Standards in this Framework
Standard | Description |
---|---|
SC.912.CC.1.1 | Evaluate digital modes of communication and collaboration. |
SC.912.CC.1.2 | Utilize tools within a project environment to communicate. |
SC.912.CC.1.3 | Present information and data using presentation software. |
SC.912.CC.1.4 | Create a digital artifact utilizing collaboration, reflection, analysis and iteration. |
SC.912.CC.2.1 | Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources. |
SC.912.CC.2.2 | Assess how collaboration influences the design and development of software artifacts. |
SC.912.CC.2.3 | Evaluate program designs and implementations for readability and usability. |
SC.912.CC.2.4 | Critique the strengths and weaknesses of the collaborative process when creating digital products. |
SC.912.CO.1.1 | Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks. |
SC.912.CO.1.2 | Identify and select the file format based on trade-offs. |
SC.912.CO.1.4 | Describe the relationship between drivers, hardware and operating systems. |
SC.912.CO.1.5 | Describe the organization of a computer and its principal components. |
SC.912.CO.1.7 | Describe the process of protecting computer hardware from exploitation. |
SC.912.CO.1.8 | Describe how the Internet facilitates global communication. |
SC.912.CO.1.9 | Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources. |
SC.912.CO.2.3 | Discuss the central processing unit (CPU). |
SC.912.CO.2.4 | Explore the role of a power supply unit (PSU) in relation to a computer system. |
SC.912.CO.2.7 | Evaluate various forms of input and output (IO). |
SC.912.CO.2.8 | Evaluate the basic components of wired computer networks. |
SC.912.CO.2.9 | Evaluate the basic components of wireless computer networks. |
SC.912.CO.2.11 | Investigate the issues that impact network functionality. |
SC.912.CO.2.16 | Describe how devices are identified on a network. |
SC.912.CO.3.2 | Develop criteria for selecting software when solving a specific real-world problem. |
SC.912.CO.3.3 | Examine the difference between operating system (OS) software and application software. |
SC.912.CS.1.1 | Identify possible risks to maintaining data confidentiality. |
SC.912.CS.1.2 | Describe computer security vulnerabilities. |
SC.912.CS.1.3 | Evaluate computer security vulnerabilities. |
SC.912.CS.2.1 | Analyze security and privacy issues that relate to computer networks and network connected devices. |
SC.912.CS.2.2 | Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy. |
SC.912.CS.3.4 | Trace the social engineering attack cycle. |
SC.912.ET.1.1 | Describe the emerging features of mobile devices, smart devices and vehicles. |
SC.912.ET.1.2 | Describe the physical and cognitive challenges faced by users when learning to use computer interfaces. |
SC.912.ET.1.4 | Examine device-to-device interactions that exclude human input. |
SC.912.ET.1.5 | Explore the concepts of virtual and augmented reality. |
SC.912.ET.1.7 | Describe how technology has changed the way people build and manage organizations and how technology impacts personal life. |
SC.912.ET.2.1 | Explore the history of Artificial Intelligence (AI). |
SC.912.ET.2.5 | Describe major applications of artificial intelligence (AI) and machine learning. |
SC.912.ET.2.6 | Describe how predictive Artificial Intelligence (AI) can be used to solve problems. |
SC.912.ET.3.2 | Examine how robotics are used to address human challenges. |
SC.912.HS.1.1 | Identify potential dangers to an individual’s safety and security online. |
SC.912.HS.1.2 | Evaluate the consequences of cyberbullying. |
SC.912.HS.1.3 | Determine the consequences of inaction when witnessing unsafe Internet practices. |
SC.912.HS.1.4 | Examine the positive outcomes when someone reports suspicious behavior on the Internet. |
SC.912.HS.1.5 | Evaluate the risks to personal information while accessing the Internet. |
SC.912.HS.1.6 | Describe the impact of permissible privacy and security. |
SC.912.HS.1.7 | Construct strategies to combat cyberbullying or online harassment. |
SC.912.HS.2.1 | Prioritize regulating screen time and the use of electronic devices for mental and physical well-being. |
SC.912.HS.2.2 | Investigate the correlation between sedentary behavior and digital device use. |
SC.912.HS.2.3 | Assess the role of digital health trackers in promoting healthy behaviors. |
SC.912.HS.2.4 | Analyze the relationship between eye strain related to use of technology and exposure to increased blue light. |
SC.912.HS.3.1 | Discuss the permanency of data on the Internet. |
SC.912.HS.3.2 | Analyze how social media influences the digital footprint of individuals, communities and cultures. |
SC.912.PE.1.1 | Write code segments. |
SC.912.PE.1.2 | Create iterative and non-iterative structures within a program. |
SC.912.PE.1.3 | Create selection structures within a program. |
SC.912.PE.1.10 | Write programs that validate user input. |
SC.912.PE.1.12 | Classify programming languages. |
SC.912.PE.1.13 | Describe and identify types of programming errors. |
SC.912.PE.1.15 | Implement a program using an integrated development environment (IDE) commonly used. |
SC.912.PE.1.17 | Examine the building blocks of algorithms. |
