Standards in this Framework
Standard | Description |
---|---|
SC.912.CC.1.1 | Evaluate digital modes of communication and collaboration. |
SC.912.CC.1.2 | Utilize tools within a project environment to communicate. |
SC.912.CC.1.3 | Present information and data using presentation software. |
SC.912.CC.1.4 | Create a digital artifact utilizing collaboration, reflection, analysis and iteration. |
SC.912.CC.2.1 | Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources. |
SC.912.CC.2.2 | Assess how collaboration influences the design and development of software artifacts. |
SC.912.CC.2.3 | Evaluate program designs and implementations for readability and usability. |
SC.912.CC.2.4 | Critique the strengths and weaknesses of the collaborative process when creating digital products. |
SC.912.CO.1.1 | Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks. |
SC.912.CO.1.2 | Identify and select the file format based on trade-offs. |
SC.912.CO.1.3 | Select and use the correct file type for specific tasks. |
SC.912.CO.1.4 | Describe the relationship between drivers, hardware and operating systems. |
SC.912.CO.1.5 | Describe the organization of a computer and its principal components. |
SC.912.CO.1.7 | Describe the process of protecting computer hardware from exploitation. |
SC.912.CO.1.8 | Describe how the Internet facilitates global communication. |
SC.912.CO.1.9 | Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources. |
SC.912.CO.2.1 | Explore the function of Basic Input/Output System (BIOS) and Unified Extensible Firmware Interface (UEFI) in a computer. |
SC.912.CO.2.2 | Explore motherboard variations. |
SC.912.CO.2.3 | Discuss the central processing unit (CPU). |
SC.912.CO.2.4 | Explore the role of a power supply unit (PSU) in relation to a computer system. |
SC.912.CO.2.5 | Analyze the purpose of various random-access memory (RAM) speeds and storage sizes. |
SC.912.CO.2.7 | Evaluate various forms of input and output (IO). |
SC.912.CO.2.8 | Evaluate the basic components of wired computer networks. |
SC.912.CO.2.9 | Evaluate the basic components of wireless computer networks. |
SC.912.CO.2.11 | Investigate the issues that impact network functionality. |
SC.912.CO.2.12 | Describe common network protocols. |
SC.912.CO.2.13 | Discern how common network protocols are applied by client-server and peer-to-peer networks. |
SC.912.CO.2.14 | Explore the role of dynamic host control protocol (DHCP) in a networking system. |
SC.912.CO.2.15 | Analyze the importance of subnetting. |
SC.912.CO.2.16 | Describe how devices are identified on a network. |
SC.912.CO.2.17 | Identify similarities and differences between Internet protocol versions. |
SC.912.CO.2.18 | Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks. |
SC.912.CO.3.1 | Analyze various operating systems. |
SC.912.CO.3.2 | Develop criteria for selecting software when solving a specific real-world problem. |
SC.912.CO.3.3 | Examine the difference between operating system (OS) software and application software. |
SC.912.CO.3.4 | Explain how automated software testing can reduce the cost of the testing effort. |
SC.912.CS.1.1 | Identify possible risks to maintaining data confidentiality. |
SC.912.CS.1.2 | Describe computer security vulnerabilities. |
SC.912.CS.1.3 | Evaluate computer security vulnerabilities. |
SC.912.CS.2.1 | Analyze security and privacy issues that relate to computer networks and network connected devices. |
SC.912.CS.2.2 | Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy. |
SC.912.CS.2.3 | Apply network security concepts and strategies to real-world simulations. |
SC.912.CS.3.1 | Investigate ransomware attacks. |
SC.912.CS.3.2 | Explore access control rules. |
SC.912.CS.3.3 | Analyze the limitations of a program’s temporary storage and the security vulnerabilities. |
SC.912.CS.3.4 | Trace the social engineering attack cycle. |
SC.912.ET.1.1 | Describe the emerging features of mobile devices, smart devices and vehicles. |
SC.912.ET.1.2 | Describe the physical and cognitive challenges faced by users when learning to use computer interfaces. |
SC.912.ET.1.4 | Examine device-to-device interactions that exclude human input. |
SC.912.ET.1.7 | Describe how technology has changed the way people build and manage organizations and how technology impacts personal life. |
SC.912.HS.1.1 | Identify potential dangers to an individual’s safety and security online. |
SC.912.HS.1.2 | Evaluate the consequences of cyberbullying. |
SC.912.HS.1.3 | Determine the consequences of inaction when witnessing unsafe Internet practices. |
SC.912.HS.1.4 | Examine the positive outcomes when someone reports suspicious behavior on the Internet. |
