Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
L1.CS.D.01
Model how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
|
L1.CS.HS.01
Analyze the levels of abstraction and interactions between application software, system software, and hardware. |
|
L1.CS.T.01
Develop and apply criteria for the systematic discovery of errors and systematic strategies for the correction of errors in computing systems. |
|
L1.NI.NCO.01
Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers, etc.) and network protocols (e.g., IP, DNS). |
|
L1.NI.CY.01
Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system and the risks of an attack. |
|
L1.NI.CY.02
Recommend security measures to address various scenarios based on information security principles. |
|
L1.NI.CY.03
Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives, such as the user, enterprise, and government. |
|
L1.DA.S.01
Convert and compare different bit representations of data types, such as characters, numbers, and images. |
|
L1.DA.S.02
Evaluate the trade-offs in how data is organized and stored digitally. |
|
L1.DA.CVT.01
Use tools and techniques to locate, collect, and create visualizations of small and largescale data sets (e.g., paper surveys and online data sets). |
|
L1.DA.IM.01
Illustrate and explain the relationships between collected data elements using computational models. |
|
L1.AP.A.01
Create a prototype that uses algorithms (e. g., searching, sorting, finding shortest distance) to provide a possible solution for a realworld problem. |
|
L1.AP.V.01
Demonstrate the use of lists (e.g., arrays) to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
|
L1.AP.C.01
Justify the selection of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance, and memory usage. |
|
L1.AP.M.01
Decompose problems into procedures using systematic analysis and design. |
|
L1.AP.M.02
Create computational artifacts by systematically organizing, manipulating and/or processing data. |
|
L1.AP.PD.01
Create software that will provide solutions to a variety of users using a software development process. |
|
L1.AP.PD.02
Evaluate a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development. |
|
L1.AP.PD.03
While working in a team, develop, test, and refine eventbased programs that solve practical problems or allow self-expression. |
|
L1.AP.PD.04
Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a complex program. |
|
L1.AP.PD.05
Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible. |
|
L1.IC.CU.01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
|
L1.IC.CU.02
Test and refine computational artifacts to ensure access to a variety of user audiences. |
|
L1.IC.CU.03
Demonstrate ways a given algorithm can help solve computational problems across disciplines. |
|
L1.IC.SI.01
Demonstrate and debate how computing increases and decreases connectivity and communication among people of various cultures. |
|
L1.IC.SLE.01
Describe the beneficial and harmful effects that intellectual property laws can have on innovation. |
|
L1.IC.SLE.02
Describe and discuss the privacy concerns related to the large-scale collection and analysis of information about individuals (e.g., how websites collect and uses data) that may not be evident to users. |
|
L1.IC.SLE.03
Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity. |
|