for South Carolina Fundamentals of Computing — South Carolina Fundamentals of Computing
Total Standards: 91Mapped: 88Completion: 96%
A.1
Identify major causes of work-related accidents in offices.
1.1 Welcome to Fundamentals of Computing!
A.2
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
A.3
Identify potential abuse and unethical uses of computers and networks.
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
5.7 The Impact of the Internet
A.4
Explain the consequences of illegal, social, and unethical uses of information technologies, e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices.
1.11 Creative Credit & Copyright
A.5
Differentiate between freeware, shareware, and public domain software copyrights.
A.6
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.
1.11 Creative Credit & Copyright
A.7
Identify netiquette including the use of email, social networking, blogs, texting, and chatting.
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
1.8 Information Literacy
5.7 The Impact of the Internet
A.8
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information.
1.1 Welcome to Fundamentals of Computing!
22.1 Communication is Key!
A.9
Discuss the importance of cyber safety and the impact of cyber bullying.
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
1.1 Welcome to Fundamentals of Computing!
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
1.1 Welcome to Fundamentals of Computing!
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
1.1 Welcome to Fundamentals of Computing!
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
1.1 Welcome to Fundamentals of Computing!
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
1.1 Welcome to Fundamentals of Computing!
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
3.6 Top Down Design and Decomposition in Karel
3.7 Commenting Your Code
4.1 Collaborative Programming
8.14 Project: Your First Website
9.1 Computer Science Careers
12.1 Intro to Design Thinking
12.2 Prototype
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
1.8 Information Literacy
5.7 The Impact of the Internet
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
5.7 The Impact of the Internet
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
1.11 Creative Credit & Copyright
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information.
1.3 The CIA Triad
1.7 Privacy & Security
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
C.8
Evaluate various solutions to common hardware and software problems.
2.3 Software
2.4 Hardware
D.1
Demonstrate creativity and innovation.
1.13 Project: Public Service Announcement
3.15 More Karel Examples and Testing
4.2 Challenge Problems
7.1 Graphics Challenges
8.14 Project: Your First Website
12.1 Intro to Design Thinking
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
D.2
Demonstrate critical thinking and problem-solving skills.
1.1 Welcome to Fundamentals of Computing!
3.15 More Karel Examples and Testing
3.17 Debugging Strategies
4.1 Collaborative Programming
4.2 Challenge Problems
7.1 Graphics Challenges
14.1 Control Structures Challenges
D.3
Demonstrate initiative and self-direction.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
3.15 More Karel Examples and Testing
4.1 Collaborative Programming
8.14 Project: Your First Website
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
D.4
Demonstrate integrity.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
4.1 Collaborative Programming
D.5
Demonstrate work ethic.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
3.15 More Karel Examples and Testing
4.1 Collaborative Programming
8.14 Project: Your First Website
12.4 Project Prep and Development
D.6
Demonstrate conflict resolution skills.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
4.1 Collaborative Programming
12.1 Intro to Design Thinking
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
D.7
Demonstrate listening and speaking skills.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
4.1 Collaborative Programming
8.14 Project: Your First Website
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
D.8
Demonstrate respect for diversity.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
4.1 Collaborative Programming
9.1 Computer Science Careers
12.3 Test
12.4 Project Prep and Development
D.9
Demonstrate customer service orientation.
1.1 Welcome to Fundamentals of Computing!
22.1 Communication is Key!
D.10
Demonstrate teamwork.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
4.1 Collaborative Programming
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
E.1
Demonstrate global or “big picture” thinking.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
5.7 The Impact of the Internet
E.2
Demonstrate career and life management skills and goal-making.
1.1 Welcome to Fundamentals of Computing!
9.1 Computer Science Careers
22.1 Communication is Key!
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
2.5 Future of Computing
5.7 The Impact of the Internet
E.4
Demonstrate time and resource management skills.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
4.1 Collaborative Programming
8.14 Project: Your First Website
12.1 Intro to Design Thinking
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
E.5
Demonstrates information literacy skills.
1.8 Information Literacy
E.6
Demonstrates information security skills.
1.7 Privacy & Security
1.8 Information Literacy
1.10 Data Collection & Limitations
E.7
Demonstrates information technology skills.
1.7 Privacy & Security
1.8 Information Literacy
1.10 Data Collection & Limitations
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
2.3 Software
2.4 Hardware
2.6 Computer Model
E.9
Demonstrate job-specific mathematics skills.
6.4 Basic Math in JavaScript
6.6 Using RGB to Create Colors
9.1 Computer Science Careers
13.2 Logical Operators
13.3 Comparison Operators
13.5 For Loops in JavaScript
13.8 Random Numbers
E.10
Demonstrates professionalism in the workplace.
