Standards in this Framework
Standard | Description |
---|---|
CS.D.9-12.F.a | Identify different multifunctional computing devices and connection technologies, both virtual and physical, to describe their purpose. |
CS.D.9-12.F.b | Develop and apply criteria to evaluate computing systems for a given purpose. |
CS.D.9-12.F.c | Create an artifact to demonstrate the roles and interactions of computing systems embedded in everyday objects. |
CS.HS.9-12.F.a | Compare and contrast interactions between application software, system software and hardware. |
CS.T.9-12.F.a | Apply a systemic process to identify problems and take steps to correct them within an integrated computing system. |
CS.T.9-12.F.b | Analyze an IT device to determine either what repairs are needed or how to build it. |
NI.N.9-12.F.a | Evaluate and select networking devices to establish scalable communications. |
NI.N.9-12.F.b | Evaluate and select networking protocols to establish network communication. |
NI.N.9-12.F.c | Understand scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together. |
NI.C.9-12.F.a | Examine and employ principles of cybersecurity. |
NI.C.9-12.F.b | Identify physical, social and digital security risks to address possible attacks. |
DA.DCS.9-12.F.a | Analyze patterns in a real-world data store through hypothesis, testing and use of data tools to gain insight and knowledge. |
DA.DCS.9-12.F.b | Investigate data storage systems to compare and contrast how data is stored and accessed. |
DA.VC.9-12.F.a | Analyze the benefits and limitations of data visualization or multisensory artifacts and tools to communicate which is most appropriate to solve a real-world problem. |
DA.IM.9-12.F.a | Evaluate a model by creating a hypothesis, testing it and refining it to discover connections and trends in the data. |
ATP.A.9-12.F.a | Define and use appropriate problem solving strategies and visual artifacts to create and refine a solution to a realworld problem. |
ATP.A.9-12.F.b | Define and implement an algorithm by decomposing problem requirements from a problem statement to solve a problem. |
ATP.VDR.9-12.F.a | Identify types of variables and data and utilize them to create a computer program that stores data in appropriate ways. |
ATP.CS.9-12.F.a | Define control structures and Boolean logic and use them to solve real-world scenarios. |
ATP.CS.9-12.F.b | Use appropriate syntax to create and use a method. |
ATP.CS.9-12.F.c | Use data scoping to isolate data. |
ATP.M.9-12.F.a | Break down a solution into procedures using systematic analysis and design. |
ATP.M.9-12.F.b | Create computational artifacts by systematically organizing, manipulating and/or processing data |
ATP.PD.9-12.F.a | Investigate software development methodologies to select the appropriate one for a project to complete as a team. |
ATP.PD.9-12.F.b | Compare test methodologies to evaluate why each is used and to determine their benefits and costs. |
ATP.PD.9-12.F.c | Correctly use consistent naming conventions, version control and comments to demonstrate why these are important for future use, maintenance and reuse of code. |
IC.Cu.9-12.F.a | Analyze new technology to predict realistic impacts on society. |
IC.Cu.9-12.F.b | Explore other professions to understand how computing has and will impact them positively and negatively. |
IC.SI.9-12.F.a | Evaluate tools to increase connectivity of people in different cultures and career fields. |
IC.SI.9-12.F.b | Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users. |
IC.SLE.9-12.F.a | Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact. |
IC.SLE.9-12.F.b | Analyze the concepts of usability and security to explain typical tradeoffs between them. |
IC.SLE.9-12.F.c | Analyze the collection and generation of data through automated processes to explain the legal concerns that are not always evident to users. |
IC.SLE.9-12.F.d | Explain the beneficial and harmful effects of intellectual property laws to determine the impacts on innovation. |