Please enable JavaScript to use CodeHS

Standards Framework

for Florida Conceptual Cybersecurity

110

Standards in this Framework

Standard Description
SC.912.CC.1.1 Evaluate digital modes of communication and collaboration.
SC.912.CC.1.2 Utilize tools within a project environment to communicate.
SC.912.CC.1.3 Present information and data using presentation software.
SC.912.CC.1.4 Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
SC.912.CC.2.1 Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
SC.912.CC.2.2 Assess how collaboration influences the design and development of software artifacts.
SC.912.CC.2.3 Evaluate program designs and implementations for readability and usability.
SC.912.CC.2.4 Critique the strengths and weaknesses of the collaborative process when creating digital products.
SC.912.CO.1.1 Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
SC.912.CO.1.2 Identify and select the file format based on trade-offs.
SC.912.CO.1.3 Select and use the correct file type for specific tasks.
SC.912.CO.1.4 Describe the relationship between drivers, hardware and operating systems.
SC.912.CO.1.5 Describe the organization of a computer and its principal components.
SC.912.CO.1.7 Describe the process of protecting computer hardware from exploitation.
SC.912.CO.1.8 Describe how the Internet facilitates global communication.
SC.912.CO.1.9 Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
SC.912.CO.2.1 Explore the function of Basic Input/Output System (BIOS) and Unified Extensible Firmware Interface (UEFI) in a computer.
SC.912.CO.2.2 Explore motherboard variations.
SC.912.CO.2.3 Discuss the central processing unit (CPU).
SC.912.CO.2.4 Explore the role of a power supply unit (PSU) in relation to a computer system.
SC.912.CO.2.5 Analyze the purpose of various random-access memory (RAM) speeds and storage sizes.
SC.912.CO.2.7 Evaluate various forms of input and output (IO).
SC.912.CO.2.8 Evaluate the basic components of wired computer networks.
SC.912.CO.2.9 Evaluate the basic components of wireless computer networks.
SC.912.CO.2.11 Investigate the issues that impact network functionality.
SC.912.CO.2.12 Describe common network protocols.
SC.912.CO.2.13 Discern how common network protocols are applied by client-server and peer-to-peer networks.
SC.912.CO.2.14 Explore the role of dynamic host control protocol (DHCP) in a networking system.
SC.912.CO.2.15 Analyze the importance of subnetting.
SC.912.CO.2.16 Describe how devices are identified on a network.
SC.912.CO.2.17 Identify similarities and differences between Internet protocol versions.
SC.912.CO.2.18 Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks.
SC.912.CO.3.1 Analyze various operating systems.
SC.912.CO.3.2 Develop criteria for selecting software when solving a specific real-world problem.
SC.912.CO.3.3 Examine the difference between operating system (OS) software and application software.
SC.912.CO.3.4 Explain how automated software testing can reduce the cost of the testing effort.
SC.912.CS.1.1 Identify possible risks to maintaining data confidentiality.
SC.912.CS.1.2 Describe computer security vulnerabilities.
SC.912.CS.1.3 Evaluate computer security vulnerabilities.
SC.912.CS.2.1 Analyze security and privacy issues that relate to computer networks and network connected devices.
SC.912.CS.2.2 Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
SC.912.CS.2.3 Apply network security concepts and strategies to real-world simulations.
SC.912.CS.3.1 Investigate ransomware attacks.
SC.912.CS.3.2 Explore access control rules.
SC.912.CS.3.3 Analyze the limitations of a program’s temporary storage and the security vulnerabilities.
SC.912.CS.3.4 Trace the social engineering attack cycle.
SC.912.ET.1.1 Describe the emerging features of mobile devices, smart devices and vehicles.
SC.912.ET.1.2 Describe the physical and cognitive challenges faced by users when learning to use computer interfaces.
SC.912.ET.1.4 Examine device-to-device interactions that exclude human input.
SC.912.ET.1.7 Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
SC.912.HS.1.1 Identify potential dangers to an individual’s safety and security online.
SC.912.HS.1.2 Evaluate the consequences of cyberbullying.
SC.912.HS.1.3 Determine the consequences of inaction when witnessing unsafe Internet practices.
SC.912.HS.1.4 Examine the positive outcomes when someone reports suspicious behavior on the Internet.
