Kindergarten:
Algorithms and Programming (AP)
K.AP.1 The student will apply computational thinking to identify patterns and sort items into categories based on an attribute.
a. Identify attributes of a set of objects.
b. Compare two objects and list attributes they have in common.
c. Sort and classify concrete objects based on one attribute.
K.AP.2 The student will plan and implement algorithms that include sequential order.
a. Identify tasks that are completed using sequential step-by-step
instructions.
b. Recall and state thoughts, ideas, and stories in the form of
sequential steps.
c. Create a design document to illustrate thoughts, ideas, and stories
in a sequential manner.
d. Create and test a sequential algorithm emphasizing beginning,
middle, and end.
e. Create and test a sequential algorithm to accomplish a
predetermined task.
Cybersecurity (CYB)
K.CYB.1 The student will demonstrate safe and responsible use of computing technologies.
a. Identify safe and responsible uses of computing technologies
based on the school rules and acceptable use policy (AUP).
b. Demonstrate safe and responsible uses of computing
technologies.
c. Communicate the process(es) for reporting behaviors that do not
comply with school rules or acceptable use policy.
Data and Analysis (DA)
K.DA.1 The student will gather and record data with or without a computing device.
a. Discuss the importance of data.
b. Identify numeric and non-numeric data.
c. Record data and communicate possible patterns.
K.DA.2 The student will create representations of data to make predictions and draw conclusions.
c. Use data to answer questions, make predictions, and draw
conclusions.
Algorithms and Programming (AP)
1.AP.1 The student will apply computational thinking by sorting items into categories based on multiple attributes and create patterns.
a. Describe attributes of a set of objects.
b. List the attributes a set of objects have in common.
c. Sort and classify concrete objects based on multiple attributes.
d. Create repeating and increasing patterns.
1.AP.2 The student will plan and implement algorithms that include the use of sequence and an event based on a predetermined task.
a. Plan and create a design document that illustrates thoughts, ideas, and
stories in a sequential manner.
b. Construct step-by-step instructions that include decision-making and
repetition.
c. Identify and explain the role of events that are used in an algorithm.
d. Test algorithms that are sequential and contain an event.
1.AP.3 The student will use the iterative design process to construct, test, and debug algorithms that include sequencing and an event.
a. Discuss and describe the concept of debugging.
b. Analyze and explain the results of an algorithm.
c. Revise and improve an algorithm to produce desired outcomes.
Computing Systems (CSY)
1.CSY.1 The student will describe how computing components work together to create a computing system.
a. Identify and define hardware, software, and computing systems.
b. Identify common components of computing systems in different types
of computing devices.
c. Describe how hardware and software work together to form a
computing system.
1.CSY.2 The student will use accurate terminology to describe when a computing system might not work as expected.
a. Identify and describe a problem with a device or computing system
when it does not work as expected.
b. Propose a solution to simple hardware or software issues.
Cybersecurity (CYB)
1.CYB.1 The student will demonstrate safe and responsible use of computing technologies.
a. Describe safe and responsible uses of computing technologies based on
the school rules and acceptable use policy (AUP).
b. Demonstrate safe and responsible behaviors when using computing
technologies and online communication.
d. Classify appropriate and inappropriate uses of technology at school or
at home.
Data and Analysis (DA)
1.DA.2 The student will create representations of data to make predictions and draw conclusions.
a. Collect and organize data with or without a computing device.
b. Create tables, object graphs, picture graphs, and models using
abstraction.
c. Identify patterns and describe trends in data visualizations of various
formats.
d. Use data to answer questions, draw conclusions, and make predictions.
2nd Grade:
2.AP.1 The student will apply computational thinking to identify patterns, and design algorithms to compare and contrast objects based on attributes.
a. Compare and contrast multiple ways to sort a set of objects.
b. Create a table of features to organize objects.
c. Design an algorithm to sort objects into categories based on multiple
attributes.
2.AP.2 The student will plan and implement algorithms that consists of events and loops using a block-based programming language.
a. Plan and create a design document to guide the construction of a
program using plain language or pseudocode.
b. Identify a section of repeated actions within an algorithm and replace it
with a Loop.
c. Construct step-by-step instructions that include events and repetition.
2.AP.3 The student will use the iterative design process to create, test, and debug a program containing events and loops in a block-based programming tool.
a. Define program.
b. Read and interpret a program expressed in a block-based programming
Language.
c. Analyze and describe the results of a program.
d. Create and test a program that uses events and loops.
e. Revise and improve a program to produce desired outcomes.
