Please enable JavaScript to use CodeHS

Standards Framework

for Montana 9-12

57

Standards in this Framework

Standard Description
CS.AP.9-12.1 create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests;
CS.AP.9-12.2 describe how artificial intelligence drives many software and physical systems;
CS.AP.9-12.3 implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem;
CS.AP.9-12.4 use and adapt classic algorithms to solve computational problems;
CS.AP.9-12.5 evaluate algorithms in terms of their efficiency, correctness, and clarity;
CS.AP.9-12.6 use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables;
CS.AP.9-12.7 compare and contrast fundamental data structures and their uses;
CS.AP.9-12.8 justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made;
CS.AP.9-12.9 design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions;
CS.AP.9-12.10 decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects;
CS.AP.9-12.11 create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs;
CS.AP.9-12.12 construct solutions to problems using student-created procedures, modules, or objects;
CS.AP.9-12.13 analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution;
CS.AP.9-12.14 demonstrate code reuse by creating programming solutions using libraries and application programming interfaces;
CS.AP.9-12.15 systematically design and develop programs for broad audiences by incorporating feedback from users;
CS.AP.9-12.16 evaluate and refine computational artifacts to make them more usable and accessible;
CS.AP.9-12.17 design and develop computational artifacts working in team roles using collaborative tools;
CS.AP.9-12.18 document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs;
CS.AP.9-12.19 plan and develop programs for broad audiences using a software life cycle process;
CS.AP.9-12.20 explain security issues that might lead to compromised computer programs;
CS.AP.9-12.21 develop programs for multiple computing platforms;
CS.AP.9-12.22 use version control systems, integrated development environments, and collaborative tools and practices in a group software project;
CS.AP.9-12.23 develop and use a series of test cases to verify that a program performs according to its design specifications;
CS.AP.9-12.24 modify an existing program to add additional functionality and discuss intended and unintended implications;
CS.AP.9-12.25 evaluate key qualities of a program through a process such as a code review; and
CS.AP.9-12.26 compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
CS.CS.9-12.1 explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects;
CS.CS.9-12.2 compare levels of abstraction and interactions between application software, system software, and hardware layers;
CS.CS.9-12.3 categorize the roles of operating system software;
CS.CS.9-12.4 develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and
CS.CS.9-12.5 illustrate ways computing systems implement logic, input, and output through hardware components.
CS.DA.9-12.1 create interactive data visualizations using software tools to help others better understand authentic phenomena;
CS.DA.9-12.2 use data analysis tools and techniques to identify patterns in data representing complex systems;
CS.DA.9-12.3 select data collection tools and techniques to generate data sets that support a claim or communicate information;
CS.DA.9-12.4 translate between different bit representations of authentic phenomena, including characters, numbers, and images;
CS.DA.9-12.5 evaluate the tradeoffs in how data elements are organized and where data is stored;
CS.DA.9-12.6 create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and
CS.DA.9-12.7 evaluate the ability of models and simulations to test and support the refinement of hypotheses.
CS.IC.9-12.1 evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices;
CS.IC.9-12.2 evaluate the ways computing technologies impact American Indian communities in Montana;
CS.IC.9-12.3 test and refine computational artifacts to reduce bias and equity deficits;
CS.IC.9-12.4 demonstrate ways a given algorithm applies to problems across disciplines;
CS.IC.9-12.5 evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society;
CS.IC.9-12.6 evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities;
CS.IC.9-12.7 predict how computational innovations that have revolutionized aspects of our culture might evolve;
CS.IC.9-12.8 use tools and methods to connect and work with others on a project including people in different cultures and career fields;
CS.IC.9-12.9 explain the beneficial and harmful effects that intellectual property laws can have on innovation;
CS.IC.9-12.10 explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;
CS.IC.9-12.11 evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and
CS.IC.9-12.12 debate laws and regulations that impact the development and use of software.
CS.NI.9-12.1 recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts;
CS.NI.9-12.2 explain tradeoffs when selecting and implementing cybersecurity recommendations;
CS.NI.9-12.3 compare ways software developers protect devices and information from unauthorized access;
CS.NI.9-12.4 evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology;
CS.NI.9-12.5 give examples to illustrate how sensitive data can be affected by malware and other attacks;
CS.NI.9-12.6 compare various security measures, considering tradeoffs between the usability and security of a computing system; and
CS.NI.9-12.7 discuss the issues that impact functionality.