Standards in this Framework
| Standard | Description |
|---|---|
| HS-ALG-PS-01 | Design an algorithm using appropriate data structures to solve a problem or express ideas. |
| HS-ALG-PS-02 | Optimize the design of an algorithm using procedural abstraction and control structures. |
| HS-ALG-PS-03 | Evaluate algorithms for efficiency, correctness, and clarity, using metrics or test cases. |
| HS-ALG-PS-04 | Describe the differences between deterministic and probabilistic algorithms. |
| HS-ALG-PS-05 | Evaluate AI-generated output to assess bias, accuracy, and potential harms. |
| HS-ALG-ML-06 | Justify the selection of a type of AI algorithm to accomplish a task. |
| HS-ALG-ML-07 | Evaluate training data by examining its source, quality, representativeness, potential biases, and privacy implications. |
| HS-ALG-ML-08 | Develop a machine learning model for a chosen task using appropriate data and tools. |
| HS-ALG-IM-09 | Design computing technologies using human-centered design principles. |
| HS-ALG-IM-10 | Evaluate the ethical implications, societal impacts, and potential biases of rule-based and data-driven algorithms. |
| HS-ALG-IM-11 | Articulate the values embedded in the design of algorithmic systems. |
| HS-PRO-PD-12 | Create a modular program that uses procedures, external libraries, or objects to improve reusability and readability. |
| HS-PRO-PD-13 | Use documentation, libraries, Application Programming Interfaces (APIs), and other tools in program development. |
| HS-PRO-PD-14 | Apply appropriate attribution and respect intellectual property when developing computing technologies. |
| HS-PRO-PD-15 | Collaborate on a programming project using a defined workflow that includes design documentation and clear task roles. |
| HS-PRO-VD-16 | Create a program that uses appropriate data structures to store, access, and manipulate data. |
| HS-PRO-RD-17 | Analyze how a segment of code works, including the role of parameters, return values, and data structures. |
| HS-PRO-RD-18 | Evaluate AI-generated code for accuracy, reliability, and alignment with program requirements. |
| HS-PRO-TR-19 | Evaluate a computing technology's alignment with design specifications and responsible design values, including its correctness, effectiveness, and user experience. |
| HS-PRO-TR-20 | Refine a computing technology based on user feedback, testing results, and responsible design values to improve its effectiveness and impact. |
| HS-DAT-DC-21 | Use a digital tool to generate simulated data that fits certain parameters for use in simulations. |
| HS-DAT-DC-22 | Create a data dictionary that describes the names and types of attributes, allowable values/ranges for each attribute, and logical relationships between variables in a dataset. |
| HS-DAT-DC-23 | Use a digital tool to clean and organize text-based data. |
| HS-DAT-DC-24 | Evaluate different approaches to verifying consistency and compliance with expected data types, values, and ranges. |
| HS-DAT-DI-25 | Use computational tools to create data visualizations of multivariate data sets to answer a question, classify, or make predictions. |
| HS-DAT-DI-26 | Evaluate data simulations and data visualizations to answer data questions, inform decision-making, and identify potential limitations. |
| HS-DAT-IM-27 | Evaluate the societal, environmental, and ethical implications of large-scale data collection and processing, including AI applications. |
| HS-DAT-IM-28 | Debate the efficacy of policies and regulations to ensure responsible data use. |
| HS-SYS-HW-29 | Differentiate operating systems (OS) as a special type of software that manages both the hardware and other software components of a computing system, including handling memory and peripherals. |
| HS-SYS-HW-30 | Demonstrate the capabilities and limitations of a physical or simulated computing device to address a task or problem. |
| HS-SYS-SE-31 | Identify different types of cybersecurity and physical security measures and the trade-offs for users, data, and devices. |
| HS-SYS-SE-32 | Classify the causes and impacts of security breaches and social engineering attacks for individuals, industries, communities, and governments. |
| HS-SYS-SE-33 | Formulate a solution to a security flaw in a given system. |
| HS-SYS-NT-34 | Diagram a network of computing systems, including hardware and software. |
| HS-SYS-NT-35 | Analyze how the internet functions as a network of networks and how it differs from other types of networks. |
| HS-SYS-IM-36 | Evaluate the rationales behind laws and policies governing the design and use of computing systems. |
| HS-SYS-IM-37 | Investigate how computing systems and infrastructure impact society and the environment, identifying who is affected and why. |
| HS-SOC-HI-38 | Analyze the historical trajectory of specific computing technologies and how their development is linked to societal and environmental factors. |
| HS-SOC-HI-39 | Propose modifications to existing policies and legislation that encourage ethical innovation and minimize societal risks associated with technology. |
| HS-SOC-ET-40 | Evaluate the fundamental technological differences between an emerging technology and established technologies and how those differences influence computing. |
| HS-SOC-ET-41 | Evaluate the societal and environmental impacts of emerging technologies, including those that lead to inequities in access and outcomes. |
| HS-SOC-ET-42 | Design a conceptual solution to a real-world problem using an emerging technology, analyzing its potential benefits and harms. |
| HS-SOC-HU-43 | Evaluate how human choices in using, designing, deploying, and regulating computing technologies have risks, benefits, and long-term impacts. |
| HS-SOC-HU-44 | Debate perspectives on differences between human and artificial intelligence and their implications for consciousness, ethics, and human responsibility. |
| HS-SOC-CE-45 | Analyze how diverse teams of people use computational thinking and technologies to solve problems. |
| HS-SOC-CE-46 | Connect computing knowledge and skills acquired to students' personal goals and career aspirations. |