SC.912.HS.1.5 | Evaluate the risks to personal information while accessing the Internet. |
SC.912.HS.1.6 | Describe the impact of permissible privacy and security. |
SC.912.HS.1.7 | Construct strategies to combat cyberbullying or online harassment. |
SC.912.HS.3.1 | Discuss the permanency of data on the Internet. |
SC.912.HS.3.2 | Analyze how social media influences the digital footprint of individuals, communities and cultures. |
SC.912.PE.1.1 | Write code segments. |
SC.912.PE.1.2 | Create iterative and non-iterative structures within a program. |
SC.912.PE.1.3 | Create selection structures within a program. |
SC.912.PE.1.4 | Write a void function that does not return a value. |
SC.912.PE.1.5 | Write a non-void function that will return a value. |
SC.912.PE.1.10 | Write programs that validate user input. |
SC.912.PE.1.15 | Implement a program using an integrated development environment (IDE) commonly used. |
SC.912.PE.1.16 | Explain the distinction between a programming language’s standard library and the Application Programming Interface (API). |
SC.912.PE.1.23 | Compile, run, test and debug a digital artifact. |
SC.912.PE.2.3 | Compare techniques for analyzing massive data collections. |
SC.912.PE.3.5 | Differentiate automated testing platforms and their uses. |
SC.912.PE.3.18 | Explain the principles of cryptography. |
SC.912.PE.3.19 | Determine which encryption method is suitable for an intended task. |
SC.912.TI.1.1 | Analyze historical trends in hardware and software. |
SC.912.TI.1.2 | Identify ways to use technology to support lifelong learning. |
SC.912.TI.1.9 | Evaluate access and distribution of technology in a global society. |
SC.912.TI.1.10 | Analyze technology-related career paths. |
SC.912.TI.1.12 | Examine the history of networking devices. |
SC.912.TI.2.1 | Research how social media and technology can be used to distort, exaggerate or misrepresent information. |
SC.912.TI.2.2 | Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines. |
SC.912.TI.2.3 | Recognize the terms and policies associated with the use of public access points. |
SC.912.TI.2.4 | Explore the legal ramifications of technology use. |
SC.912.TI.2.5 | Describe and model the legal use of modern communication media and devices. |
SC.912.TI.2.6 | Evaluate the impacts of the irresponsible use of information on collaborative projects. |
SC.912.TI.2.7 | Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software. |
SC.912.TI.2.8 | Evaluate the consequences of misrepresenting digital work as your own. |
SC.912.TI.2.9 | Analyze how different categories of software licenses can be used to share and protect intellectual property. |
SC.912.TI.2.10 | Analyze how access to information may not include the right to distribute the information. |
SC.912.TI.2.11 | Utilize citation tools when using digital information. |
SC.912.TI.2.12 | Describe legal regulations that govern Internet usage and interaction. |
SC.K12.CTR.1.1 | Actively participate in effortful learning both individually and collaboratively. |
SC.K12.CTR.2.1 | Demonstrate understanding by decomposing a problem. |
SC.K12.CTR.3.1 | Complete tasks with digital fluency. |
SC.K12.CTR.4.1 | Express solutions as computational steps. |
SC.K12.CTR.5.1 | Create an algorithm to achieve a given goal. |
SC.K12.CTR.6.1 | Differentiate between usable data and miscellaneous information. |
SC.K12.CTR.7.1 | Solve real-life problems in science and engineering using computational thinking. |
MA.K12.MTR.1.1 | Actively participate in effortful learning both individually and collectively. |
MA.K12.MTR.2.1 | Demonstrate understanding by representing problems in multiple ways. |
MA.K12.MTR.3.1 | Complete tasks with mathematical fluency. |
MA.K12.MTR.4.1 | Engage in discussions that reflect on the mathematical thinking of self and others. |
MA.K12.MTR.5.1 | Use patterns and structure to help understand and connect mathematical concepts. |
MA.K12.MTR.6.1 | Assess the reasonableness of solutions. |
MA.K12.MTR.7.1 | Apply mathematics to real-world contexts. |
ELA.K12.EE.1.1 | Cite evidence to explain and justify reasoning. |
ELA.K12.EE.2.1 | Read and comprehend grade-level complex texts proficiently. |
ELA.K12.EE.3.1 | Make inferences to support comprehension. |
ELA.K12.EE.4.1 | Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations. |
ELA.K12.EE.5.1 | Use the accepted rules governing a specific format to create quality work. |
ELA.K12.EE.6.1 | Use appropriate voice and tone when speaking or writing. |
ELD.K12.ELL.MA.1 | English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics. |