3A-AP-13 |
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. |
-
4.3 Looping
-
19.15 Your First Website
-
22.1 Booleans
-
22.2 Logical Operators
-
22.3 Comparison Operators
-
22.4 If Statements
-
22.5 For Loops in JavaScript
-
22.6 General For Loops
-
22.7 For Loop Practice
-
22.8 Random Numbers
-
22.9 While Loops
-
22.10 Loop and a Half
|
3A-AP-14 |
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. |
-
4.5 Arrays and Objects
|
3A-AP-15 |
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. |
-
4.3 Looping
-
4.4 Branching
-
4.6 Organizational Techniques
-
22.4 If Statements
-
22.5 For Loops in JavaScript
-
22.6 General For Loops
-
22.7 For Loop Practice
-
22.9 While Loops
-
22.10 Loop and a Half
|
3A-AP-16 |
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. |
|
3A-AP-17 |
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. |
-
4.4 Branching
-
4.6 Organizational Techniques
-
21.1 Challenge Problems
-
22.1 Booleans
-
22.2 Logical Operators
-
22.3 Comparison Operators
-
22.4 If Statements
-
22.5 For Loops in JavaScript
-
22.6 General For Loops
-
22.7 For Loop Practice
-
22.8 Random Numbers
-
22.9 While Loops
-
22.10 Loop and a Half
|
3A-AP-18 |
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. |
-
5.3 Basic Crypto Systems: Caesar Cipher
-
5.5 Basic Crypto Systems: Vigenere Cipher
-
6.1 Project: Classic Cipher Newscast
|
3A-AP-19 |
Systematically design and develop programs for broad audiences by incorporating feedback from users. |
|
3A-AP-20 |
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. |
-
2.6 Creative Credit & Copyright
-
7.5 Software Licenses
|
3A-AP-21 |
Evaluate and refine computational artifacts to make them more usable and accessible. |
|
3A-AP-22 |
Design and develop computational artifacts working in team roles using collaborative tools. |
-
3.1 Project: Public Service Announcement
|
3A-AP-23 |
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs. |
-
4.6 Organizational Techniques
-
19.15 Your First Website
-
21.1 Challenge Problems
-
22.1 Booleans
-
22.2 Logical Operators
-
22.3 Comparison Operators
-
22.4 If Statements
-
22.5 For Loops in JavaScript
-
22.6 General For Loops
-
22.7 For Loop Practice
-
22.8 Random Numbers
-
22.9 While Loops
-
22.10 Loop and a Half
|
3A-CS-01 |
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. |
-
4.1 Programming Concepts
-
8.5 Clients and Servers
-
9.1 Project: Security Assessment Report
|
3A-CS-02 |
Compare levels of abstraction and interactions between application software, system software, and hardware layers. |
-
7.4 Software and Applications
-
8.5 Clients and Servers
-
9.1 Project: Security Assessment Report
-
10.4 Internet Hardware and Sending Information
-
10.9 Viewing a Webpage
-
11.1 Internal Components
-
11.2 Peripheral Devices
|
3A-CS-03 |
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. |
-
12.1 Methodology
-
12.2 Support Practice
|
3A-DA-09 |
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. |
-
10.2 Notational Systems
-
10.3 Data Representation
|
3A-DA-10 |
Evaluate the tradeoffs in how data elements are organized and where data is stored. |
-
2.4 Privacy & Security
-
3.1 Project: Public Service Announcement
-
4.5 Arrays and Objects
-
8.4 Databases
-
8.6 What is SQL?
-
8.7 Basic Querying in SQL
-
8.8 Filtering Queries in SQL
-
9.1 Project: Security Assessment Report
-
11.4 Storage Options
|
3A-DA-11 |
Create interactive data visualizations using software tools to help others better understand real-world phenomena. |