Computing Systems (CSY)
2.CSY.1 The student will describe the characteristics of computing systems including hardware, software, input, and output.
a. Describe how hardware and software work together to accomplish a
task.
b. Define and categorize components as inputs and outputs.
c. Describe how a computing system receives input and provides output.
d. Discuss how computers use binary to communicate and process
information.
2.CSY.2 The student will demonstrate an understanding of how to troubleshoot simple hardware and software problems that may occur during use.
a. Propose solutions to simple hardware and software issues.
b. Use appropriate steps to perform simple troubleshooting tasks.
Cybersecurity (CYB)
2.CYB.1 The student will model safe and responsible behaviors when using information and computing technologies.
a. Explain the need for safe and responsible uses of computing
technologies.
b. Create a flowchart to illustrate the process for reporting inappropriate
use of technology at school or at home.
c. Demonstrate and model safe and responsible behaviors when using
computing technologies and online communication.
Data and Analysis (DA)
2.DA.1 The student will analyze data to make decisions with or without a computing device.
a. Collect and record numeric and non-numeric data and describe possible
Patterns.
2.DA.2 The student will manipulate data, create representations, and evaluate data to solve a problem.
a. Create charts, graphs, and models using abstraction to represent data.
b. Analyze data visualizations to draw conclusions.
c. Propose and evaluate a solution to a problem or question based on data
and/or data visualization.
Impacts of Computing (IC)
2.IC.1 The student will examine the positive and negative impacts of how using computing technologies has changed the way people live, work, and interact.
a. Identify current uses of computing/emerging technologies and discuss
how they impact society.
b. Compare and contrast appropriate and inappropriate online behaviors
that apply in the physical environment and the online environment.
c. Model healthy habits for using computing technologies.
2.IC.2 The student will explain the need to balance screen time and other activities.
a. Discuss appropriate times and places for screen use.
b. List and describe alternatives to screen time.
3rd Grade:
Algorithms and Programming (AP)
3.AP.1 The student will apply computational thinking to design algorithms to extend patterns, processes, or components of a problem.
a. Identify a pattern in an algorithm, process, or a problem.
b. Decompose a problem or task into a subset of smaller problems.
c. Design an algorithm to extend either a pattern, process, or component
of a problem.
3.AP.2 The student will plan and implement algorithms that consist of events and conditional control structures using a block-based programming language.
a. Describe the concept of a conditional control structure.
b. Create a design document to plan an algorithm using plain language,
pseudocode, or diagrams.
3.AP.3 The student will use the iterative design process to create, test, and debug programs containing events, loops, and conditional structures in a block-based programming tool.
a. Create and test programs that consist of events, loops, and conditional
structures.
b. Analyze and describe program results to assess validity of outcome.
c. Revise and improve programs to resolve errors or produce desired
outcome.
Cybersecurity (CYB)
3.CYB.1 The student will apply safe practices to protect private information.
a. Identify and distinguish personal information that should be private.
b. Describe the importance of using a strong password.
c. Create and use strong passwords to protect private information.
Data and Analysis (DA)
3.DA.1 The student will gather, store, and organize data to evaluate trends and identify patterns using a computing device.
a. Formulate questions that require the collection or acquisition of data.
b. Gather, organize, sort, and store data.
e. Draw conclusions and make predictions based on observed data.
3.DA.2 The student will create and evaluate data representations and conclusions.
b. Analyze data to identify patterns, draw conclusions, and make
predictions.
Impacts of Computing (IC)
3.IC.2 The student will discuss and describe strategies to manage screen time.
a. Define and describe screen time.
b. Explain the importance of responsible screen time management.
c. Discuss how screen time choices affect one’s personal health and
interactions with others.
3.IC.3 The student will identify and describe computing technology careers and their impact on society.
a. Research computing technology careers.
b. Describe the impact careers in computing technology have on society.
4th Grade:
Algorithms and Programming (AP)
4.AP.1 The student will apply computational thinking to identify patterns and design algorithms to compare and contrast multiple algorithms used for the same task.
a. Decompose an algorithm, process, or problem into a subset of smaller
problems.
b. Identify multiple algorithms for the same task.
c. Describe patterns within multiple algorithms.
d. Determine which algorithm is most effective for a given task.
