Standards in this Framework
Standard | Description |
---|---|
A.1 | Review school safety policies and procedures. |
A.2 | Review classroom safety rules and procedures. |
A.3 | Review safety procedures for using equipment in the classroom. |
A.4 | Identify major causes of work-related accidents in office environments. |
A.5 | Demonstrate safety skills in an office/work environment. |
B.1 | Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
B.2 | Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. |
B.3 | Explain the benefits and responsibilities of being a member of a CTSO. |
B.4 | List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
B.5 | Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
C.1 | Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed). |
C.2 | Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
C.3 | Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. |
C.4 | Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). |
C.5 | Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use. |
C.6 | Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information. |
C.7 | Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. |
C.8 | Evaluate various solutions to common hardware and software problems. |
D.1 | Demonstrate punctuality. |
D.2 | Demonstrate self-representation. |
D.3 | Demonstrate work ethic. |
D.4 | Demonstrate respect. |
D.5 | Demonstrate time management. |
D.6 | Demonstrate integrity. |
D.7 | Demonstrate leadership. |
D.8 | Demonstrate teamwork and collaboration. |
D.9 | Demonstrate conflict resolution. |
D.10 | Demonstrate perseverance. |
D.11 | Demonstrate commitment. |
D.12 | Demonstrate a healthy view of competition. |
D.13 | Demonstrate a global perspective. |
D.14 | Demonstrate health and fitness. |
D.15 | Demonstrate self-direction. |
D.16 | Demonstrate lifelong learning |
E.1 | Demonstrate effective speaking and listening skills. |
E.2 | Demonstrate effective reading and writing skills. |
E.3 | Demonstrate mathematical reasoning. |
E.4 | Demonstrate job-specific mathematics skills. |
E.5 | Demonstrate critical-thinking and problem-solving skills. |
E.6 | Demonstrate creativity and resourcefulness. |
E.7 | Demonstrate an understanding of business ethics. |
E.8 | Demonstrate confidentiality. |
E.9 | Demonstrate an understanding of workplace structures, organizations, systems, and climates. |
E.10 | Demonstrate diversity awareness. |
E.11 | Demonstrate job acquisition and advancement skills. |
E.12 | Demonstrate task management skills. |
E.13 | Demonstrate customer-service skills |
F.1 | Define key computing terms (e.g. hardware, software, data, etc.). |
F.2 | Identify key individuals and their impact on the field of computing. |
F.3 | Discuss the progression of computing and explain its impact on society (e.g. hardware, programming languages, applications, Internet, emerging technologies, etc.). |
F.4 | Explain Moore’s Law. |
G.1 | Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.). |
G.2 | Understand the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.). |
G.3 | Describe how software and hardware interact. |
G.4 | Discuss how and why binary is used to represent data in a computer. |
G.5 | Describe how a picture, sound/song, and video are digitized and represented in a computer. |
G.6 | Compare and contrast operating systems (e.g., Mac, Windows, Linux, ChromeOS, iOS, Android). |
G.7 | Evaluate hardware and software configuration to meet situational and budgetary requirements (e.g. gaming, Internet browsing, student, graphic designer, etc.). |
G.8 | Make hardware and software recommendations to improve a computer system. |
H.1 | Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise). |
H.2 | Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss). |
H.3 | Define algorithm (a set of clearly defined, logical steps to solve a problem). |
H.4 | Demonstrate an understanding of algorithms and their practical applications. |
H.5 | Create, evaluate, and adjust algorithms to solve a variety of problems. |
I.1 | Express the design of a program using representations such as flowcharts and pseudocode. |
I.2 | Analyze and explain how a particular program functions. |
I.3 | Solve problems of increasing complexity using visual block-based programming individually and collaboratively. |
I.4 | Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for). |
I.5 | Differentiate between text and numerical data. |
I.6 | Edit, compile/run, test, and debug a program. |
J.1 | Evaluate the results of Internet searches and the reliability of information found on Web sites. |
J.2 | Describe how Web sites are used to communicate and exchange data. |
J.3 | Plan a web page considering subject, devices, audience, layout, color, links and graphics. |
J.4 | Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph) and CSS styles. |
K.1 | Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing. |
K.2 | Explain the importance of Acceptable Use Policies. |
K.3 | Explain the importance of data security and physical security. |
K.4 | Explain the concepts of confidentiality, integrity, and availability (CIA). |
K.5 | Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society. |
K.6 | Explain the concept of encryption and how it is used on a daily basis. |
L.1 | Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering. |
L.2 | Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges. |
L.3 | Identify gender, diversity and geographic related issues in computing. |
L.4 | Describe how computing enhances other career fields. |