K-12 Computer Science Standards

Nevada Advanced Computer Science 1

59 Standards

1

1.1.1

Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law

2

1.1.2

Research nationally recognized CTSOs

3

1.1.3

Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS])

4

1.2.1

Discuss the purpose of parliamentary procedure

5

1.2.2

Demonstrate the proper use of parliamentary procedure

6

1.2.3

Differentiate between an office and a committee

7

1.2.4

Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions

8

1.2.5

Participate in local, regional, state, or national conferences, events, or competitions

9

1.2.6

Describe the importance of a constitution and bylaws to the operation of a CTSO chapter

10

1.3.1

Explore opportunities in community service-related work-based learning (WBL)

11

1.3.2

Participate in a service learning (program related) and/or community service project or activity

12

1.3.3

Engage with business and industry partners for community service

13

1.4.1

Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills)

14

1.4.2

Describe the appropriate professional/workplace attire and its importance

15

1.4.3

Investigate industry-standard credentials/certifications available within this Career Clusterâ„¢

16

1.4.4

Participate in authentic contextualized instructional activities

17

1.4.5

Demonstrate technical skills in various student organization activities/events

18

1.5.1

Make a connection between program standards to career pathway(s)

19

1.5.2

Explain the importance of participation and completion of a program of study

20

1.5.3

Promote community awareness of local student organizations associated with CTE programs

21

2.1.1

Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests

22

2.1.2

Describe how artificial intelligence drives many software and physical systems

23

2.1.4

Use and adapt classic algorithms to solve computational problems

24

2.2.1

Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made

25

2.2.2

Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions

26

2.3.1

Demonstrate the use of both LinkedLists and ArrayLists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables

27

2.3.2

Compare and contrast fundamental data structures and their uses

28

2.3.3

Implement arrays in code

29

2.3.4

Implement ArrayLists and LinkedLists in code

30

2.3.5

Implement type-safe variables

31

2.4.1

Decompose problems into smaller components through systematic analysis using constructs such as procedures, modules, and/or objects

32

2.4.2

Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs

33

2.5.1

Systematically design and develop programs for broad audiences by incorporating feedback from users

34

2.5.2

Evaluate software licenses that limit or restrict the use of computational artifacts when using resources such as libraries

35

2.5.3

Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities

36

2.5.4

Design and develop computational artifacts while working in team roles and using collaborative tools

37

2.5.5

Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs

38

3.1.1

Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects

39

3.2.1

Compare levels of abstraction and interactions between application software, system software, and hardware layers

40

3.2.2

Categorize the roles of operating system software

41

3.3.1

Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors

42

3.3.2

Illustrate ways computing systems implement logic, input, and output through hardware components

43

4.1.1

Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation)

44

4.1.2

Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images

45

4.2.1

Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena

46

4.2.2

Use data analysis tools and techniques to identify patterns in data representing complex systems

47

5.1.1

Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices

48

5.1.2

Test and refine computational artifacts to reduce bias and equity deficits

49

5.1.3

Demonstrate ways a given algorithm applies to problems across disciplines

50

5.1.4

Explain the potential impacts of artificial intelligence on society

51

5.2.1

Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields

52

5.2.2

Use tools and methods for collaboration to increase the productivity of a team

53

5.3.1

Explain the beneficial and harmful effects that intellectual property laws can have on innovation

54

5.3.2

Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users

55

5.3.3

Evaluate the social and economic implications of privacy in the context of safety, law, or ethics

56

6.2.1

Illustrate how sensitive data can be affected by malware and other attacks

57

6.2.2

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts

58

6.2.3

Compare various security measures, considering tradeoffs between the usability and security of a computing system

59

6.2.4

Explain tradeoffs when selecting and implementing cybersecurity recommendations

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program