K-12 Computer Science Standards

Montana 9-12

57 Standards

1

CS.AP.9-12.1

create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests;

2

CS.AP.9-12.2

describe how artificial intelligence drives many software and physical systems;

3

CS.AP.9-12.3

implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem;

4

CS.AP.9-12.4

use and adapt classic algorithms to solve computational problems;

5

CS.AP.9-12.5

evaluate algorithms in terms of their efficiency, correctness, and clarity;

6

CS.AP.9-12.6

use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables;

7

CS.AP.9-12.7

compare and contrast fundamental data structures and their uses;

8

CS.AP.9-12.8

justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made;

9

CS.AP.9-12.9

design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions;

10

CS.AP.9-12.10

decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects;

11

CS.AP.9-12.11

create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs;

12

CS.AP.9-12.12

construct solutions to problems using student-created procedures, modules, or objects;

13

CS.AP.9-12.13

analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution;

14

CS.AP.9-12.14

demonstrate code reuse by creating programming solutions using libraries and application programming interfaces;

15

CS.AP.9-12.15

systematically design and develop programs for broad audiences by incorporating feedback from users;

16

CS.AP.9-12.16

evaluate and refine computational artifacts to make them more usable and accessible;

17

CS.AP.9-12.17

design and develop computational artifacts working in team roles using collaborative tools;

18

CS.AP.9-12.18

document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs;

19

CS.AP.9-12.19

plan and develop programs for broad audiences using a software life cycle process;

20

CS.AP.9-12.20

explain security issues that might lead to compromised computer programs;

21

CS.AP.9-12.21

develop programs for multiple computing platforms;

22

CS.AP.9-12.22

use version control systems, integrated development environments, and collaborative tools and practices in a group software project;

23

CS.AP.9-12.23

develop and use a series of test cases to verify that a program performs according to its design specifications;

24

CS.AP.9-12.24

modify an existing program to add additional functionality and discuss intended and unintended implications;

25

CS.AP.9-12.25

evaluate key qualities of a program through a process such as a code review; and

26

CS.AP.9-12.26

compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.

27

CS.CS.9-12.1

explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects;

28

CS.CS.9-12.2

compare levels of abstraction and interactions between application software, system software, and hardware layers;

29

CS.CS.9-12.3

categorize the roles of operating system software;

30

CS.CS.9-12.4

develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and

31

CS.CS.9-12.5

illustrate ways computing systems implement logic, input, and output through hardware components.

32

CS.DA.9-12.1

create interactive data visualizations using software tools to help others better understand authentic phenomena;

33

CS.DA.9-12.2

use data analysis tools and techniques to identify patterns in data representing complex systems;

34

CS.DA.9-12.3

select data collection tools and techniques to generate data sets that support a claim or communicate information;

35

CS.DA.9-12.4

translate between different bit representations of authentic phenomena, including characters, numbers, and images;

36

CS.DA.9-12.5

evaluate the tradeoffs in how data elements are organized and where data is stored;

37

CS.DA.9-12.6

create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and

38

CS.DA.9-12.7

evaluate the ability of models and simulations to test and support the refinement of hypotheses.

39

CS.IC.9-12.1

evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices;

40

CS.IC.9-12.2

evaluate the ways computing technologies impact American Indian communities in Montana;

41

CS.IC.9-12.3

test and refine computational artifacts to reduce bias and equity deficits;

42

CS.IC.9-12.4

demonstrate ways a given algorithm applies to problems across disciplines;

43

CS.IC.9-12.5

evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society;

44

CS.IC.9-12.6

evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities;

45

CS.IC.9-12.7

predict how computational innovations that have revolutionized aspects of our culture might evolve;

46

CS.IC.9-12.8

use tools and methods to connect and work with others on a project including people in different cultures and career fields;

47

CS.IC.9-12.9

explain the beneficial and harmful effects that intellectual property laws can have on innovation;

48

CS.IC.9-12.10

explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;

49

CS.IC.9-12.11

evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and

50

CS.IC.9-12.12

debate laws and regulations that impact the development and use of software.

51

CS.NI.9-12.1

recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts;

52

CS.NI.9-12.2

explain tradeoffs when selecting and implementing cybersecurity recommendations;

53

CS.NI.9-12.3

compare ways software developers protect devices and information from unauthorized access;

54

CS.NI.9-12.4

evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology;

55

CS.NI.9-12.5

give examples to illustrate how sensitive data can be affected by malware and other attacks;

56

CS.NI.9-12.6

compare various security measures, considering tradeoffs between the usability and security of a computing system; and

57

CS.NI.9-12.7

discuss the issues that impact functionality.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program