-
8.3 The Value of Data
-
22.8 Random Numbers
|
3A-DA-12 |
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process. |
-
22.8 Random Numbers
|
3A-IC-24 |
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. |
-
1.1 Module Overview - Cybersecurity
-
1.2 What is Cybersecurity?
-
1.3 Impact of Cybersecurity
-
1.4 The CIA Triad
-
2.1 Digital Footprint and Reputation
-
2.2 Cyberbullying
-
2.3 Internet Safety
-
2.4 Privacy & Security
-
2.5 Information Literacy
-
2.6 Creative Credit & Copyright
-
2.7 Hacking Ethics
-
3.1 Project: Public Service Announcement
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
-
8.9 Common Security Problems
-
9.1 Project: Security Assessment Report
-
10.1 Introduction to the Internet
-
10.9 Viewing a Webpage
-
10.10 Impact of the Internet
|
3A-IC-25 |
Test and refine computational artifacts to reduce bias and equity deficits. |
-
2.2 Cyberbullying
-
2.5 Information Literacy
-
3.1 Project: Public Service Announcement
-
10.9 Viewing a Webpage
|
3A-IC-26 |
Demonstrate ways a given algorithm applies to problems across disciplines. |
-
5.4 Basic Crypto Systems: Cracking Caesar
-
6.1 Project: Classic Cipher Newscast
|
3A-IC-27 |
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. |
-
3.1 Project: Public Service Announcement
|
3A-IC-28 |
Explain the beneficial and harmful effects that intellectual property laws can have on innovation. |
-
2.5 Information Literacy
-
2.6 Creative Credit & Copyright
-
3.1 Project: Public Service Announcement
-
10.10 Impact of the Internet
|
3A-IC-29 |
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. |
-
1.2 What is Cybersecurity?
-
1.3 Impact of Cybersecurity
-
1.4 The CIA Triad
-
2.1 Digital Footprint and Reputation
-
2.3 Internet Safety
-
2.4 Privacy & Security
-
3.1 Project: Public Service Announcement
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
-
7.6 Application Security
-
7.7 Browser Configuration
-
8.3 The Value of Data
-
8.9 Common Security Problems
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
-
9.1 Project: Security Assessment Report
-
10.10 Impact of the Internet
|
3A-IC-30 |
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. |
-
1.3 Impact of Cybersecurity
-
1.4 The CIA Triad
-
2.1 Digital Footprint and Reputation
-
2.3 Internet Safety
-
2.4 Privacy & Security
-
2.7 Hacking Ethics
-
3.1 Project: Public Service Announcement
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
-
7.6 Application Security
-
8.9 Common Security Problems
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
-
9.1 Project: Security Assessment Report
-
10.10 Impact of the Internet
|
3A-NI-04 |
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. |
-
10.5 Internet Addresses
-
10.6 Domain Name System (DNS)
-
10.7 Routing
-
10.8 Packets & Protocols
-
10.9 Viewing a Webpage
-
11.3 Network Devices
-
11.5 Network Options
|
3A-NI-05 |
Give examples to illustrate how sensitive data can be affected by malware and other attacks. |
-
1.2 What is Cybersecurity?
-
1.3 Impact of Cybersecurity
-
2.4 Privacy & Security
-
3.1 Project: Public Service Announcement
-
5.1 Cryptography, Cryptology, Cryptanalysis
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
-
7.8 System Administration
-
8.1 Inside Web Apps
-
8.2 Developer Tools
-
8.9 Common Security Problems
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
-
9.1 Project: Security Assessment Report
-
11.7 Network Management
|
3A-NI-06 |
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. |
-
1.2 What is Cybersecurity?
-
2.1 Digital Footprint and Reputation
-
2.3 Internet Safety
-
2.4 Privacy & Security
-
3.1 Project: Public Service Announcement
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
-
7.7 Browser Configuration
-
7.8 System Administration
-
8.9 Common Security Problems
-
8.11 Types of SQLi and Prevention
-
9.1 Project: Security Assessment Report
-
11.6 Network Communication
-
11.7 Network Management
|
3A-NI-07 |
Compare various security measures, considering tradeoffs between the usability and security of a computing system. |
-
1.4 The CIA Triad
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
-
7.6 Application Security
-
8.9 Common Security Problems
-
8.11 Types of SQLi and Prevention
-
9.1 Project: Security Assessment Report
-
11.6 Network Communication
-
11.7 Network Management
|
3A-NI-08 |
Explain tradeoffs when selecting and implementing cybersecurity recommendations. |
-
2.1 Digital Footprint and Reputation
-
2.4 Privacy & Security
-
3.1 Project: Public Service Announcement
-
6.1 Project: Classic Cipher Newscast
-
7.6 Application Security
-
7.7 Browser Configuration
-
7.8 System Administration
-
8.9 Common Security Problems
-
8.11 Types of SQLi and Prevention
-
9.1 Project: Security Assessment Report
-
11.6 Network Communication
|