Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CSP.1.1a
Explain how collaboration affects the development of a solution. |
|
CSP.1.1b
Collaborate in the development of solutions. |
|
CSP.1.2a
Investigate the situation, context, or task. |
|
CSP.1.2a.i
Investigate the purpose of a program. |
|
CSP.1.2a.ii
Understand how to break down program specifications into smaller tasks using top-down design and pseudocode. |
|
CSP.1.2b
Generalize data sources through variables. |
|
CSP.1.2b.i
Understand the uses of different data types (examples: integer, float/double, characters/strings, boolean, etc.) |
|
CSP.1.2c
Explain how a code segment or program functions. |
|
CSP.1.3a
Identify and correct errors in algorithms and programs, including error discovery through testing. |
|
CSP.1.3b
Identify different types of errors such as logic, run-time, and syntax errors |
|
CSP.2.1a
Explain the differences between hardware and software and how they relate to input, storage, processing, and output. |
|
CSP.2.1b
Understand the different file sizes (bit, byte, kilobyte, megabyte, gigabyte, terabyte, and petabyte). |
|
CSP.2.2a
Calculate the binary (base 2) equivalent of a positive integer (base 10) and vice versa. |
|
CSP.2.2b
Compare and order binary numbers. |
|
CSP.2.3a
Lossy - Compression algorithm in which file size if reduced without any quality loss. |
|
CSP.2.3b
Lossless - Compression algorithm in which some of the data from the original file is lost |
|
CSP.3.1a
Use variables of different data types (examples: integer, float/double, characters/strings, boolean, etc.) |
|
CSP.3.1b
Convert data types to other data types. |
|
CSP.3.1c
Determine the value of a variable as a result of an assignment. |
|
CSP.3.2
Implement arithmetic operators =, +, -, *, /, and MOD) and order of operations (PEMDAS). |
|
CSP.3.3a
Receive and store user input. |
|
CSP.3.3b
Print to console |
|
CSP.3.4
Evaluate expressions that manipulate strings. (String concatenation joins together two or more strings end-to-end to make a new string.) |
|
CSP.3.5a
Write and evaluate expressions using relational operators (==, 7, ›, <, 2, and s). |
|
CSP.3.5b
Write and evaluate expressions using logical operators (AND, OR, NOT) |
|
CSP.3.6a
Write conditional statements, such as IF statements and ELSE IF statements. |
|
CSP.3.6b
Determine the result of conditional statements. |
|
CSP.3.7a
Write iteration statements, such as for loops and while loops. |
|
CSP.3.7b
Determine the result of iteration statements. |
|
CSP.3.8a
Write statements to call Procedures/Functions/Methods |
|
CSP.3.8b
Determine the result of a Procedures/Functions/Methods |
|
CSP.4.1a
Explain how computing devices work together in a network (Network, Path, Routing, Packets, Bandwidth). |
|
CSP.4.1b
Explain how the Internet works (Fault Tolerance, Protocols, HTTP, HTTPS). |
|
CSP.4.1c
Understand the difference between the Internet and the World Wide Web |
|
CSP.4.2
Students will understand that the HTML programming language is used to create all websites on the internet and acts as the structure for a website. |
|
CSP.4.2a
Students will code the foundation for a basic webpage including the element tags <!DOCTYPE html>, <html>, <head›, <title», and <body>. |
|
CSP.4.2b
Students will create pages with tags and attributes at the inline level. (<!DOCTYPE html>, <html> <head>, <title>, <body>, <h1>, <h2>, <h6>, <p>, <br>, etc.) |
|
CSP.5.1a
Explore how an effect of a computing innovation can be both beneficial and harmful. |
|
CSP.5.1b
Explore advances in computing that have generated and increased creativity in other fields, such as medicine, engineering, communications, and the arts. |
|
CSP.5.2a
Explore issues that contribute to the digital divide (demographics, geographics, socioeconomic, equity, access, influence). |
|
CSP.5.2b
Explore how bias exists in computing innovations. |
|
CSP.5.3a
Explain how the use of computing can raise legal and ethical concerns. |
|
CSP.5.3b
Understand how ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use. |
|
CSP.5.3c
Understand the differences between Copyright, Creative Commons, Public Domain, & Trademark |
|
CSP.5.4a
Describe the risks to privacy from collecting and storing personal data on a computer system |
|
CSP.5.4b
Explain how computing resources can be protected (password strength) and can be misused. |
|
CSP.5.4c
Explain how unauthorized access to computing resources is gained. |
|
CSP.5.4d
Understand essential cybersecurity concepts, like malware (adware, trojan horse, virus, ransomware, etc.) and social engineering (phishing, etc.) |
|