Grades
Standard
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Compare ways software developers protect devices and information from unauthorized access.
Use data analysis tools and techniques to identify patterns in data representing complex systems.
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
Describe tradeoffs between allowing information to be public and keeping information private and secure.
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
Compare levels of abstraction and interactions between application software, system software, and hardware layers.
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
Evaluate the tradeoffs in how data elements are organized and where data is stored.
Create interactive data visualizations using software tools to help others better understand real-world phenomena.
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and [...]
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events [...]
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
Systematically design and develop programs for broad audiences by incorporating feedback from users.
Systematically identify and fix problems with computing devices and their components.
Model the role of protocols in transmitting data across networks and the Internet.
Explain how physical and digital security measures protect electronic information.
Apply multiple methods of encryption to model the secure transmission of information.
Collect data using computational tools and transform the data to make it more useful and reliable.
Refine computational models based on the data they have generated.
Use flowcharts and/or pseudocode to address complex problems as algorithms.
Create clearly named variables that represent different data types and perform operations on their values.
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
Create procedures with parameters to organize code and make it easier to reuse.
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
Incorporate existing code, media, and libraries into original programs, and give attribution.
Systematically test and refine programs using a range of test cases.
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
Document programs in order to make them easier to follow, test, and debug.
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
Discuss issues of bias and accessibility in the design of existing technologies.
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, [...]
Discuss real-world cybersecurity problems and how personal information can be protected.
Organize and present collected data visually to highlight relationships and support a claim.
Grades
Standard
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Compare ways software developers protect devices and information from unauthorized access.
Use data analysis tools and techniques to identify patterns in data representing complex systems.
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
Describe tradeoffs between allowing information to be public and keeping information private and secure.
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
Compare levels of abstraction and interactions between application software, system software, and hardware layers.
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
Evaluate the tradeoffs in how data elements are organized and where data is stored.
Create interactive data visualizations using software tools to help others better understand real-world phenomena.
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and [...]
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events [...]
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
Systematically design and develop programs for broad audiences by incorporating feedback from users.
Systematically identify and fix problems with computing devices and their components.
Model the role of protocols in transmitting data across networks and the Internet.
Explain how physical and digital security measures protect electronic information.
Apply multiple methods of encryption to model the secure transmission of information.
Collect data using computational tools and transform the data to make it more useful and reliable.
Refine computational models based on the data they have generated.
Use flowcharts and/or pseudocode to address complex problems as algorithms.
Create clearly named variables that represent different data types and perform operations on their values.
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
Create procedures with parameters to organize code and make it easier to reuse.
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
Incorporate existing code, media, and libraries into original programs, and give attribution.
Systematically test and refine programs using a range of test cases.
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
Document programs in order to make them easier to follow, test, and debug.
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
Discuss issues of bias and accessibility in the design of existing technologies.
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, [...]
Discuss real-world cybersecurity problems and how personal information can be protected.
Organize and present collected data visually to highlight relationships and support a claim.