Please enable JavaScript to use CodeHS

Standards Framework

for North Dakota 9-12

73

Standards in this Framework

Standard Description
9.NI.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
10.NI.1 Identify and define different network connection types (e.g., wifi, mobile data, ethernet).
11.NI.1 Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet).
12.NI.1 Choose an appropriate network connection given a scenario or situation.
9.NI.2 Understand the implications of accessing publicly available Internet connections.
10.NI.2 Identify networkable devices.
11.NI.2 Understand the global impact of networkable devices.
12.NI.2 Compare and contrast the benefits and security risks of networkable devices.
9.HS.1 Compare and contrast appropriate device/hardware/software to complete a task.
9.HS.2 Define software and security patches/update.
10.HS.2 Recognize the importance of and effectively perform software and security patches/updates.
11.HS.2 Identify and choose hardware and software to help protect a system.
9.HS.3 Explain why a backup is necessary.
10.HS.3 Identify important data or systems that need redundancy.
11.HS.3 Identify different options for redundancy (e.g., cloud storage, external, duplicate devices).
12.HS.3 Implement redundancy.
9.T.1 Describe basic hardware and software problems using appropriate and accurate terminology.
10.T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors.
12.T.1 Implement systematic troubleshooting strategies to identify and fix errors.
9.PSA.1 Identify, recognize, and use an algorithm to solve a complex problem across disciplines.
10.PSA.1 Create and test an algorithm to solve a complex problem across disciplines.
11.PSA.1 Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made.
12.PSA.1 Use and adapt common algorithms to solve computational problems.
9.DCA.1 Collect and analyze complex data.
10.DCA.1 Represent complex data in more than one way to support a claim.
11.DCA.1 Represent complex data in multiple ways to defend a student-generated claim.
12.DCA.1 Represent complex data using interactive data visualizations or computational models.
9.A.1 Plan and employ effective research strategies to locate information.
10.A.1 Curate relevant information from digital resources using a variety of tools and methods.
11.A.1 Devise new search strategies based on information gaps and new understanding.
12.A.1 Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions.
9.E.1 Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources.
10.E.1 Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
11.E.1 Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
12.E.1 Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources.
9.C.1 Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea.
10.C.1 Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication.
11.C.1 Publish or present content that customizes the message and medium for their intended audiences to communicate their idea.
12.C.1 Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process.
9.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain.
10.IP.1 Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
11.IP.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration.
12.IP.1 Debate laws and regulations that impact the development and use of software.
9.IP.2 Cite sources in a standard format to ethically reference the intellectual property of others.
9.IP.3 Engage in positive, safe, legal and ethical behavior when using technology.
11.IP.3 Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics.
9.IC.1 Evaluate how technology has impacted the workforce positively and negatively.
10.IC.1 Evaluate the social, personal, and economic implications technology has on society and the economy.
11.IC.1 Explain how computing may change cultural aspects of society.
12.IC.1 Predict how computing may impact the workplace and personal lives.
9.SI.1 Identify how technology has affected our means of communication.
10.SI.1 Evaluate the impacts of technology on social interactions.
11.SI.1 Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society
12.SI.1 Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society.
9.SE.1 Recognize the effects sharing information online can have on others' privacy.
10.SE.1 Implement best practices to secure personal information.
11.SE.1 Understand encryption and how it is used to protect data.
9.SE.2 Know how to modify account settings to protect privacy and security.
10.SE.2 Recognize the importance of monitoring your private data.
11.SE.2 Explain the privacy concerns related to the collection and generation of data through automated processes.
12.SE.2 Illustrate how sensitive data can be affected by malware and other attacks.
9.SE.3 Recognize that datacollection technology can be used to track navigation online.
10.SE.3 Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors.
9.SE.4 Describe ways to prevent identity theft.
10.SE.4 Identify if their private data has been altered and can react appropriately.
11.SE.4 Develop a plan to recover from an incident that was tied to unauthorized access.
9.RU.1 Apply cyberbullying prevention strategies.
9.RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction.
9.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
10.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
11.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
12.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
9.DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world.