Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
36.AP.1a
Identify problems that can be solved with a program. |
|
36.AP.1b
Justify a proposed solution to a problem. |
|
36.AP.1c
Use project management tools to support collaboration. |
|
36.AP.1d
Engage in peer review and incorporate evaluative feedback through the design process. |
|
36.AP.1e
Incorporate feedback provided through peer review to refine prototypes. |
|
36.AP.2a
Decompose problems into subcomponents to facilitate the creation of a program. |
|
36.AP.2b
Use documentation to explain the purpose of a section of code and its relationship to other parts of a program. |
|
36.AP.2c
Evaluate the limitations of models, algorithms, and programs considering multiple perspectives. |
|
36.AP.2d
Systematically test and refine programs. |
|
36.AP.3a
Read and write programs that combine loops and conditional control structures. |
|
36.AP.3b
Read and write programs using functions and procedures. |
|
36.CSY.1a
Analyze and evaluate the design of a computing device for the end user |
|
36.CSY.1b
Propose recommendations for improvements to a computing device to include accessibility, functionality, cost, size, speed, accessibility, data bias, and aesthetics. |
|
36.CSY.1c
Investigate additional improvements available through emerging technologies. |
|
36.CYB.1a
Identify different types of data that can be encrypted. |
|
36.CYB.1b
Use simple encryption and decryption strategies to encode and decode a message. |
|
36.DA.1a
Communicate the significance of data visualizations and computation models in the real-world. |
|
36.DA.1b
Use existing data visualizations that refresh in real-time to make predictions about real-world phenomena. |
|
36.DA.1c
Create interactive data visualizations of real-world phenomena. |
|
36.IC.1a
Describe tradeoffs between allowing information to be public and keeping information private and secure. |
|
36.IC.1b
Evaluate policies, laws, and regulations for computing technologies. |
|
36.IC.1c
Propose strategies to mitigate risks and increase benefits of computing technologies. |
|
36.IC.1d
Assess the benefits and drawbacks of using Internet technologies by considering factors such as: data storage, cost, speed, reliability, and privacy. |
|
36.NI.1a
Define client, server, router, and switches. |
|
36.NI.1b
Identify how computing devices collect and exchange data. |
|
36.NI.1c
Compare and contrast network topologies. |
|
36.NI.1d
Illustrate the arrangement of topology among elements of a network. |
|
36.NI.1e
Model how information is transmitted amongst multiple computing devices within a network. |
|