4.AP.2 The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and conditional control structures using a block-based programming language.
a. Identify user input and its role in improving a program.
b. Describe the concept of a variable.
c. Read and explain a design document to trace and predict an algorithm
using plain language, pseudocode, or diagrams.
d. Create a design document to plan an algorithm using plain language,
pseudocode, or diagrams.
e. Write programs that initialize, assign values to, name, and modify
variables.
4.AP.3 The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, and conditional control structures in a block-based programming tool.
a. Create and test programs that consist of sequencing, loops, variables,
user inputs, and conditional control structures.
b. Create and use variables to store and process data.
c. Trace and predict the value of variables that change over the course of ,
the program’s runtime.
d. Analyze and describe program results to assess validity of outcomes.
e. Revise and improve programs to resolve errors or produce desired
outcomes.
Computing Systems (CSY)
4.CSY.1 The student will model how a computing system works to accomplish a task.
a. Describe how computing systems perceive the world through sensors
and other inputs.
b. Compare and contrast how humans and computers process information
from inputs.
c. Explain how computing devices may be used to classify and organize
input.
d. Diagram and describe a simple computing system indicating
processors, inputs, and outputs.
Cybersecurity (CYB)
4.CYB.2 The student will identify and investigate best practices to safeguard information shared online and through online platforms.
d. Demonstrate proper use and protection of personal passwords.
Data and Analysis (DA)
4.DA.2 The student will create and evaluate data representations to make predictions and conclusions.
a. Formulate questions that require the collection or acquisition of data.
b. Collect data to create charts and graphs.
c. Recognize and analyze patterns and relationships within data sets.
d. Analyze visual representations to make predictions and draw
conclusions.
5th Grade:
Algorithms and Programming (AP)
5.AP.1 The student will apply computational thinking to identify patterns, make use of decomposition to break down problems or processes into sub-components, and design algorithms.
a. Identify patterns and repeated steps in an algorithm, problem, or
process.
b. Decompose a problem or process into a subset of smaller problems or
groups of sequential instructions.
c. Abstract relevant information to identify essential details.
d. Design an algorithm to solve a problem.
5.AP.2 The student will plan and implement algorithms that consist of sequencing, loops, variables, user input, and nested conditional control structures using a block-based programming language.
a. Describe the concept of nested conditional control structure.
b. Create a design document to trace and predict an algorithm using plain
language, pseudocode, or diagrams.
c. Read, write, and interpret nested conditional control structures: “if-else”
and “if-else; if-else" statements.
5.AP.3 The student will use the iterative design process to create, test, and debug programs containing sequencing, loops, variables, user inputs, nested conditional control structures, and two-way branching conditional control structures in a block-based programming tool.
a. Use accurate terminology to describe and explain the iterative design
process.
b. Create and test programs that consist of sequencing, loops, variables,
user inputs, nested conditional control structures, and two-way
branching conditional control structures.
c. Trace and predict outcomes of programs.
d. Analyze and describe program results to assess validity of outcomes.
e. Revise and improve programs to resolve errors or produce desired
outcomes.
Computing Systems (CSY)
5.CSY.3 The student will evaluate and implement troubleshooting strategies when a computing system is not operational.
a. Identify and use troubleshooting protocols to resolve hardware,
software, and connectivity issues.
b. Apply prior troubleshooting practices to new problems as they arise.
Data and Analysis (DA)
5.DA.2 The student will create multiple data representations to make predictions and conclusions.
c. Analyze data as evidence to draw conclusions and make predictions.
Impacts of Computing (IC)
5.IC.2 The student will explain the potential impact of excessive screen time on academic performance.
a. Analyze data to determine the impact of screen time on academic
performance.
b. Describe how academic behaviors that lead to academic success are
impacted by daily screen time.
c. Differentiate usage of screen time that benefit and hinder academic
performance.
6th Grade:
Algorithms and Programming (AP)
6.AP.1 The student will apply computational thinking to identify patterns, make use of decomposition to break down problems or processes into sub-components, and design algorithms.
a. Identify patterns and repeated steps in an algorithm, problem, or
process.
b. Decompose an algorithm, problem, or process into sub-components.
c. Abstract relevant information to identify essential details.
d. Design algorithms using abstraction to accomplish a task or express a
computational process.