1.1 Welcome to Fundamentals of Computing!
9.1 Computer Science Careers
22.1 Communication is Key!
E.11
Demonstrate reading and writing skills.
1.1 Welcome to Fundamentals of Computing!
1.13 Project: Public Service Announcement
3.7 Commenting Your Code
4.1 Collaborative Programming
8.14 Project: Your First Website
9.1 Computer Science Careers
12.2 Prototype
12.3 Test
12.4 Project Prep and Development
E.12
Demonstrates workplace safety.
1.1 Welcome to Fundamentals of Computing!
F.1
Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing.
1.7 Privacy & Security
1.10 Data Collection & Limitations
1.11 Creative Credit & Copyright
F.2
Explain the importance of Acceptable Use Policies.
1.1 Welcome to Fundamentals of Computing!
1.11 Creative Credit & Copyright
F.3
Explain the importance of data security and physical security.
1.7 Privacy & Security
F.4
Explain the concepts of confidentiality, integrity, and availability (CIA).
1.2 What is Cybersecurity?
1.3 The CIA Triad
F.5
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.
1.2 What is Cybersecurity?
1.7 Privacy & Security
F.6
Explain the concept of encryption and how it is used on a daily basis.
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.7 Privacy & Security
F.7
Explain the social implications of constant data collection via Wi-Fi-enabled devices (Internet of Things [IoT]).
1.2 What is Cybersecurity?
G.1
Identify and define the functional components of a computing device (input devices, output devices, processor, operating system, software applications, memory, storage, etc.)
2.2 Computer Organization
2.3 Software
2.4 Hardware
G.2
Describe how software and hardware interact.
2.2 Computer Organization
2.3 Software
2.4 Hardware
G.3
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise).
5.7 The Impact of the Internet
G.4
Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss).
3.6 Top Down Design and Decomposition in Karel
3.10 For Loops
3.11 If Statements
3.12 If/Else Statements
3.13 While Loops in Karel
3.14 Control Structures Example
3.15 More Karel Examples and Testing
4.2 Challenge Problems
6.5 Using Graphics in JavaScript
6.6 Using RGB to Create Colors
H.1
Evaluate the results of Internet searches and the reliability of information found on Web sites.
1.8 Information Literacy
H.2
Describe how Web sites are used to communicate and exchange data.
5.3 Internet Addresses
5.4 DNS
5.5 Routing
5.6 Packets and Protocols
H.3
Plan a web page considering subject, devices, audience, layout, color, links and graphics.
8.14 Project: Your First Website
H.4
Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph).
8.2 Structure of an HTML Page
8.3 Formatting Text
8.5 Images
8.6 HTML Lists
8.7 HTML Tables
8.8 HTML Styling
8.9 Introduction to CSS
8.10 CSS Select by Tag
8.11 CSS Select by Class
8.12 CSS Select by ID
8.14 Project: Your First Website
H.5
Create and attach a stylesheet that includes a variety of CSS rule sets to format HTML elements used to organize web page content.
8.9 Introduction to CSS
24.2 Multi-file Websites
H.6
Incorporate digital media in accordance with copyright and fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
1.11 Creative Credit & Copyright
24.3 Embedding iframes
I.1
Classify application software according to its primary function (e.g., operating systems, productivity, entertainment, system).
2.3 Software
I.2
Demonstrate an understanding of algorithms and their practical applications.
3.1 Introduction to Programming With Karel
3.2 More Basic Karel
3.6 Top Down Design and Decomposition in Karel
3.12 If/Else Statements
3.14 Control Structures Example
3.15 More Karel Examples and Testing
6.1 Hello World
I.3
Create, evaluate, and adjust algorithms to solve a variety of problems using flowcharts and/or pseudocode.
3.6 Top Down Design and Decomposition in Karel
3.7 Commenting Your Code
3.10 For Loops
3.11 If Statements
3.12 If/Else Statements
3.14 Control Structures Example
3.15 More Karel Examples and Testing
4.2 Challenge Problems
6.3 User Input
6.4 Basic Math in JavaScript
6.5 Using Graphics in JavaScript
13.2 Logical Operators
13.3 Comparison Operators
13.4 If Statements
13.5 For Loops in JavaScript
13.6 General For Loops
13.7 For Loop Practice
13.8 Random Numbers
13.9 While Loops
13.10 Loop and a Half
I.4
Analyze and explain how a particular program functions.
3.6 Top Down Design and Decomposition in Karel
3.7 Commenting Your Code
3.16 How to Indent Your Code
3.17 Debugging Strategies
4.1 Collaborative Programming
I.5
Solve problems of increasing complexity using visual block-based programming individually and collaboratively.
3.2 More Basic Karel
3.6 Top Down Design and Decomposition in Karel
3.9 Super Karel
3.10 For Loops
3.11 If Statements
3.12 If/Else Statements
3.13 While Loops in Karel
3.14 Control Structures Example
3.15 More Karel Examples and Testing
4.2 Challenge Problems
I.6
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for).
