Technology Standards
Browse the glossary using this index
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
M |
---|
MI.CS.2.NI.05Explain how physical and digital security measures protect electronic information. | ||
MI.CS.2.NI.06Apply multiple methods of encryption to model the secure transmission of information. | ||
MI.CS.3A.AP.13Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. | ||
MI.CS.3A.AP.14Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. | ||
MI.CS.3A.AP.15Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. | ||
MI.CS.3A.AP.16Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. | ||
MI.CS.3A.AP.17Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. | ||
MI.CS.3A.AP.18Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. | ||
MI.CS.3A.AP.19Systematically design and develop programs for broad audiences by incorporating feedback from users. | ||
MI.CS.3A.AP.20Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. | ||