Standards in this Framework
Standard | Description |
---|---|
18.AP.1a | Categorize problems as classification, prediction, combinational search, or sequential decision problems. |
18.AP.1b | Determine when problems can be solved with programs and automation. |
18.AP.1c | Create a variety of programs while considering the needs and preferences of diverse user groups. |
18.AP.1d | Utilize existing code, media, and libraries into original programs, and give attribution. |
18.AP.2a | Predict and test the outcome or output of multiple test cases. |
18.AP.2b | Verify and refine the program based on the outcome of multiple test cases. |
18.AP.3a | Collaboratively plan, design, and revise programs. |
18.AP.3b | Explain design choices, including constraints, and audiences. |
18.AP.3c | Provide constructive feedback through peer review. |
18.AP.3d | Reflect on collaborative experiences. |
18.AP.4a | Analyze and decompose a problem. |
18.AP.4b | Use abstraction to determine a solution to a problem. |
18.AP.5a | Identify characteristics of block-based and text-based coding languages. |
18.AP.5b | Analyze the advantages and disadvantages of block-based and text-based coding languages. |
18.CSY.1a | Explain the interactions of hardware and software components when collecting and exchanging data |
18.CSY.1b | Justify the selection of hardware and software components for project designs by considering multiple factors: functionality, cost, size, speed, accessibility, and data bias. |
18.CSY.2a | Evaluate design and user operability to assess user accessibility, hardware and software performance, and compatibility. |
18.CSY.2b | Develop and apply criteria to evaluate a computing system for a given purpose and its intended environment. |
18.CYB.1a | Create strategies for protecting information. |
18.CYB.1b | Describe the benefits and drawbacks of each type of information. |
18.CYB.1c | Analyze the impact of misclassified information. |
18.CYB.1d | Outline common causes and reasons for data breaches involving information. |
18.CYB.1e | Describe the role of social engineering and human error in data breaches. |
18.DA.1a | Create representations and visualizations of data. |
18.DA.1b | Assess data reliability and biases in the data collection process, data visualizations, and existing automation. |
18.DA.1c | Use and evaluate various schemes to represent data. |
18.DA.1d | Explore how emerging technologies including Artificial Intelligence (AI) organize data, make decisions, and formulate predictions. |
18.IC.1a | Identify correlations between historical developments in computing technologies and changes in society, including automated decision-making and emerging computing technologies. |
18.IC.1b | Explain how computing technologies can positively and negatively impact communities in Virginia and globally. |
18.IC.1c | Examine how risk and benefits have changed based on the development of computing technologies. |
18.IC.2a | Identify computer science related careers that relate to the student’s interest |
18.IC.2b | Evaluate different computer science related careers and develop a career plan. |
18.NI.1a | Define packet, protocol, server, and router. |
18.NI.1b | Analyze the role of computing devices in transmitting data. |
18.NI.1c | Model how data is transmitted across networks and the Internet. |