3.10 For Loops
3.11 If Statements
3.12 If/Else Statements
3.13 While Loops in Karel
3.14 Control Structures Example
4.2 Challenge Problems
6.2 Variables
6.4 Basic Math in JavaScript
13.1 Booleans
13.2 Logical Operators
13.3 Comparison Operators
13.4 If Statements
13.5 For Loops in JavaScript
13.6 General For Loops
13.7 For Loop Practice
13.8 Random Numbers
13.9 While Loops
13.10 Loop and a Half
14.1 Control Structures Challenges
15.1 Functions and Parameters 1
15.2 Functions and Parameters 2
15.3 Functions and Parameters 3
15.4 Functions and Return Values 1
15.5 Functions and Return Values 2
15.10 Mouse Events: Mouse Clicked
23.1 Functions and Parameters 1
23.2 Functions and Parameters 2
23.3 Functions and Parameters 3
23.4 Functions and Return Values 1
23.5 Functions and Return Values 2
23.6 Local Variables and Scope
I.7
Differentiate between text, numerical and Boolean variables.
6.2 Variables
6.4 Basic Math in JavaScript
13.1 Booleans
15.1 Functions and Parameters 1
15.2 Functions and Parameters 2
15.3 Functions and Parameters 3
15.4 Functions and Return Values 1
15.5 Functions and Return Values 2
23.1 Functions and Parameters 1
23.2 Functions and Parameters 2
23.3 Functions and Parameters 3
23.4 Functions and Return Values 1
23.5 Functions and Return Values 2
I.8
Implement pattern recognition to edit, compile/run, test, and debug a program.
3.14 Control Structures Example
3.15 More Karel Examples and Testing
3.17 Debugging Strategies
4.2 Challenge Problems
15.7 Random Circles
15.8 Random Ghosts
15.9 Bouncing Ball
15.10 Mouse Events: Mouse Clicked
J.1
Define and demonstrate how and why the binary system is used to represent data in a computer (e.g., RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.)
2.4 Hardware
5.2 Internet Hardware
J.2
Describe how a picture, sound/song, and video are digitized and represented in a computer.
5.1 Intro to the Internet
5.5 Routing
5.6 Packets and Protocols
J.3
Analyze the importance of data security and physical security.
1.7 Privacy & Security
1.10 Data Collection & Limitations
1.13 Project: Public Service Announcement
J.4
Evaluate the concepts of confidentiality, integrity, and availability (CIA).
1.3 The CIA Triad
J.5
Apply the concept of encryption and decryption and how it is used on a daily basis.
1.7 Privacy & Security
1.13 Project: Public Service Announcement
J.6
Collect data using various methods and transform it to make it more useful and reliable.
1.9 Visualizing and Interpreting Data
J.7
Develop a visual representation of data that assists in making a decision or recommendation.
1.9 Visualizing and Interpreting Data
K.1
Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
9.1 Computer Science Careers
K.2
Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges.
9.1 Computer Science Careers
K.3
Identify gender, diversity and geographic related issues in computing.
1.13 Project: Public Service Announcement
5.7 The Impact of the Internet
9.1 Computer Science Careers
K.4
Identify how computing is used in other career fields.
5.7 The Impact of the Internet
9.1 Computer Science Careers
K.5
Identify key individuals and their impact on the field of computing.
2.1 History of Computers
9.1 Computer Science Careers
22.1 Communication is Key!
L.1
Identify the role physical computing plays in the Internet of Things (IoT).
1.2 What is Cybersecurity?
L.2
Identify and categorize physical sensors based on capability (e.g., light, sound, temperature, movement.)
1.10 Data Collection & Limitations
2.2 Computer Organization
2.4 Hardware
2.6 Computer Model
L.3
Differentiate and apply inputs and outputs that are available on a physical device vs software development.
1.10 Data Collection & Limitations
2.2 Computer Organization
2.4 Hardware
2.6 Computer Model
L.4
Use an API to develop code that controls a physical computing device.
L.5
Create prototypes that use a physical device to solve real-world problems.
M.1
Identify how machine learning impacts data-driven decision making.
10.1 Intro to Machine Learning
10.2 Supervised Learning
10.3 Unsupervised Learning
10.4 Reinforcement Learning
M.2
Analyze patterns in data to determine the features that predict categorization.
11.2 How Are AI Models Trained?
11.3 AI Models in Industry
M.3
Evaluate a dataset with features to illustrate how computers can learn to classify things.
11.3 AI Models in Industry
M.4
Explain the importance of avoiding bias when creating machine learning models.
11.4 Bias in Training
M.5
Contrast the unique characteristics of human learning with the ways machine learning operates.