SC.912.PE.1.18 | Develop a computer program. |
SC.912.PE.1.19 | Review a computer program to verify program functionality, programming styles, program usability and adherence to common programming standards. |
SC.912.PE.1.20 | Write programs that use standard logic operators. |
SC.912.PE.1.21 | Use Boolean logic to perform logical operations. |
SC.912.PE.1.23 | Compile, run, test and debug a digital artifact. |
SC.912.PE.2.3 | Compare techniques for analyzing massive data collections. |
SC.912.PE.3.1 | Evaluate arithmetic expressions using operator precedence. |
SC.912.PE.3.2 | Decompose a problem by defining new code segments. |
SC.912.PE.3.4 | Evaluate algorithms by their efficiency, correctness and clarity. |
SC.912.PE.3.11 | Perform advanced searches to locate information and design a data-collection approach to gather original data. |
SC.912.PE.3.14 | Analyze data by identifying patterns through modeling and simulation of real-world data. |
SC.912.PE.3.15 | Test the accuracy of scientific hypotheses using computer models and simulations. |
SC.912.PE.3.16 | Design a representation of a computer program. |
SC.912.PE.3.18 | Explain the principles of cryptography. |
SC.912.PE.4.5 | Define user prompts for clarity and usability within a program. |
SC.912.PE.4.6 | Write a program that utilizes both input and output. |
SC.912.PE.4.7 | Use internal documentation to collaboratively design a program according to accepted standards. |
SC.912.TI.1.1 | Analyze historical trends in hardware and software. |
SC.912.TI.1.2 | Identify ways to use technology to support lifelong learning. |
SC.912.TI.1.3 | Analyze the impact of digital media. |
SC.912.TI.1.4 | Analyze the impact of digital media on culture and persona. |
SC.912.TI.1.5 | Describe the impact of computing on business and commerce. |
SC.912.TI.1.6 | Describe how technology impacts personal life. |
SC.912.TI.1.7 | Evaluate ways in which technology may improve accessibility for the varying needs of learners, including students with disabilities (SWD). |
SC.912.TI.1.8 | Explain how economic and societal factors are affected by access to critical information. |
SC.912.TI.1.9 | Evaluate access and distribution of technology in a global society. |
SC.912.TI.1.10 | Analyze technology-related career paths. |
SC.912.TI.1.12 | Examine the history of networking devices. |
SC.912.TI.1.13 | Examine the historical impact of social media. |
SC.912.TI.2.1 | Research how social media and technology can be used to distort, exaggerate or misrepresent information. |
SC.912.TI.2.2 | Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines. |
SC.912.TI.2.3 | Recognize the terms and policies associated with the use of public access points. |
SC.912.TI.2.4 | Explore the legal ramifications of technology use. |
SC.912.TI.2.5 | Describe and model the legal use of modern communication media and devices. |
SC.912.TI.2.6 | Evaluate the impacts of the irresponsible use of information on collaborative projects. |
SC.912.TI.2.7 | Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software. |
SC.912.TI.2.8 | Evaluate the consequences of misrepresenting digital work as your own. |
SC.912.TI.2.9 | Analyze how different categories of software licenses can be used to share and protect intellectual property. |
SC.912.TI.2.10 | Analyze how access to information may not include the right to distribute the information. |
SC.912.TI.2.11 | Utilize citation tools when using digital information. |
SC.K12.CTR.1.1 | Actively participate in effortful learning both individually and collaboratively. |
SC.K12.CTR.2.1 | Demonstrate understanding by decomposing a problem. |
SC.K12.CTR.3.1 | Complete tasks with digital fluency. |
SC.K12.CTR.4.1 | Express solutions as computational steps. |
SC.K12.CTR.5.1 | Create an algorithm to achieve a given goal. |
SC.K12.CTR.6.1 | Differentiate between usable data and miscellaneous information. |
SC.K12.CTR.7.1 | Solve real-life problems in science and engineering using computational thinking. |
MA.K12.MTR.1.1 | Actively participate in effortful learning both individually and collectively. |
MA.K12.MTR.2.1 | Demonstrate understanding by representing problems in multiple ways. |
MA.K12.MTR.3.1 | Complete tasks with mathematical fluency. |
MA.K12.MTR.4.1 | Engage in discussions that reflect on the mathematical thinking of self and others. |
MA.K12.MTR.5.1 | Use patterns and structure to help understand and connect mathematical concepts. |
MA.K12.MTR.6.1 | Assess the reasonableness of solutions. |
MA.K12.MTR.7.1 | Apply mathematics to real-world contexts. |
ELA.K12.EE.1.1 | Cite evidence to explain and justify reasoning. |
ELA.K12.EE.2.1 | Read and comprehend grade-level complex texts proficiently. |
ELA.K12.EE.3.1 | Make inferences to support comprehension. |
ELA.K12.EE.4.1 | Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations. |
ELA.K12.EE.5.1 | Use the accepted rules governing a specific format to create quality work. |
ELA.K12.EE.6.1 | Use appropriate voice and tone when speaking or writing. |
ELD.K12.ELL.SI.1 | English language learners communicate for social and instructional purposes within the school setting. |