Standards in this Framework
Standard | Lessons |
---|---|
9.NI.1
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). |
|
10.NI.1
Identify and define different network connection types (e.g., wifi, mobile data, ethernet). |
|
11.NI.1
Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet). |
|
12.NI.1
Choose an appropriate network connection given a scenario or situation. |
|
9.NI.2
Understand the implications of accessing publicly available Internet connections. |
|
10.NI.2
Identify networkable devices. |
|
11.NI.2
Understand the global impact of networkable devices. |
|
12.NI.2
Compare and contrast the benefits and security risks of networkable devices. |
|
9.HS.1
Compare and contrast appropriate device/hardware/software to complete a task. |
|
9.HS.2
Define software and security patches/update. |
|
10.HS.2
Recognize the importance of and effectively perform software and security patches/updates. |
|
11.HS.2
Identify and choose hardware and software to help protect a system. |
|
9.HS.3
Explain why a backup is necessary. |
|
10.HS.3
Identify important data or systems that need redundancy. |
|
11.HS.3
Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). |
|
12.HS.3
Implement redundancy. |
|
9.T.1
Describe basic hardware and software problems using appropriate and accurate terminology. |
|
10.T.1
Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. |
|
12.T.1
Implement systematic troubleshooting strategies to identify and fix errors. |
|
9.PSA.1
Identify, recognize, and use an algorithm to solve a complex problem across disciplines. |
|
10.PSA.1
Create and test an algorithm to solve a complex problem across disciplines. |
|
11.PSA.1
Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made. |
|
12.PSA.1
Use and adapt common algorithms to solve computational problems. |
|
9.DCA.1
Collect and analyze complex data. |
|
10.DCA.1
Represent complex data in more than one way to support a claim. |
|
11.DCA.1
Represent complex data in multiple ways to defend a student-generated claim. |
|
12.DCA.1
Represent complex data using interactive data visualizations or computational models. |
|
9.A.1
Plan and employ effective research strategies to locate information. |
|
10.A.1
Curate relevant information from digital resources using a variety of tools and methods. |
|
11.A.1
Devise new search strategies based on information gaps and new understanding. |
|
12.A.1
Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions. |
|
9.E.1
Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources. |
|
10.E.1
Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. |
|
11.E.1
Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives. |
|
12.E.1
Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources. |
|
9.C.1
Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea. |
|
10.C.1
Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication. |
|
11.C.1
Publish or present content that customizes the message and medium for their intended audiences to communicate their idea. |
|
12.C.1
Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process. |
|
9.IP.1
Properly use copyrighted works, works in the creative commons, and works in the public domain. |
|
10.IP.1
Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property. |
|
11.IP.1
Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration. |
|
12.IP.1
Debate laws and regulations that impact the development and use of software. |
|
9.IP.2
Cite sources in a standard format to ethically reference the intellectual property of others. |
|
9.IP.3
Engage in positive, safe, legal and ethical behavior when using technology. |
|
11.IP.3
Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics. |
|
9.IC.1
Evaluate how technology has impacted the workforce positively and negatively. |
|
10.IC.1
Evaluate the social, personal, and economic implications technology has on society and the economy. |
|
11.IC.1
Explain how computing may change cultural aspects of society. |
|
12.IC.1
Predict how computing may impact the workplace and personal lives. |
|
9.SI.1
Identify how technology has affected our means of communication. |
|
10.SI.1
Evaluate the impacts of technology on social interactions. |
|
11.SI.1
Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society |
|
12.SI.1
Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society. |
|
9.SE.1
Recognize the effects sharing information online can have on others' privacy. |
|
10.SE.1
Implement best practices to secure personal information. |
|
11.SE.1
Understand encryption and how it is used to protect data. |
|
9.SE.2
Know how to modify account settings to protect privacy and security. |
|
10.SE.2
Recognize the importance of monitoring your private data. |
|
11.SE.2
Explain the privacy concerns related to the collection and generation of data through automated processes. |
|
12.SE.2
Illustrate how sensitive data can be affected by malware and other attacks. |
|
9.SE.3
Recognize that datacollection technology can be used to track navigation online. |
|
10.SE.3
Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors. |
|
9.SE.4
Describe ways to prevent identity theft. |
|
10.SE.4
Identify if their private data has been altered and can react appropriately. |
|
11.SE.4
Develop a plan to recover from an incident that was tied to unauthorized access. |
|
9.RU.1
Apply cyberbullying prevention strategies. |
|
9.RU.2
Apply safe and ethical behaviors to personal electronic communication and interaction. |
|
9.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
10.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
11.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
12.RU.4
Understand the purpose of and comply with Acceptable Use Policies. |
|
9.DI.1
Manage a digital identity and be aware of the permanence of actions in the digital world. |
|