Standards in this Framework
| Standard | Description |
|---|---|
| 9.NI.1 | Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). |
| 10.NI.1 | Identify and define different network connection types (e.g., wifi, mobile data, ethernet). |
| 11.NI.1 | Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet). |
| 12.NI.1 | Choose an appropriate network connection given a scenario or situation. |
| 9.NI.2 | Understand the implications of accessing publicly available Internet connections. |
| 10.NI.2 | Identify networkable devices. |
| 11.NI.2 | Understand the global impact of networkable devices. |
| 12.NI.2 | Compare and contrast the benefits and security risks of networkable devices. |
| 9.HS.1 | Compare and contrast appropriate device/hardware/software to complete a task. |
| 9.HS.2 | Define software and security patches/update. |
| 10.HS.2 | Recognize the importance of and effectively perform software and security patches/updates. |
| 11.HS.2 | Identify and choose hardware and software to help protect a system. |
| 9.HS.3 | Explain why a backup is necessary. |
| 10.HS.3 | Identify important data or systems that need redundancy. |
| 11.HS.3 | Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). |
| 12.HS.3 | Implement redundancy. |
| 9.T.1 | Describe basic hardware and software problems using appropriate and accurate terminology. |
| 10.T.1 | Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. |
| 12.T.1 | Implement systematic troubleshooting strategies to identify and fix errors. |
| 9.PSA.1 | Identify, recognize, and use an algorithm to solve a complex problem across disciplines. |
| 10.PSA.1 | Create and test an algorithm to solve a complex problem across disciplines. |
| 11.PSA.1 | Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made. |
| 12.PSA.1 | Use and adapt common algorithms to solve computational problems. |
| 9.DCA.1 | Collect and analyze complex data. |
| 10.DCA.1 | Represent complex data in more than one way to support a claim. |
| 11.DCA.1 | Represent complex data in multiple ways to defend a student-generated claim. |
| 12.DCA.1 | Represent complex data using interactive data visualizations or computational models. |
| 9.A.1 | Plan and employ effective research strategies to locate information. |
| 10.A.1 | Curate relevant information from digital resources using a variety of tools and methods. |
| 11.A.1 | Devise new search strategies based on information gaps and new understanding. |
| 12.A.1 | Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions. |
| 9.E.1 | Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources. |
| 10.E.1 | Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. |
| 11.E.1 | Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. |
| 12.E.1 | Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources. |
| 9.C.1 | Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea. |
| 10.C.1 | Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication. |
| 11.C.1 | Publish or present content that customizes the message and medium for their intended audiences to communicate their idea. |
| 12.C.1 | Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process. |
| 9.IP.1 | Properly use copyrighted works, works in the creative commons, and works in the public domain. |
| 10.IP.1 | Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property. |
| 11.IP.1 | Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration. |
| 12.IP.1 | Debate laws and regulations that impact the development and use of software. |
| 9.IP.2 | Cite sources in a standard format to ethically reference the intellectual property of others. |
| 9.IP.3 | Engage in positive, safe, legal and ethical behavior when using technology. |
| 11.IP.3 | Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics. |
| 9.IC.1 | Evaluate how technology has impacted the workforce positively and negatively. |
| 10.IC.1 | Evaluate the social, personal, and economic implications technology has on society and the economy. |
| 11.IC.1 | Explain how computing may change cultural aspects of society. |
| 12.IC.1 | Predict how computing may impact the workplace and personal lives. |
| 9.SI.1 | Identify how technology has affected our means of communication. |
| 10.SI.1 | Evaluate the impacts of technology on social interactions. |
| 11.SI.1 | Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society |
| 12.SI.1 | Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society. |
| 9.SE.1 | Recognize the effects sharing information online can have on others' privacy. |
| 10.SE.1 | Implement best practices to secure personal information. |
| 11.SE.1 | Understand encryption and how it is used to protect data. |
| 9.SE.2 | Know how to modify account settings to protect privacy and security. |
| 10.SE.2 | Recognize the importance of monitoring your private data. |
| 11.SE.2 | Explain the privacy concerns related to the collection and generation of data through automated processes. |
| 12.SE.2 | Illustrate how sensitive data can be affected by malware and other attacks. |
| 9.SE.3 | Recognize that datacollection technology can be used to track navigation online. |
| 10.SE.3 | Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors. |
| 9.SE.4 | Describe ways to prevent identity theft. |
| 10.SE.4 | Identify if their private data has been altered and can react appropriately. |
| 11.SE.4 | Develop a plan to recover from an incident that was tied to unauthorized access. |
| 9.RU.1 | Apply cyberbullying prevention strategies. |
| 9.RU.2 | Apply safe and ethical behaviors to personal electronic communication and interaction. |
| 9.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 10.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 11.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 12.RU.4 | Understand the purpose of and comply with Acceptable Use Policies. |
| 9.DI.1 | Manage a digital identity and be aware of the permanence of actions in the digital world. |