Standards in this Framework
Standard | Description |
---|---|
CS.1.1.1 | Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests |
CS.1.2.1 | Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made |
CS.1.2.2 | Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions |
CS.1.3.1 | Demonstrate the use of both linked lists and arrays to simplify solutions, generalizing computational problems instead of repeatedly using simple variables |
CS.1.3.2 | Compare and contrast fundamental data structures and their uses |
CS.1.4.1 | Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects |
CS.1.4.2 | Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs |
CS.1.5.1 | Systematically design and develop programs for broad audiences by incorporating feedback from users |
CS.1.5.2 | Evaluate licenses that limit or restrict the use of computational artifacts when using resources such as libraries |
CS.1.5.3 | Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities |
CS.1.5.4 | Design and develop computational artifacts while working in team roles and using collaborative tools |
CS.1.5.5 | Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs |
CS.2.1.1 | Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects |
CS.2.2.1 | Compare levels of abstraction and interactions between application software, system software, and hardware layers |
CS.2.3.1 | Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors |
CS.3.1.1 | Translate between different bit representations of real-world phenomena, such as characters, numbers, and images, e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation |
CS.3.1.2 | Evaluate the tradeoffs in how data elements are organized and where data is stored |
CS.3.2.1 | Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena |
CS.3.2.2 | Use data analysis tools and techniques to identify patterns in data representing complex systems |
CS.3.3.1 | Create computational models that represent the relationships among different elements of data collected from a phenomenon, process, or model |
CS.4.1.1 | Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices |
CS.4.1.2 | Test and refine computational artifacts to reduce bias and equity deficits |
CS.4.1.3 | Demonstrate ways a given algorithm applies to problems across disciplines |
CS.4.1.4 | Explain the potential impacts of artificial intelligence on society |
CS.4.2.1 | Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields |
CS.4.3.1 | Explain the beneficial and harmful effects that intellectual property laws can have on innovation |
CS.4.3.2 | Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users |
CS.4.3.3 | Evaluate the social and economic implications of privacy in the context of safety, law, or ethics |
CS.5.1.1 | Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing |
CS.5.2.1 | Illustrate how sensitive data can be affected by malware and other attacks |
CS.5.2.2 | Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts |
CS.5.2.3 | Compare various security measures, considering tradeoffs between the usability and security of a computing system |
CS.5.2.4 | Explain tradeoffs when selecting and implementing cybersecurity recommendations |