Standards in this Framework
|Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
|Compare levels of abstraction and interactions between application software, system software, and hardware layers
|Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
|Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, and addressing.
|Give examples to illustrate how sensitive data can be affected by malware and other attacks.
|Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
|Compare various security measures considering tradeoffs between the usability and security of a computing system.
|Explain tradeoffs when selecting and implementing cybersecurity recommendations.
|Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
|Evaluate the tradeoffs in how data elements are organized and where data is stored.
|Collect, transform, and organize data to help others better understand a problem.
|Create and evaluate computational models that represent real-world systems.
|Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
|Use lists and functions to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
|Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made.
|Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
|Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
|Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
|Systematically design and develop programs for broad audiences by incorporating feedback from users
|Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
|Evaluate and refine computational artifacts to make them more usable and accessible.
|Design and develop computational artifacts working in team roles using collaborative tools.
|Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs.
|Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
|Test and refine computational artifacts to reduce bias and equity deficits.
|Demonstrate ways a given algorithm applies to problems across disciplines.
|Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
|Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
|Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. [
|Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.