Technology Standards
Browse the glossary using this index
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
M |
---|
MI.CS.1A.AP.08Model daily processes by creating and following algorithms (sets of step-by-step instructions) to complete tasks. | ||
MI.CS.1A.AP.09Model the way programs store and manipulate data by using numbers or other symbols to represent information. | ||
MI.CS.1A.AP.10Develop programs with sequences and simple loops, to express ideas or address a problem. | ||
MI.CS.1A.AP.11Decompose (break down) the steps needed to solve a problem into a precise sequence of instructions. | ||
MI.CS.1A.AP.12Develop plans that describe a program’s sequence of events, goals, and expected outcomes. | ||
MI.CS.1A.AP.13Give attribution when using the ideas and creations of others while developing programs. | ||
MI.CS.1A.AP.14Debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops. | ||
MI.CS.1A.AP.15Using correct terminology, describe steps taken and choices made during the iterative process of program development. | ||
MI.CS.1A.CS.01Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use. | ||
MI.CS.1A.CS.02Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware). | ||
MI.CS.1A.CS.03Describe basic hardware and software problems using accurate terminology. | ||
MI.CS.1A.DA.05Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. | ||
MI.CS.1A.DA.06Collect and present the same data in various visual formats. | ||
MI.CS.1A.DA.07Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. | ||
MI.CS.1A.IC.16Compare how people live and work before and after the implementation or adoption of new computing technology. | ||
MI.CS.1A.IC.17Work respectfully and responsibly with others online. | ||
MI.CS.1A.IC.18Keep login information private, and log off of devices appropriately. | ||
MI.CS.1A.NI.04Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access. | ||
MI.CS.1B.AP.08Compare and refine multiple algorithms for the same task and determine which is the most appropriate. | ||
MI.CS.1B.AP.09 | ||
MI.CS.1B.AP.10Create programs that include sequences, events, loops, and conditionals. | ||
MI.CS.1B.AP.11Decompose (break down) problems into smaller, manageable subproblems to facilitate the program development process. | ||
MI.CS.1B.AP.12Modify, remix, or incorporate portions of an existing program into one's own work, to develop something new or add more advanced features. | ||
MI.CS.1B.AP.13Use an iterative process to plan the development of a program by including others' perspectives and considering user preferences. | ||
MI.CS.1B.AP.14Observe intellectual property rights and give appropriate attribution when creating or remixing programs. | ||
MI.CS.1B.AP.15Test and debug (identify and fix errors) a program or algorithm to ensure it runs as intended. | ||
MI.CS.1B.AP.16Take on varying roles, with teacher guidance, when collaborating with peers during the design, implementation, and review stages of program development. | ||
MI.CS.1B.AP.17Describe choices made during program development using code comments, presentations, and demonstrations. | ||
MI.CS.1B.CS.01 | ||
MI.CS.1B.CS.02Model how computer hardware and software work together as a system to accomplish tasks. | ||
MI.CS.1B.CS.03Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. | ||
MI.CS.1B.DA.06Organize and present collected data visually to highlight relationships and support a claim. | ||
MI.CS.1B.DA.07Use data to highlight or propose cause-and-effect relationships, predict outcomes, or communicate an idea. | ||
MI.CS.1B.IC.18Discuss computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices. | ||
MI.CS.1B.IC.19Brainstorm ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. | ||
MI.CS.1B.IC.20Seek diverse perspectives for the purpose of improving computational artifacts. | ||
MI.CS.1B.IC.21Use public domain or creative commons media, and refrain from copying or using material created by others without permission. | ||
MI.CS.1B.NI.04Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination. | ||
MI.CS.1B.NI.05Discuss real-world cybersecurity problems and how personal information can be protected. | ||
MI.CS.2.AP.10Use flowcharts and/or pseudocode to address complex problems as algorithms. | ||
MI.CS.2.AP.11 | ||
MI.CS.2.AP.12Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. | ||
MI.CS.2.AP.13Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. | ||
MI.CS.2.AP.14Create procedures with parameters to organize code and make it easier to reuse. | ||
MI.CS.2.AP.15Seek and incorporate feedback from team members and users to refine a solution that meets user needs. | ||
MI.CS.2.AP.16Incorporate existing code, media, and libraries into original programs, and give attribution. | ||
MI.CS.2.AP.17Systematically test and refine programs using a range of test cases. | ||
MI.CS.2.AP.18Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. | ||
MI.CS.2.AP.19Document programs in order to make them easier to follow, test, and debug. | ||
MI.CS.2.CS.01 | ||
MI.CS.2.CS.02Design projects that combine hardware and software components to collect and exchange data. | ||
MI.CS.2.CS.03Systematically identify and fix problems with computing devices and their components. | ||
MI.CS.2.DA.07Represent data using multiple encoding schemes. | ||
MI.CS.2.DA.08Collect data using computational tools and transform the data to make it more useful and reliable. | ||
MI.CS.2.DA.09Refine computational models based on the data they have generated. | ||
MI.CS.2.IC.20Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. | ||
MI.CS.2.IC.21Discuss issues of bias and accessibility in the design of existing technologies. | ||
MI.CS.2.IC.22Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact. | ||
MI.CS.2.IC.23Describe tradeoffs between allowing information to be public and keeping information private and secure. | ||
