Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons | 
|---|---|
| 9.NI.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). | 
 | 
| 10.NI.1 Identify and define different network connection types (e.g., wifi, mobile data, ethernet). | 
 | 
| 11.NI.1 Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet). | 
 | 
| 12.NI.1 Choose an appropriate network connection given a scenario or situation. | 
 | 
| 9.NI.2 Understand the implications of accessing publicly available Internet connections. | 
 | 
| 10.NI.2 Identify networkable devices. | 
 | 
| 11.NI.2 Understand the global impact of networkable devices. | 
 | 
| 12.NI.2 Compare and contrast the benefits and security risks of networkable devices. | 
 | 
| 9.HS.1 Compare and contrast appropriate device/hardware/software to complete a task. | 
 | 
| 9.HS.2 Define software and security patches/update. | 
 | 
| 10.HS.2 Recognize the importance of and effectively perform software and security patches/updates. | 
 | 
| 11.HS.2 Identify and choose hardware and software to help protect a system. | 
 | 
| 9.HS.3 Explain why a backup is necessary. | 
 | 
| 10.HS.3 Identify important data or systems that need redundancy. |  | 
| 11.HS.3 Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). | 
 | 
| 12.HS.3 Implement redundancy. |  | 
| 9.T.1 Describe basic hardware and software problems using appropriate and accurate terminology. | 
 | 
| 10.T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. | 
 | 
| 12.T.1 Implement systematic troubleshooting strategies to identify and fix errors. | 
 | 
| 9.PSA.1 Identify, recognize, and use an algorithm to solve a complex problem across disciplines. | 
 | 
| 10.PSA.1 Create and test an algorithm to solve a complex problem across disciplines. | 
 | 
| 11.PSA.1 Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made. |  | 
| 12.PSA.1 Use and adapt common algorithms to solve computational problems. | 
 | 
| 9.DCA.1 Collect and analyze complex data. |  | 
| 10.DCA.1 Represent complex data in more than one way to support a claim. |  | 
| 11.DCA.1 Represent complex data in multiple ways to defend a student-generated claim. |  | 
| 12.DCA.1 Represent complex data using interactive data visualizations or computational models. |  | 
| 9.A.1 Plan and employ effective research strategies to locate information. | 
 | 
| 10.A.1 Curate relevant information from digital resources using a variety of tools and methods. | 
 | 
| 11.A.1 Devise new search strategies based on information gaps and new understanding. |  | 
| 12.A.1 Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions. |  | 
| 9.E.1 Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources. | 
 | 
| 10.E.1 Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. | 
 | 
| 11.E.1 Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. | 
 | 
| 12.E.1 Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources. | 
 | 
| 9.C.1 Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea. | 
 | 
| 10.C.1 Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication. | 
 | 
| 11.C.1 Publish or present content that customizes the message and medium for their intended audiences to communicate their idea. | 
 | 
| 12.C.1 Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process. | 
 | 
| 9.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain. | 
 | 
| 10.IP.1 Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property. | 
 | 
| 11.IP.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration. | 
 | 
| 12.IP.1 Debate laws and regulations that impact the development and use of software. | 
 | 
| 9.IP.2 Cite sources in a standard format to ethically reference the intellectual property of others. | 
 | 
| 9.IP.3 Engage in positive, safe, legal and ethical behavior when using technology. | 
 | 
| 11.IP.3 Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics. | 
 | 
| 9.IC.1 Evaluate how technology has impacted the workforce positively and negatively. | 
 | 
| 10.IC.1 Evaluate the social, personal, and economic implications technology has on society and the economy. | 
 | 
| 11.IC.1 Explain how computing may change cultural aspects of society. | 
 | 
| 12.IC.1 Predict how computing may impact the workplace and personal lives. | 
 | 
| 9.SI.1 Identify how technology has affected our means of communication. | 
 | 
| 10.SI.1 Evaluate the impacts of technology on social interactions. | 
 | 
| 11.SI.1 Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society | 
 | 
| 12.SI.1 Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society. | 
 | 
| 9.SE.1 Recognize the effects sharing information online can have on others' privacy. | 
 | 
| 10.SE.1 Implement best practices to secure personal information. | 
 | 
| 11.SE.1 Understand encryption and how it is used to protect data. |  | 
| 9.SE.2 Know how to modify account settings to protect privacy and security. | 
 | 
| 10.SE.2 Recognize the importance of monitoring your private data. | 
 | 
| 11.SE.2 Explain the privacy concerns related to the collection and generation of data through automated processes. |  | 
| 12.SE.2 Illustrate how sensitive data can be affected by malware and other attacks. |  | 
| 9.SE.3 Recognize that datacollection technology can be used to track navigation online. | 
 | 
| 10.SE.3 Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors. | 
 | 
| 9.SE.4 Describe ways to prevent identity theft. |  | 
| 10.SE.4 Identify if their private data has been altered and can react appropriately. |  | 
| 11.SE.4 Develop a plan to recover from an incident that was tied to unauthorized access. |  | 
| 9.RU.1 Apply cyberbullying prevention strategies. | 
 | 
| 9.RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. | 
 | 
| 9.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 10.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 11.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 12.RU.4 Understand the purpose of and comply with Acceptable Use Policies. | 
 | 
| 9.DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. | 
 |