CS.D.9-12.F.a |
Identify different multifunctional computing devices and connection technologies, both virtual and physical, to describe their purpose. |
Lessons
|
CS.D.9-12.F.b |
Develop and apply criteria to evaluate computing systems for a given purpose. |
Lessons
|
CS.D.9-12.F.c |
Create an artifact to demonstrate the roles and interactions of computing systems embedded in everyday objects. |
Lessons
|
CS.HS.9-12.F.a |
Compare and contrast interactions between application software, system software and hardware. |
Lessons
|
CS.T.9-12.F.a |
Apply a systemic process to identify problems and take steps to correct them within an integrated computing system. |
Lessons
|
CS.T.9-12.F.b |
Analyze an IT device to determine either what repairs are needed or how to build it. |
Lessons
|
NI.N.9-12.F.a |
Evaluate and select networking devices to establish scalable communications. |
Lessons
|
NI.N.9-12.F.b |
Evaluate and select networking protocols to establish network communication. |
Lessons
|
NI.N.9-12.F.c |
Understand scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together. |
Lessons
|
NI.C.9-12.F.a |
Examine and employ principles of cybersecurity. |
Lessons
|
NI.C.9-12.F.b |
Identify physical, social and digital security risks to address possible attacks. |
Lessons
|
DA.DCS.9-12.F.a |
Analyze patterns in a real-world data store through hypothesis, testing and use of data tools to gain insight and knowledge. |
Lessons
|
DA.DCS.9-12.F.b |
Investigate data storage systems to compare and contrast how data is stored and accessed. |
Lessons
|
DA.VC.9-12.F.a |
Analyze the benefits and limitations of data visualization or multisensory artifacts and tools to communicate which is most appropriate to solve a real-world problem. |
Lessons
|
DA.IM.9-12.F.a |
Evaluate a model by creating a hypothesis, testing it and refining it to discover connections and trends in the data. |
Lessons
|
ATP.A.9-12.F.a |
Define and use appropriate problem solving strategies and visual artifacts to create and refine a solution to a realworld problem. |
Lessons
|
ATP.A.9-12.F.b |
Define and implement an algorithm by decomposing problem requirements from a problem statement to solve a problem. |
Lessons
|
ATP.VDR.9-12.F.a |
Identify types of variables and data and utilize them to create a computer program that stores data in appropriate ways. |
Lessons
|
ATP.CS.9-12.F.a |
Define control structures and Boolean logic and use them to solve real-world scenarios. |
Lessons
|
ATP.CS.9-12.F.b |
Use appropriate syntax to create and use a method. |
Lessons
|
ATP.CS.9-12.F.c |
Use data scoping to isolate data. |
Lessons
|
ATP.M.9-12.F.a |
Break down a solution into procedures using systematic analysis and design. |
Lessons
|
ATP.M.9-12.F.b |
Create computational artifacts by systematically organizing, manipulating and/or processing data |
Lessons
|
ATP.PD.9-12.F.a |
Investigate software development methodologies to select the appropriate one for a project to complete as a team. |
Lessons
|
ATP.PD.9-12.F.b |
Compare test methodologies to evaluate why each is used and to determine their benefits and costs. |
Lessons
|
ATP.PD.9-12.F.c |
Correctly use consistent naming conventions, version control and comments to demonstrate why these are important for future use, maintenance and reuse of code. |
Lessons
|
IC.Cu.9-12.F.a |
Analyze new technology to predict realistic impacts on society. |
Lessons
|
IC.Cu.9-12.F.b |
Explore other professions to understand how computing has and will impact them positively and negatively. |
Lessons
|
IC.SI.9-12.F.a |
Evaluate tools to increase connectivity of people in different cultures and career fields. |
Lessons
|
IC.SI.9-12.F.b |
Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users. |
Lessons
|
IC.SLE.9-12.F.a |
Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact. |
Lessons
|
IC.SLE.9-12.F.b |
Analyze the concepts of usability and security to explain typical tradeoffs between them. |
Lessons
|
IC.SLE.9-12.F.c |
Analyze the collection and generation of data through automated processes to explain the legal concerns that are not always evident to users. |
Lessons
|
IC.SLE.9-12.F.d |
Explain the beneficial and harmful effects of intellectual property laws to determine the impacts on innovation. |
Lessons
|