Standards in this Framework
Standard | Description |
---|---|
CS.AP.9-12.1 | create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests; |
CS.AP.9-12.2 | describe how artificial intelligence drives many software and physical systems; |
CS.AP.9-12.3 | implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem; |
CS.AP.9-12.4 | use and adapt classic algorithms to solve computational problems; |
CS.AP.9-12.5 | evaluate algorithms in terms of their efficiency, correctness, and clarity; |
CS.AP.9-12.6 | use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables; |
CS.AP.9-12.7 | compare and contrast fundamental data structures and their uses; |
CS.AP.9-12.8 | justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made; |
CS.AP.9-12.9 | design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions; |
CS.AP.9-12.10 | decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects; |
CS.AP.9-12.11 | create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs; |
CS.AP.9-12.12 | construct solutions to problems using student-created procedures, modules, or objects; |
CS.AP.9-12.13 | analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution; |
CS.AP.9-12.14 | demonstrate code reuse by creating programming solutions using libraries and application programming interfaces; |
CS.AP.9-12.15 | systematically design and develop programs for broad audiences by incorporating feedback from users; |
CS.AP.9-12.16 | evaluate and refine computational artifacts to make them more usable and accessible; |
CS.AP.9-12.17 | design and develop computational artifacts working in team roles using collaborative tools; |
CS.AP.9-12.18 | document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs; |
CS.AP.9-12.19 | plan and develop programs for broad audiences using a software life cycle process; |
CS.AP.9-12.20 | explain security issues that might lead to compromised computer programs; |
CS.AP.9-12.21 | develop programs for multiple computing platforms; |
CS.AP.9-12.22 | use version control systems, integrated development environments, and collaborative tools and practices in a group software project; |
CS.AP.9-12.23 | develop and use a series of test cases to verify that a program performs according to its design specifications; |
CS.AP.9-12.24 | modify an existing program to add additional functionality and discuss intended and unintended implications; |
CS.AP.9-12.25 | evaluate key qualities of a program through a process such as a code review; and |
CS.AP.9-12.26 | compare multiple programming languages and discuss how their features make them suitable for solving different types of problems. |
CS.CS.9-12.1 | explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects; |
CS.CS.9-12.2 | compare levels of abstraction and interactions between application software, system software, and hardware layers; |
CS.CS.9-12.3 | categorize the roles of operating system software; |
CS.CS.9-12.4 | develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and |
CS.CS.9-12.5 | illustrate ways computing systems implement logic, input, and output through hardware components. |
CS.DA.9-12.1 | create interactive data visualizations using software tools to help others better understand authentic phenomena; |
CS.DA.9-12.2 | use data analysis tools and techniques to identify patterns in data representing complex systems; |
CS.DA.9-12.3 | select data collection tools and techniques to generate data sets that support a claim or communicate information; |
CS.DA.9-12.4 | translate between different bit representations of authentic phenomena, including characters, numbers, and images; |
CS.DA.9-12.5 | evaluate the tradeoffs in how data elements are organized and where data is stored; |
CS.DA.9-12.6 | create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and |
CS.DA.9-12.7 | evaluate the ability of models and simulations to test and support the refinement of hypotheses. |
CS.IC.9-12.1 | evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices; |
CS.IC.9-12.2 | evaluate the ways computing technologies impact American Indian communities in Montana; |
CS.IC.9-12.3 | test and refine computational artifacts to reduce bias and equity deficits; |
CS.IC.9-12.4 | demonstrate ways a given algorithm applies to problems across disciplines; |
CS.IC.9-12.5 | evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society; |
CS.IC.9-12.6 | evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities; |
CS.IC.9-12.7 | predict how computational innovations that have revolutionized aspects of our culture might evolve; |
CS.IC.9-12.8 | use tools and methods to connect and work with others on a project including people in different cultures and career fields; |
CS.IC.9-12.9 | explain the beneficial and harmful effects that intellectual property laws can have on innovation; |
CS.IC.9-12.10 | explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users; |
CS.IC.9-12.11 | evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and |
CS.IC.9-12.12 | debate laws and regulations that impact the development and use of software. |
CS.NI.9-12.1 | recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts; |
CS.NI.9-12.2 | explain tradeoffs when selecting and implementing cybersecurity recommendations; |
CS.NI.9-12.3 | compare ways software developers protect devices and information from unauthorized access; |
CS.NI.9-12.4 | evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology; |
CS.NI.9-12.5 | give examples to illustrate how sensitive data can be affected by malware and other attacks; |
CS.NI.9-12.6 | compare various security measures, considering tradeoffs between the usability and security of a computing system; and |
CS.NI.9-12.7 | discuss the issues that impact functionality. |