Technology Standards
Browse the glossary using this index
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
M |
---|
MI.CS.3A.IC.24Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. | ||
MI.CS.3A.IC.25Test and refine computational artifacts to reduce bias and equity deficits. | ||
MI.CS.3A.IC.26Demonstrate ways a given algorithm applies to problems across disciplines. | ||
MI.CS.3A.IC.27Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. | ||
MI.CS.3A.IC.28Explain the beneficial and harmful effects that intellectual property laws can have on innovation. | ||
MI.CS.3A.IC.29Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. | ||
MI.CS.3A.IC.30Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. | ||
MI.CS.3A.NI.04Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. | ||
MI.CS.3A.NI.05Give examples to illustrate how sensitive data can be affected by malware and other attacks. | ||
MI.CS.3A.NI.06Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. | ||