Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CSCS.Y1.1.1
Leverage problem-solving strategies to solve problems of level-appropriate complexity |
|
CSCS.Y1.1.2
Analyze and utilize multiple representations of problem-solving logic used to solve problems of appropriate complexity |
|
CSCS.Y1.1.3
Analyze and utilize collaborative methods in problem solving of level-appropriate complexity |
|
CSCS.Y1.1.4
Analyze and utilize level-appropriate troubleshooting strategies for hardware and software |
|
CSCS.Y1.2.1
Interpret relational and logical expressions of level-appropriate complexity using comparison and Boolean operators |
|
CSCS.Y1.2.2
Classify the types of information that can be stored as variables and analyze the appropriateness of each (e.g., Booleans, characters, integers, floating points, strings) |
|
CSCS.Y1.2.3
Analyze how computer science concepts relate to the field of mathematics |
|
CSCS.Y1.2.4
Discuss and apply concepts of abstraction |
|
CSCS.Y1.2.5
Perform operations of level-appropriate complexity with binary, decimal, and hexadecimal numbers |
|
CSCS.Y1.2.6
Demonstrate operator precedence in expressions and statements |
|
CSCS.Y1.3.1
Define, store, access, and manipulate level-appropriate data (e.g., primitive, linear) |
|
CSCS.Y1.3.2
Define and discuss different examples of level-appropriate quantitative and qualitative data |
|
CSCS.Y1.3.4
Analyze, utilize, and visually represent level-appropriate data |
|
CSCS.Y1.3.5
Perform level-appropriate data analysis using computing tool |
|
CSCS.Y1.4.1
Identify the five pillars of cybersecurity and evaluate the relevance of each pillar to computer science concepts |
|
CSCS.Y1.4.2
Research and describe different roles within the hacking community (e.g., white hat, black hat, gray hat hacking), including positive and negative motivations, significant impacts, and social stereotypes |
|
CSCS.Y1.4.3
Research and describe the impacts of ransomware, trojans, viruses, and other malware |
|
CSCS.Y1.4.4
Explain implications related to identification and responsible reporting of a vulnerability versus exploitation |
|
CSCS.Y1.5.1
Design and implement level-appropriate algorithms that use iteration, selection, and sequence |
|
CSCS.Y1.5.2
Illustrate the flow of execution of algorithms in level-appropriate programs including branching and looping |
|
CSCS.Y1.5.3
Evaluate the qualities of level-appropriate student-created and non-student-created algorithms |
|
CSCS.Y1.5.4
Use a systematic approach to detect and resolve errors in a given algorithm |
|
CSCS.Y1.6.1
Create programs using procedures to solve problems of level-appropriate complexity |
|
CSCS.Y1.6.2
Discuss and apply best practices of program design and format (e.g., descriptive names, documentation, indentation, user experience design, whitespace) |
|
CSCS.Y1.6.3
Determine the scope and state of variables declared in procedures and control structures over time |
|
CSCS.Y1.6.4
Create programs of level-appropriate complexity that read from standard input, write to standard output, read from a file, write to a file, and append to a file |
|
CSCS.Y1.6.5
Use a systematic approach to detect logic, runtime, and syntax errors within a program |
|
CSCS.Y1.7.1
Identify hardware and software specific to carrying out the mission of regional industries |
|
CSCS.Y1.7.2
Research advancing and emerging technologies (e.g., artificially intelligent agents, blockchain, extended reality, Internet of Things (IoT), machine learning, robotics) |
|
CSCS.Y1.8.1
Utilize the command line to accomplish common network troubleshooting tasks at an introductory level |
|
CSCS.Y1.8.2
Research and describe common networking concepts at an introductory level |
|
CSCS.Y1.8.3
Research and describe modems, network interface cards, routers (e.g., consumer, industrial), switches, and wireless access points, and identify their purposes within a network |
|
CSCS.Y1.8.4
Describe the importance of creating and using common rules for communication and the utilization of common network protocols including the relationship between client and server |
|
CSCS.Y1.9.1
Compare and contrast computer programming paradigms (e.g., functional, imperative, object-oriented) |
|
CSCS.Y1.9.2
Research, describe, and utilize at an appropriate level: debugging strategies; integrated development environments (IDE); source-code editors; version control strategies |
|
CSCS.Y1.9.3
Classify layers of software (e.g., applications, drivers, firmware, operating systems) utilized within various platforms (e.g., Android, ChromeOS, iOS, Linux, macOS, Windows) |
|
CSCS.Y1.9.4
Identify and describe the purpose of hardware components within various personal computing platforms |
|
CSCS.Y1.10.1
Research and describe the risks and risk mitigation strategies associated with the utilization and implementation of social media and other digital technology implications |
|
CSCS.Y1.10.3
Research and describe the potential benefits associated with the utilization and implementation of social media and other digital technologies |
|
CSCS.Y1.10.4
Research and describe the relationship between access and security (e.g., active and passive data, convenience, data mining, digital marketing, online wallets, privacy, theft of personal information) |
|
CSCS.Y1.10.6
Research the history of computing devices and their impact on society |
|
CSCS.Y1.10.7
Research and identify diverse careers and career opportunities (e.g., accessibility, availability, demand) that are influenced by computer science and the technical and soft skills needed for each |
|
CSCS.Y1.11.1
Communicate basic technical information effectively to diverse audiences including, but not limited to, non-technical audience members |
|
CSCS.Y1.11.2
Describe and utilize the concepts of storytelling with data |
|
CSCS.Y1.11.3
Describe the following common types of data bias:; confirmation bias; confounding variables; outliers; overfitting/underfitting; selection bias |
|
CSCS.Y1.11.4
Compare and contrast causation and correlation |
|
CSCS.Y1.11.5
Compare and contrast interpreting data, inferring using data, and implicating with data |
|