ASSUMPTIONS
Time duration of one session: 1 hr Number of sessions per week: 5 sessions Total teaching hours for complete academic year: 5*4*5 = 100 hrs |
|
||||||
8 |
|||||||
|
|
|
|
|
|
|
|
Domain |
Week # |
Hours |
Student Learning Objectives |
|
|
|
|
Domain A: Computer Systems |
1 |
5 |
[SLO CS-12-A-01] Students will understand and explain the usability, dependability, security, and accessibility of devices, the systems they are integrated with [SLO CS-12-A-02] Students will understand and explain human interaction with computer systems in terms of usability, common problems, methods for improvements, and moral, ethical, social, economic and environmental implications [SLO CS-12-A-03] Identify and explain tradeoffs between the usability and security of computing systems [SLO CS-12-A-04] Recommend cybersecurity measures by considering different factors such as efficiency, cost, privacy, and ethics |
|
|
|
|
2 |
5 |
[SLO CS-12-B-01] Understand and evaluate the feasibility of computational solutions such as flowcharts and pseudocode |
|
|
|
|
|
Domain B: Computational Thinking & Algorithms |
3 |
5 |
[SLO CS-12-B-03] Identify and apply common decision algorithms such as binary trees. |
|
|
|
|
4 |
5 |
|
|
|
|
||
Domain C: Programming Fundamentals |
5 |
5 |
[SLO CS-12-C-01] Students should be able to understand how to solve various types of computing problems using appropriate programming paradigms. [SLO CS-12-C-02] Students should be able to use data structures in Python like lists. [SLO CS-12-C-03] Students should be able to use disk IO in Python to write to persistent storage. |
|
|
|
|
6 |
5 |
|
|
|
|
||
7 |
5 |
|
|
|
|
||
8 |
5 |
[SLO CS-12-C-04] Students should be able to implement complex algorithms that use lists etc. in Python |
|
|
|
|
|
9 |
5 |
|
|
|
|
||
10 |
5 |
|
|
|
|
||
Domain D: Data and Analysis |
11 |
5 |
[SLO CS-12-C-05] Students understand and apply different testing and debugging techniques to identify and fix bugs in their code |
|
|
|
|
12 |
5 |
[SLO CS-12-D-01] Students will be able to define and explain key machine learning models, usage and metrics with which model performance is measured and apply it to a data set to analyze a real world problem [SLO CS-12-D-02]Students will explain and create a data visualization using data visualization software (for example MS Excel, Google Sheets, Structured Query Language (SQL), Python, Tableau, or Matplotlib) |
|
|
|
|
|
13 |
5 |
|
|
|
|
||
14 |
5 |
[SLO CS-12-D-03] Students will be able to manipulate different datasets accessed from databases to create their own datasets and data variables Advanced SLO [SLO CS-12-D-04] Students will learn how to form hypotheses and perform hypothesis testing. Students will learn how to communicate findings using advanced data visuals and tie them back to back to hypotheses. |
|
|
|
|
|
15 |
5 |
|
|
|
|
||
Domain E: Applications of Computer Science |
16 |
5 |
[SLO CS-12-E-01] Students should be able to design ideas of applications relevant to Pakistan using IoTs, Cloud computing, and Blockchain [SLO CS-12-E-02] Students should be able to explain the limitations of different sensing and data collection techniques used by computers.
[SLO CS-12-E-03] Students should be able to evaluate why AI algorithms are processor intensive and the performance and accuracy tradeoffs of reducing dimensionality |
|
|
|
|
17 |
5 |
[SLO CS-12-E-04] Students should be able to describe neural networks and deep learning
[SLO CS-12-E-05] Students should be able to define Machine Learning techniques like decision trees, K-means, Linear regression, and Logistic regression. Students should be able to evaluate which of these techniques humans use for their own learning for specific problems
[SLO CS-12-E-06] Students should be able to evaluate scenarios that have data sharing and privacy conflicts and be able to suggest policy decisions that can help achieve acceptable compromises |
|
|
|
|
|
Domain F: Impacts of Computing |
18 |
5 |
[SLO CS-12-F-01] Identify and apply safe practices when collaborating on digital or online platforms. [SLO CS-12-F-02] Discuss common types of security problems (DDoS attack, ransomware, and spyware, viruses, phishing). Cover security topics such as 2FA, biometric verification, and secure techniques for transmitting data. [SLO CS-12-F-03] Collaborate on strategies to provide equity and equal access to information |
|
|
|
|
Domain G: Digital Literacy |
19 |
5 |
[SLO CS-12-G-01] Students will create an artifact that answers a research question, communicates results and conclusions through digital resources or tools |
|
|
|
|
20 |
5 |
|
|
|
|
||
21 |
5 |
|
|
|
|
||
|
|
105 |
|
|
|
|
|