The focus should be on how computing technologies can both perpetuate inequalities and help to bring about equity in society.
Ideas:
9-12.IC.2 Debate laws and regulations that impact the development and use of computing technologies and digital information.
The focus is on developing and defending a claim about how a specific law related to computing technologies impacts different stakeholders.
The focus is on developing and defending a claim about a specific ethical dilemma related to computing technologies.
Ideas:
MIT AI Ethics
The focus is on discussing the personal and societal benefits and drawbacks of different types of data collection and use, in terms of ethics, policy, and culture.
Ideas:
The focus is on applying an understanding of bias and ethical design in order to make recommendations for designing with inclusivity and social good in mind.
Ideas:
At this level, considering accessibility becomes part of the design process and awareness of professionally accepted accessibility standards.
At this level, the focus is on making connections between computer science and the fields of interest of individual students.
Ideas:
Students can explore cybersecurity jobs on this site
The focus is on using data to build alternative numerical models that can best represent a data set.
Ideas:
The emphasis is on designing and following collection protocols. Data sources include, but are not limited to sensors, web or database scrapers, and human input.
Ideas:
The emphasis is on refining large data sets to create multiple narratives depending upon the audience. Large data sets require use of a software tool or app to cross reference, analyze, refine, and visualize subsets of the data.
Ideas:
The focus is on having students think about how to decompose a programming problem into functions and procedures, including working around the constraints imposed by specific functions or features provided in a library.
The focus is on understanding that the same abstract concept can be performed in different ways in a program, as long as the same inputs yield the same results.
The focus of this standard is a high-level understanding that algorithms involve tradeoffs, especially related to memory use and speed. Students should understand that classic algorithms are solved problems that can be reused.
Ideas:
The focus is on updating the elements or components within a named instance of a data structure, without changing the value associated with the name itself.
Ideas:
The focus is on combining different forms of repetition and conditionals, including conditionals with complex Boolean expressions.
The emphasis is on perseverance and the ability to use different test cases on their programs and identify what issues are being tested in each case.
The focus is on the collaborative aspect of software development, as well as the importance of documenting the development process such that the reasons behind various development decisions can be understood by other software developers.
The emphasis is on designing (but not necessarily creating) solutions with embedded systems. Systems can be biological, mechanical, social, or some other type of system. Designs could include written descriptions, drawings, and/or 3D prototypes.
Ideas:
Knowledge of specific advanced terms of computer architecture and how specific levels work is not required. Rather the progression, in general terms, from voltage to binary signal to logic gates and so on to the level of human interaction, should be explored.
Ideas:
Some examples of multi-step troubleshooting problems include resolving connectivity problems, adjusting system configurations and settings, ensuring hardware and software compatibility, and transferring data from one device to another.
The focus is on understanding the design decisions that direct the coordination among systems composing the Internet that allow for scalability and reliability. Discussions should consider historical, cultural, and economic decisions related to the development of the Internet, as well as the core components of servers and routers.
The focus is on discussing how specific emerging technologies impact networks in terms of scale, access, reliability, and security, and user behavior.
Ideas:
The emphasis is on identifying both personal information and organizational information, and devices and embedded systems, that an individual may have access to and that adversaries may want to compromise, obtain, or leverage.
Ideas:
The emphasis is on considering the CIA Triad when recommending safeguards for a specific application or device.
Ideas:
The focus is on making security recommendations and discussing trade-offs between the degree of confidentiality, the need for data integrity, the availability of information for legitimate use, and assurance that the information provided is genuine.
The focus is on analyzing the role that cryptography and data security play in events that have shaped history and impact the future.
Ideas:
Explore how many characters one needs to have the most secure password
The emphasis is on analyzing different types of breaches and planning appropriate actions that might be taken to prevent and respond to a security breach.
Ideas:
Explore scholarship opportunities for cybersecurity careers
The focus is to demonstrate proficient keyboarding skills by the end of 12th grade.
Digital tools and methods should include both social and professional (those predominantly used in college and careers). Collaboration should occur in real time and asynchronously, and there should be opportunities for students to both seek and provide feedback on their thoughts and products.
Ideas:
Mastery of this standard implies an ability to choose and use the technology tool or resource best suited for a task or purpose.
New technologies could include different tools for collaboration, creation, etc. that the student has not used before. Platforms could include devices running different operating systems or could be emerging STEAM technologies. Digitally fluent individuals can move between platforms and can use that knowledge when encountering new technology.
Active management implies an understanding of how intentional and unintentional actions can affect a digital presence.
Strategies that support positive mental health in the digital world include both ways to avoid or handle cyberbullying and ways to interact positively and constructively with others in connected spaces.