SC.912.HS.1.5 Evaluate the risks to personal information while accessing the Internet.
SC.912.HS.1.6 Describe the impact of permissible privacy and security.
SC.912.HS.1.7 Construct strategies to combat cyberbullying or online harassment.
SC.912.HS.3.1 Discuss the permanency of data on the Internet.
SC.912.HS.3.2 Analyze how social media influences the digital footprint of individuals, communities and cultures.
SC.912.PE.1.1 Write code segments.
SC.912.PE.1.2 Create iterative and non-iterative structures within a program.
SC.912.PE.1.3 Create selection structures within a program.
SC.912.PE.1.4 Write a void function that does not return a value.
SC.912.PE.1.5 Write a non-void function that will return a value.
SC.912.PE.1.10 Write programs that validate user input.
SC.912.PE.1.15 Implement a program using an integrated development environment (IDE) commonly used.
SC.912.PE.1.16 Explain the distinction between a programming language’s standard library and the Application Programming Interface (API).
SC.912.PE.1.23 Compile, run, test and debug a digital artifact.
SC.912.PE.2.3 Compare techniques for analyzing massive data collections.
SC.912.PE.3.5 Differentiate automated testing platforms and their uses.
SC.912.PE.3.18 Explain the principles of cryptography.
SC.912.PE.3.19 Determine which encryption method is suitable for an intended task.
SC.912.TI.1.1 Analyze historical trends in hardware and software.
SC.912.TI.1.2 Identify ways to use technology to support lifelong learning.
SC.912.TI.1.9 Evaluate access and distribution of technology in a global society.
SC.912.TI.1.10 Analyze technology-related career paths.
SC.912.TI.1.12 Examine the history of networking devices.
SC.912.TI.2.1 Research how social media and technology can be used to distort, exaggerate or misrepresent information.
SC.912.TI.2.2 Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
SC.912.TI.2.3 Recognize the terms and policies associated with the use of public access points.
SC.912.TI.2.4 Explore the legal ramifications of technology use.
SC.912.TI.2.5 Describe and model the legal use of modern communication media and devices.
SC.912.TI.2.6 Evaluate the impacts of the irresponsible use of information on collaborative projects.
SC.912.TI.2.7 Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
SC.912.TI.2.8 Evaluate the consequences of misrepresenting digital work as your own.
SC.912.TI.2.9 Analyze how different categories of software licenses can be used to share and protect intellectual property.
SC.912.TI.2.10 Analyze how access to information may not include the right to distribute the information.
SC.912.TI.2.11 Utilize citation tools when using digital information.
SC.912.TI.2.12 Describe legal regulations that govern Internet usage and interaction.
SC.K12.CTR.1.1 Actively participate in effortful learning both individually and collaboratively.
SC.K12.CTR.2.1 Demonstrate understanding by decomposing a problem.
SC.K12.CTR.3.1 Complete tasks with digital fluency.
SC.K12.CTR.4.1 Express solutions as computational steps.
SC.K12.CTR.5.1 Create an algorithm to achieve a given goal.
SC.K12.CTR.6.1 Differentiate between usable data and miscellaneous information.
SC.K12.CTR.7.1 Solve real-life problems in science and engineering using computational thinking.
MA.K12.MTR.1.1 Actively participate in effortful learning both individually and collectively.
MA.K12.MTR.2.1 Demonstrate understanding by representing problems in multiple ways.
MA.K12.MTR.3.1 Complete tasks with mathematical fluency.
MA.K12.MTR.4.1 Engage in discussions that reflect on the mathematical thinking of self and others.
MA.K12.MTR.5.1 Use patterns and structure to help understand and connect mathematical concepts.
MA.K12.MTR.6.1 Assess the reasonableness of solutions.
MA.K12.MTR.7.1 Apply mathematics to real-world contexts.
ELA.K12.EE.1.1 Cite evidence to explain and justify reasoning.
ELA.K12.EE.2.1 Read and comprehend grade-level complex texts proficiently.
ELA.K12.EE.3.1 Make inferences to support comprehension.
ELA.K12.EE.4.1 Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
ELA.K12.EE.5.1 Use the accepted rules governing a specific format to create quality work.
ELA.K12.EE.6.1 Use appropriate voice and tone when speaking or writing.
ELD.K12.ELL.MA.1 English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.