Please enable JavaScript to use CodeHS

Standards Framework

for CSTA HS

46

Standards in this Framework

Standard Description
HS-ALG-PS-01 Design an algorithm using appropriate data structures to solve a problem or express ideas.
HS-ALG-PS-02 Optimize the design of an algorithm using procedural abstraction and control structures.
HS-ALG-PS-03 Evaluate algorithms for efficiency, correctness, and clarity, using metrics or test cases.
HS-ALG-PS-04 Describe the differences between deterministic and probabilistic algorithms.
HS-ALG-PS-05 Evaluate AI-generated output to assess bias, accuracy, and potential harms.
HS-ALG-ML-06 Justify the selection of a type of AI algorithm to accomplish a task.
HS-ALG-ML-07 Evaluate training data by examining its source, quality, representativeness, potential biases, and privacy implications.
HS-ALG-ML-08 Develop a machine learning model for a chosen task using appropriate data and tools.
HS-ALG-IM-09 Design computing technologies using human-centered design principles.
HS-ALG-IM-10 Evaluate the ethical implications, societal impacts, and potential biases of rule-based and data-driven algorithms.
HS-ALG-IM-11 Articulate the values embedded in the design of algorithmic systems.
HS-PRO-PD-12 Create a modular program that uses procedures, external libraries, or objects to improve reusability and readability.
HS-PRO-PD-13 Use documentation, libraries, Application Programming Interfaces (APIs), and other tools in program development.
HS-PRO-PD-14 Apply appropriate attribution and respect intellectual property when developing computing technologies.
HS-PRO-PD-15 Collaborate on a programming project using a defined workflow that includes design documentation and clear task roles.
HS-PRO-VD-16 Create a program that uses appropriate data structures to store, access, and manipulate data.
HS-PRO-RD-17 Analyze how a segment of code works, including the role of parameters, return values, and data structures.
HS-PRO-RD-18 Evaluate AI-generated code for accuracy, reliability, and alignment with program requirements.
HS-PRO-TR-19 Evaluate a computing technology's alignment with design specifications and responsible design values, including its correctness, effectiveness, and user experience.
HS-PRO-TR-20 Refine a computing technology based on user feedback, testing results, and responsible design values to improve its effectiveness and impact.
HS-DAT-DC-21 Use a digital tool to generate simulated data that fits certain parameters for use in simulations.
HS-DAT-DC-22 Create a data dictionary that describes the names and types of attributes, allowable values/ranges for each attribute, and logical relationships between variables in a dataset.
HS-DAT-DC-23 Use a digital tool to clean and organize text-based data.
HS-DAT-DC-24 Evaluate different approaches to verifying consistency and compliance with expected data types, values, and ranges.
HS-DAT-DI-25 Use computational tools to create data visualizations of multivariate data sets to answer a question, classify, or make predictions.
HS-DAT-DI-26 Evaluate data simulations and data visualizations to answer data questions, inform decision-making, and identify potential limitations.
HS-DAT-IM-27 Evaluate the societal, environmental, and ethical implications of large-scale data collection and processing, including AI applications.
HS-DAT-IM-28 Debate the efficacy of policies and regulations to ensure responsible data use.
HS-SYS-HW-29 Differentiate operating systems (OS) as a special type of software that manages both the hardware and other software components of a computing system, including handling memory and peripherals.
HS-SYS-HW-30 Demonstrate the capabilities and limitations of a physical or simulated computing device to address a task or problem.
HS-SYS-SE-31 Identify different types of cybersecurity and physical security measures and the trade-offs for users, data, and devices.
HS-SYS-SE-32 Classify the causes and impacts of security breaches and social engineering attacks for individuals, industries, communities, and governments.
HS-SYS-SE-33 Formulate a solution to a security flaw in a given system.
HS-SYS-NT-34 Diagram a network of computing systems, including hardware and software.
HS-SYS-NT-35 Analyze how the internet functions as a network of networks and how it differs from other types of networks.
HS-SYS-IM-36 Evaluate the rationales behind laws and policies governing the design and use of computing systems.
HS-SYS-IM-37 Investigate how computing systems and infrastructure impact society and the environment, identifying who is affected and why.
HS-SOC-HI-38 Analyze the historical trajectory of specific computing technologies and how their development is linked to societal and environmental factors.
HS-SOC-HI-39 Propose modifications to existing policies and legislation that encourage ethical innovation and minimize societal risks associated with technology.
HS-SOC-ET-40 Evaluate the fundamental technological differences between an emerging technology and established technologies and how those differences influence computing.
HS-SOC-ET-41 Evaluate the societal and environmental impacts of emerging technologies, including those that lead to inequities in access and outcomes.
HS-SOC-ET-42 Design a conceptual solution to a real-world problem using an emerging technology, analyzing its potential benefits and harms.
HS-SOC-HU-43 Evaluate how human choices in using, designing, deploying, and regulating computing technologies have risks, benefits, and long-term impacts.
HS-SOC-HU-44 Debate perspectives on differences between human and artificial intelligence and their implications for consciousness, ethics, and human responsibility.
HS-SOC-CE-45 Analyze how diverse teams of people use computational thinking and technologies to solve problems.
HS-SOC-CE-46 Connect computing knowledge and skills acquired to students' personal goals and career aspirations.