework
|Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet.
|Model how information is disguised using different methods of encryption to secure it during transmission from one point to another.
|Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data.
|Store data using multiple encoding methods.
|Collect data using computational tools and transform the data to make it more useful and reliable.
|Refine computational models based on the data they have generated.
|Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
|Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
|Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
|Create flowcharts and/or pseudocode to address complex problems as algorithms.
|Create clearly named variables that represent different data types and perform operations on their values.
|Create procedures with parameters to organize code and make it easier to reuse.
|Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
|Incorporate existing code, media, and libraries into original programs, and give attribution.
|Systematically test and refine programs using a range of test cases.
|Document programs in order to make them easier to follow, test, and debug.
|Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
|Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
|Discuss issues of bias and accessibility in existing technologies.
|Compare the positive & negative effects of computing technologies on society.
|Collaborate with others using appropriate tools at the local, national, and/or international levels.
|Discuss the benefits and consequences of making information either public or private.
|Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
|Design projects that combine hardware and software components to collect and exchange data.
|Identify and fix problems with computing devices and their components systematically.