Standards in this Framework
Standard | Description |
---|---|
CCP.1 | Identify the advantages, disadvantages and unintended consequences of computing devices. |
CCP.2 | Analyze the relationship between human and computer interactions to improve the device. For example, student A watches student B use a simple communication device. Student A updates the tool for improved use. |
CCP.3 | Identify and describe multiple considerations and tradeoffs when designing or selecting computing system, such as functionality, cost, size, speed, accessibility, and aesthetics. |
CCP.4 | Construct optimized models of computing systems. |
CCP.5 | Create structured processes to troubleshoot problems with computing systems. |
CCP.6 | Define protocols in relation to a set of rules. |
CCP.7 | Construct protocols that can be used to share information between people or devices. For example: a binary communication protocol using lights. |
CCP.8 | Compare the relative strengths and weaknesses of unique protocols considering security, speed, and reliability. |
CCP.9 | Create models of networks that include packets and domain name server (DNS). |
CCP.10 | Identify steps to ensure security measures are in place to safeguard online information. |
CCP.11 | Create cyphers to encrypt data that can be transferred between users. |
CCP.12 | Explain how encryption can be used to safeguard data that is sent across a network. |
CCP.13 | Evaluate the accuracy and precision of various forms of data collection. |
CCP.14 | Identify and define the limiting factors to specific forms of data collection. |
CCP.15 | Describe how different formats of stored data represent tradeoffs between quality and size. |
CCP.16 | Represent data using different encoding schemes, such as binary, Unicode, Morse code, shorthand, studentcreated codes. |
CCP.17 | Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools. |
CCP.18 | Revise variables and constants in computational models to more accurately reflect real-world systems. For example in an ecosystem model, introducing predators as a new variable. |
CCP.19 | Solicit and integrate peer feedback as appropriate to develop or refine a program. |
CCP.20 | Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size. |
CCP.21 | Provide proper attribution when code is borrowed or built upon. |
CCP.22 | Interpret the flow of execution of algorithms and predict their outcomes. |
CCP.23 | Design, develop, and present computational artifacts such as mobile applications that address social problems both independently and collaboratively |
CCP.24 | Develop programs, both independently and collaboratively, that include sequences with nested loops and multiple branches. (Clarification: At this level, students may use block- based and/or text-based programming languages.) |
CCP.25 | Identify the purpose of variables in relation to programming |
CCP.26 | Create variables that represent different types of data and manipulate their values. |
CCP.27 | Define and use procedures that hide the complexity of a task and can be reused to solve similar tasks. (Clarification: Students use and modify, but do not necessarily create, procedures with parameters.) |
CCP.28 | Decompose a problem into parts and create solutions for each part. |
CCP.29 | Use an iterative design process (e.g., define the problem, generate ideas, build, test, and improve solutions) to solve problems, both independently and collaboratively. |
CCP.30 | Analyze the positive and negative impacts of computing technology. |
CCP.31 | Recognize there are tradeoffs in computing. |
CCP.32 | Explain how social interactions can allow for multiple viewpoints. |
CCP.33 | Demonstrate an understanding of digital security. |