Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration. |
|
SC.912.CC.1.2
Utilize tools within a project environment to communicate. |
|
SC.912.CC.1.3
Present information and data using presentation software. |
|
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration. |
|
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources. |
|
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts. |
|
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability. |
|
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products. |
|
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks. |
|
SC.912.CO.1.2
Identify and select the file format based on trade-offs. |
|
SC.912.CO.1.3
Select and use the correct file type for specific tasks. |
|
SC.912.CO.1.4
Describe the relationship between drivers, hardware and operating systems. |
|
SC.912.CO.1.5
Describe the organization of a computer and its principal components. |
|
SC.912.CO.1.7
Describe the process of protecting computer hardware from exploitation. |
|
SC.912.CO.1.8
Describe how the Internet facilitates global communication. |
|
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources. |
|
SC.912.CO.2.1
Explore the function of Basic Input/Output System (BIOS) and Unified Extensible Firmware Interface (UEFI) in a computer. |
|
SC.912.CO.2.2
Explore motherboard variations. |
|
SC.912.CO.2.3
Discuss the central processing unit (CPU). |
|
SC.912.CO.2.4
Explore the role of a power supply unit (PSU) in relation to a computer system. |
|
SC.912.CO.2.5
Analyze the purpose of various random-access memory (RAM) speeds and storage sizes. |
|
SC.912.CO.2.7
Evaluate various forms of input and output (IO). |
|
SC.912.CO.2.8
Evaluate the basic components of wired computer networks. |
|
SC.912.CO.2.9
Evaluate the basic components of wireless computer networks. |
|
SC.912.CO.2.11
Investigate the issues that impact network functionality. |
|
SC.912.CO.2.12
Describe common network protocols. |
|
SC.912.CO.2.13
Discern how common network protocols are applied by client-server and peer-to-peer networks. |
|
SC.912.CO.2.14
Explore the role of dynamic host control protocol (DHCP) in a networking system. |
|
SC.912.CO.2.15
Analyze the importance of subnetting. |
|
SC.912.CO.2.16
Describe how devices are identified on a network. |
|
SC.912.CO.2.17
Identify similarities and differences between Internet protocol versions. |
|
SC.912.CO.2.18
Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks. |
|
SC.912.CO.3.1
Analyze various operating systems. |
|
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem. |
|
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software. |
|
SC.912.CO.3.4
Explain how automated software testing can reduce the cost of the testing effort. |
|
SC.912.CS.1.1
Identify possible risks to maintaining data confidentiality. |
|
SC.912.CS.1.2
Describe computer security vulnerabilities. |
|
SC.912.CS.1.3
Evaluate computer security vulnerabilities. |
|
SC.912.CS.2.1
Analyze security and privacy issues that relate to computer networks and network connected devices. |
|
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy. |
|
SC.912.CS.2.3
Apply network security concepts and strategies to real-world simulations. |
|
SC.912.CS.3.1
Investigate ransomware attacks. |
|
SC.912.CS.3.2
Explore access control rules. |
|
SC.912.CS.3.3
Analyze the limitations of a program’s temporary storage and the security vulnerabilities. |
|
SC.912.CS.3.4
Trace the social engineering attack cycle. |
|
SC.912.ET.1.1
Describe the emerging features of mobile devices, smart devices and vehicles. |
|
SC.912.ET.1.2
Describe the physical and cognitive challenges faced by users when learning to use computer interfaces. |
|
SC.912.ET.1.4
Examine device-to-device interactions that exclude human input. |
|
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life. |
|
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online. |
|
SC.912.HS.1.2
Evaluate the consequences of cyberbullying. |
|
SC.912.HS.1.3
Determine the consequences of inaction when witnessing unsafe Internet practices. |
|
SC.912.HS.1.4
Examine the positive outcomes when someone reports suspicious behavior on the Internet. |
|
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet. |
|
SC.912.HS.1.6
Describe the impact of permissible privacy and security. |
|
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment. |
|
SC.912.HS.3.1
Discuss the permanency of data on the Internet. |
|
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures. |
|
SC.912.PE.1.1
Write code segments. |
|
SC.912.PE.1.2
Create iterative and non-iterative structures within a program. |
|
SC.912.PE.1.3
Create selection structures within a program. |
|
SC.912.PE.1.4
Write a void function that does not return a value. |
|
SC.912.PE.1.5
Write a non-void function that will return a value. |
|
SC.912.PE.1.10
Write programs that validate user input. |
|
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used. |
|
SC.912.PE.1.16
Explain the distinction between a programming language’s standard library and the Application Programming Interface (API). |
|
SC.912.PE.1.23
Compile, run, test and debug a digital artifact. |
|
SC.912.PE.2.3
Compare techniques for analyzing massive data collections. |
|
SC.912.PE.3.5
Differentiate automated testing platforms and their uses. |
|
SC.912.PE.3.18
Explain the principles of cryptography. |
|
SC.912.PE.3.19
Determine which encryption method is suitable for an intended task. |
|
SC.912.TI.1.1
Analyze historical trends in hardware and software. |
|
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning. |
|
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society. |
|
SC.912.TI.1.10
Analyze technology-related career paths. |
|
SC.912.TI.1.12
Examine the history of networking devices. |
|
SC.912.TI.2.1
Research how social media and technology can be used to distort, exaggerate or misrepresent information. |
|
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines. |
|
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points. |
|
SC.912.TI.2.4
Explore the legal ramifications of technology use. |
|
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices. |
|
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects. |
|
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software. |
|
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own. |
|
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property. |
|
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information. |
|
SC.912.TI.2.11
Utilize citation tools when using digital information. |
|
SC.912.TI.2.12
Describe legal regulations that govern Internet usage and interaction. |
|
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively. |
|
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem. |
|
SC.K12.CTR.3.1
Complete tasks with digital fluency. |
|
SC.K12.CTR.4.1
Express solutions as computational steps. |
|
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal. |
|
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information. |
|
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking. |
|
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively. |
|
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways. |
|
MA.K12.MTR.3.1
Complete tasks with mathematical fluency. |
|
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others. |
|
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts. |
|
MA.K12.MTR.6.1
Assess the reasonableness of solutions. |
|
MA.K12.MTR.7.1
Apply mathematics to real-world contexts. |
|
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning. |
|
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently. |
|
ELA.K12.EE.3.1
Make inferences to support comprehension. |
|
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations. |
|
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work. |
|
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing. |
|
ELD.K12.ELL.MA.1
English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics. |
|