CS.D.9-12.F.a |
Identify different multifunctional computing devices and connection technologies, both virtual and physical, to describe their purpose. |
|
CS.D.9-12.F.b |
Develop and apply criteria to evaluate computing systems for a given purpose. |
|
CS.D.9-12.F.c |
Create an artifact to demonstrate the roles and interactions of computing systems embedded in everyday objects. |
|
CS.HS.9-12.F.a |
Compare and contrast interactions between application software, system software and hardware. |
-
7.1 Operating Systems
-
7.4 Software and Applications
-
11.1 Internal Components
-
11.2 Peripheral Devices
|
CS.T.9-12.F.a |
Apply a systemic process to identify problems and take steps to correct them within an integrated computing system. |
-
12.1 Methodology
-
12.2 Support Practice
|
CS.T.9-12.F.b |
Analyze an IT device to determine either what repairs are needed or how to build it. |
|
NI.N.9-12.F.a |
Evaluate and select networking devices to establish scalable communications. |
-
10.4 Internet Hardware and Sending Information
-
11.3 Network Devices
-
11.5 Network Options
|
NI.N.9-12.F.b |
Evaluate and select networking protocols to establish network communication. |
-
10.8 Packets & Protocols
-
11.6 Network Communication
|
NI.N.9-12.F.c |
Understand scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together. |
-
10.4 Internet Hardware and Sending Information
-
10.8 Packets & Protocols
-
11.3 Network Devices
-
11.5 Network Options
|
NI.C.9-12.F.a |
Examine and employ principles of cybersecurity. |
-
1.4 The CIA Triad
-
2.4 Privacy & Security
-
2.7 Hacking Ethics
-
7.6 Application Security
-
7.7 Browser Configuration
-
7.8 System Administration
-
11.6 Network Communication
-
11.7 Network Management
|
NI.C.9-12.F.b |
Identify physical, social and digital security risks to address possible attacks. |
-
1.3 Impact of Cybersecurity
-
2.4 Privacy & Security
-
7.6 Application Security
-
7.7 Browser Configuration
-
7.8 System Administration
-
8.9 Common Security Problems
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
-
11.6 Network Communication
-
11.7 Network Management
|
DA.DCS.9-12.F.a |
Analyze patterns in a real-world data store through hypothesis, testing and use of data tools to gain insight and knowledge. |
|
DA.DCS.9-12.F.b |
Investigate data storage systems to compare and contrast how data is stored and accessed. |
-
8.4 Databases
-
8.5 Clients and Servers
-
11.4 Storage Options
|
DA.VC.9-12.F.a |
Analyze the benefits and limitations of data visualization or multisensory artifacts and tools to communicate which is most appropriate to solve a real-world problem. |
|
DA.IM.9-12.F.a |
Evaluate a model by creating a hypothesis, testing it and refining it to discover connections and trends in the data. |
|
ATP.A.9-12.F.a |
Define and use appropriate problem solving strategies and visual artifacts to create and refine a solution to a realworld problem. |
|
ATP.A.9-12.F.b |
Define and implement an algorithm by decomposing problem requirements from a problem statement to solve a problem. |
-
21.1 Challenge Problems
-
23.1 Control Structures Challenges
|
ATP.VDR.9-12.F.a |
Identify types of variables and data and utilize them to create a computer program that stores data in appropriate ways. |
|
ATP.CS.9-12.F.a |
Define control structures and Boolean logic and use them to solve real-world scenarios. |
-
4.3 Looping
-
4.4 Branching
-
22.1 Booleans
-
22.2 Logical Operators
-
22.3 Comparison Operators
-
22.4 If Statements
-
22.5 For Loops in JavaScript
-
22.6 General For Loops
-
22.7 For Loop Practice
-
22.9 While Loops
-
22.10 Loop and a Half
-
23.1 Control Structures Challenges
|
ATP.CS.9-12.F.b |
Use appropriate syntax to create and use a method. |
|
ATP.CS.9-12.F.c |
Use data scoping to isolate data. |
|
ATP.M.9-12.F.a |
Break down a solution into procedures using systematic analysis and design. |
|
ATP.M.9-12.F.b |
Create computational artifacts by systematically organizing, manipulating and/or processing data |
|
ATP.PD.9-12.F.a |
Investigate software development methodologies to select the appropriate one for a project to complete as a team. |
|
ATP.PD.9-12.F.b |
Compare test methodologies to evaluate why each is used and to determine their benefits and costs. |
|
ATP.PD.9-12.F.c |
Correctly use consistent naming conventions, version control and comments to demonstrate why these are important for future use, maintenance and reuse of code. |
-
4.6 Organizational Techniques
|
IC.Cu.9-12.F.a |
Analyze new technology to predict realistic impacts on society. |
-
10.10 Impact of the Internet
|
IC.Cu.9-12.F.b |
Explore other professions to understand how computing has and will impact them positively and negatively. |
-
10.10 Impact of the Internet
|
IC.SI.9-12.F.a |
Evaluate tools to increase connectivity of people in different cultures and career fields. |
-
7.4 Software and Applications
|
IC.SI.9-12.F.b |
Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users. |
-
7.5 Software Licenses
-
7.7 Browser Configuration
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
|
IC.SLE.9-12.F.a |
Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact. |
-
1.2 What is Cybersecurity?
-
1.3 Impact of Cybersecurity
-
2.4 Privacy & Security
-
2.7 Hacking Ethics
|
IC.SLE.9-12.F.b |
Analyze the concepts of usability and security to explain typical tradeoffs between them. |
-
7.7 Browser Configuration
-
8.9 Common Security Problems
|
IC.SLE.9-12.F.c |
Analyze the collection and generation of data through automated processes to explain the legal concerns that are not always evident to users. |
-
7.5 Software Licenses
-
7.7 Browser Configuration
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
|
IC.SLE.9-12.F.d |
Explain the beneficial and harmful effects of intellectual property laws to determine the impacts on innovation. |
-
2.6 Creative Credit & Copyright
|