Standards in this Framework
Standard | Description |
---|---|
9.NI.1 | Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). |
10.NI.1 | Identify and define different network connection types (e.g., wifi, mobile data, ethernet). |
11.NI.1 | Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet). |
12.NI.1 | Choose an appropriate network connection given a scenario or situation. |
9.NI.2 | Understand the implications of accessing publicly available Internet connections. |
10.NI.2 | Identify networkable devices. |
11.NI.2 | Understand the global impact of networkable devices. |
12.NI.2 | Compare and contrast the benefits and security risks of networkable devices. |
9.HS.1 | Compare and contrast appropriate device/hardware/software to complete a task. |
9.HS.2 | Define software and security patches/update. |
10.HS.2 | Recognize the importance of and effectively perform software and security patches/updates. |
11.HS.2 | Identify and choose hardware and software to help protect a system. |
9.HS.3 | Explain why a backup is necessary. |
10.HS.3 | Identify important data or systems that need redundancy. |
11.HS.3 | Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). |
12.HS.3 | Implement redundancy. |
9.T.1 | Describe basic hardware and software problems using appropriate and accurate terminology. |
10.T.1 | Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. |
12.T.1 | Implement systematic troubleshooting strategies to identify and fix errors. |
9.PSA.1 | Identify, recognize, and use an algorithm to solve a complex problem across disciplines. |
10.PSA.1 | Create and test an algorithm to solve a complex problem across disciplines. |
11.PSA.1 | Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made. |
12.PSA.1 | Use and adapt common algorithms to solve computational problems. |
9.DCA.1 | Collect and analyze complex data. |
10.DCA.1 | Represent complex data in more than one way to support a claim. |
11.DCA.1 | Represent complex data in multiple ways to defend a student-generated claim. |
12.DCA.1 | Represent complex data using interactive data visualizations or computational models. |
9.A.1 | Plan and employ effective research strategies to locate information. |
10.A.1 | Curate relevant information from digital resources using a variety of tools and methods. |
11.A.1 | Devise new search strategies based on information gaps and new understanding. |
12.A.1 | Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions. |
9.E.1 | Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources. |
10.E.1 | Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. |
11.E.1 | Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. |
12.E.1 | Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources. |
9.C.1 | Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea. |
10.C.1 | Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication. |
11.C.1 | Publish or present content that customizes the message and medium for their intended audiences to communicate their idea. |
12.C.1 | Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process. |
9.IP.1 | Properly use copyrighted works, works in the creative commons, and works in the public domain. |
10.IP.1 | Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property. |
11.IP.1 | Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration. |
12.IP.1 | Debate laws and regulations that impact the development and use of software. |
9.IP.2 | Cite sources in a standard format to ethically reference the intellectual property of others. |
9.IP.3 | Engage in positive, safe, legal and ethical behavior when using technology. |
11.IP.3 | Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics. |
9.IC.1 | Evaluate how technology has impacted the workforce positively and negatively. |
10.IC.1 | Evaluate the social, personal, and economic implications technology has on society and the economy. |
11.IC.1 | Explain how computing may change cultural aspects of society. |
12.IC.1 | Predict how computing may impact the workplace and personal lives. |
9.SI.1 | Identify how technology has affected our means of communication. |
10.SI.1 | Evaluate the impacts of technology on social interactions. |
11.SI.1 | Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society |
12.SI.1 | Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society. |
9.SE.1 | Recognize the effects sharing information online can have on others' privacy. |
10.SE.1 | Implement best practices to secure personal information. |
11.SE.1 | Understand encryption and how it is used to protect data. |
9.SE.2 | Know how to modify account settings to protect privacy and security. |
10.SE.2 | Recognize the importance of monitoring your private data. |
11.SE.2 | Explain the privacy concerns related to the collection and generation of data through automated processes. |
12.SE.2 | Illustrate how sensitive data can be affected by malware and other attacks. |
9.SE.3 | Recognize that datacollection technology can be used to track navigation online. |
10.SE.3 | Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors. |
9.SE.4 | Describe ways to prevent identity theft. |
10.SE.4 | Identify if their private data has been altered and can react appropriately. |
11.SE.4 | Develop a plan to recover from an incident that was tied to unauthorized access. |
9.RU.1 | Apply cyberbullying prevention strategies. |
9.RU.2 | Apply safe and ethical behaviors to personal electronic communication and interaction. |
9.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
10.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
11.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
12.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
9.DI.1 | Manage a digital identity and be aware of the permanence of actions in the digital world. |