MI.CS.2.NI.04Model the role of protocols in transmitting data across networks and the Internet. | ||
MI.CS.2.NI.05Explain how physical and digital security measures protect electronic information. | ||
MI.CS.2.NI.06Apply multiple methods of encryption to model the secure transmission of information. | ||
MI.CS.3A.AP.13Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. | ||
MI.CS.3A.AP.14Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. | ||
MI.CS.3A.AP.15Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. | ||
MI.CS.3A.AP.16Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. | ||
MI.CS.3A.AP.17Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. | ||
MI.CS.3A.AP.18Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. | ||
MI.CS.3A.AP.19Systematically design and develop programs for broad audiences by incorporating feedback from users. | ||
MI.CS.3A.AP.20Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. | ||
MI.CS.3A.AP.21Evaluate and refine computational artifacts to make them more usable and accessible. | ||
MI.CS.3A.AP.22Design and develop computational artifacts working in team roles using collaborative tools. | ||
MI.CS.3A.AP.23Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs. | ||
MI.CS.3A.CS.01Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. | ||
MI.CS.3A.CS.02Compare levels of abstraction and interactions between application software, system software, and hardware layers. | ||
MI.CS.3A.CS.03Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. | ||
MI.CS.3A.DA.09Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. | ||
MI.CS.3A.DA.10Evaluate the tradeoffs in how data elements are organized and where data is stored. | ||
MI.CS.3A.DA.11Create interactive data visualizations using software tools to help others better understand real-world phenomena. | ||
MI.CS.3A.DA.12Create computational models that represent the relationships among different elements of data collected from a phenomenon or process. | ||
MI.CS.3A.IC.24Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. | ||
MI.CS.3A.IC.25Test and refine computational artifacts to reduce bias and equity deficits. | ||
MI.CS.3A.IC.26Demonstrate ways a given algorithm applies to problems across disciplines. | ||
MI.CS.3A.IC.27Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. | ||
MI.CS.3A.IC.28Explain the beneficial and harmful effects that intellectual property laws can have on innovation. | ||
MI.CS.3A.IC.29Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. | ||
MI.CS.3A.IC.30Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. | ||
MI.CS.3A.NI.04Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. | ||
MI.CS.3A.NI.05Give examples to illustrate how sensitive data can be affected by malware and other attacks. | ||
MI.CS.3A.NI.06Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. | ||
MI.CS.3A.NI.07Compare various security measures, considering tradeoffs between the usability and security of a computing system. | ||
MI.CS.3A.NI.08Explain tradeoffs when selecting and implementing cybersecurity recommendations. | ||
MI.CS.3B.AP.08Describe how artificial intelligence drives many software and physical systems. | ||
MI.CS.3B.AP.09Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem. | ||
MI.CS.3B.AP.10Use and adapt classic algorithms to solve computational problems. | ||
MI.CS.3B.AP.11Evaluate algorithms in terms of their efficiency, correctness, and clarity. | ||
MI.CS.3B.AP.12Compare and contrast fundamental data structures and their uses. | ||
MI.CS.3B.AP.13Illustrate the flow of execution of a recursive algorithm. | ||
MI.CS.3B.AP.14Construct solutions to problems using student-created components, such as procedures, modules and/or objects. | ||
MI.CS.3B.AP.15Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution. | ||
MI.CS.3B.AP.16Demonstrate code reuse by creating programming solutions using libraries and APIs. | ||
MI.CS.3B.AP.17Plan and develop programs for broad audiences using a software life cycle process. | ||
MI.CS.3B.AP.18Explain security issues that might lead to compromised computer programs. | ||
MI.CS.3B.AP.19Develop programs for multiple computing platforms. | ||
MI.CS.3B.AP.20Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project. | ||
MI.CS.3B.AP.21Develop and use a series of test cases to verify that a program performs according to its design specifications. | ||
MI.CS.3B.AP.22Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality). | ||
MI.CS.3B.AP.23Evaluate key qualities of a program through a process such as a code review. | ||
MI.CS.3B.AP.24Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems. | ||
MI.CS.3B.CS.01Categorize the roles of operating system software. | ||
MI.CS.3B.CS.02Illustrate ways computing systems implement logic, input, and output through hardware components. | ||
MI.CS.3B.DA.05Use data analysis tools and techniques to identify patterns in data representing complex systems. | ||
MI.CS.3B.DA.06Select data collection tools and techniques to generate data sets that support a claim or communicate information. | ||
MI.CS.3B.DA.07Evaluate the ability of models and simulations to test and support the refinement of hypotheses. | ||
MI.CS.3B.IC.25Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society. | ||
MI.CS.3B.IC.26Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society. | ||
MI.CS.3B.IC.27Predict how computational innovations that have revolutionized aspects of our culture might evolve. | ||
MI.CS.3B.IC.28Debate laws and regulations that impact the development and use of software. | ||
MI.CS.3B.NI.03Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). | ||
MI.CS.3B.NI.04Compare ways software developers protect devices and information from unauthorized access. | ||