6.AP.2 The student will plan and implement algorithms that include conditional control structures and collection of numeric data using a block-based or text-based tool.
a. Create a decision tree diagram to illustrate the decision-making process.
b. Read and write programs that initialize Boolean, integer, and decimal
number variables.
c. Read and write programs that collect numeric data from users.
d. Read and write programs that contain nested conditional control
structures.
e. Predict the results of logic expressions that use Boolean operators: and,
or, and not; including expressions that use relational expressions as one
or more operands.
6.AP.3 The student will use the iterative design process to create, test, and debug programs using a block-based or text-based programming language.
a. Create and test programs that uses multiple conditional control
structures.
b. Incorporate existing code, media, or libraries into original programs.
c. Trace and predict outcomes of programs.
d. Analyze and describe program results to assess validity of outcomes.
e. Analyze the outcomes of programs to identify logic and syntax errors.
f. Incorporate feedback from others to refine program.
g. Revise and improve programs to resolve errors and produce desired
outcomes.
6.AP.4 The student will demonstrate proper attribution when incorporating ideas and works of others.
a. Identify and give proper attribution of information and assets from the
internet and other sources.
Computing Systems (CSY)
6.CSY.2 The student will identify and explain hardware, software, and connectivity problems and troubleshooting solutions.
a. Identify and explain hardware, software, and connectivity problems and
solutions with accurate terminology.
b. Identify resources for troubleshooting hardware, software, and
connectivity-related problems.
Cybersecurity (CYB)
6.CYB.1 The student will evaluate the risks and benefits associated with sharing personal and public resources or artifacts.
a. Identify and explain the difference between personal and public
information.
b. Discuss the consequences of sharing personal and confidential
information online.
c. Evaluate risks and benefits associated with sharing information online.
Data and Analysis (DA)
6.DA.3 The student will make predictions and draw conclusions from data visualizations.
a. Visualize data using appropriate graphs, charts, and data visualization
techniques to enhance understanding and communicate findings
effectively.
b. Use computational tools to analyze patterns within data sets and
identify trends.
c. Draw conclusions and make predictions based on the analysis and
interpretation of the data visualization.
d. Utilize simulations and models to formulate, refine, and test
hypotheses.
Impacts of Computing (IC)
6.IC.1 The student will assess the impact of computing technologies on local society.
a. Explain how computing impacts innovation and describe the
development of new computing technologies in communication,
entertainment, and business.
b. Discuss how computing technologies have influenced various industries
and sectors locally.
c. Research simple and complex problems that computing systems can be
used to solve.
d. Analyze the implications of emerging technologies and potential real-
world impact in the local community.
6.IC.2 The student will analyze the impact of screen time on physical and mental health.
a. Analyze and describe the impact of excessive technology usage may
have on one’s physical health.
b. Examine the impact of blue light on sleep patterns and regulations.
c. Propose strategies that provide alternatives of technology usage to
promote physical activity.
d. Discuss the potential impact the use of social media may have on self-
identity and mental health.
e. Define cyberbullying and its impact on one’s health and well-being.
f. Discuss the possible effects of cyberbullying.
g. Identify ways to report illegal or psychologically maladaptive online
behavior.
6.IC.3 The student will explore career pathways and identify how computer science and computational thinking practices align with these pathways.
a. Investigate a career of interest and determine how computer science and
computational thinking practices are used in the chosen career.
6.IC.4 The student will identify copyrighted and licensed software material.
a. Identify the role of software licenses, including open-source, and why
they are used.
b. Compare and contrast the positives and negatives of various software
licenses.
6.IC.5 The student will describe the impacts of computing network architecture, including the role of the Internet in society.
a. Discuss ethical issues and laws related to accessibility, censorship,
privacy, access, and safety while using the Internet.
b. Explain the role broadband connectivity has in social life, culture, and
global economy.
6.IC.6 The student will investigate and analyze the impact of the progression and advancement of AI technologies on industries.
a. Discuss the type of industries that may be impacted by the use and
integration of Artificial Intelligence (AI).
b. Compare and contrast the evolving nature of work across diverse
industries because of the progression and advancement of Artificial
intelligence.
7th Grade:
Algorithms and Programming (AP)
7.AP.1 The student will apply computational thinking to design programs to accomplish a task as a means of creative expression or scientific exploration.
a. Identify patterns and repeated steps in an algorithm, problem, or process.
b. Decompose an algorithm, problem, or process into sub-components.
c. Abstract relevant information to identify essential details.
d. Contrast various algorithms to solve reasoning problems when
accomplishing a task.
7.AP.2 The student will plan and implement algorithms that include sequencing, loops, variables, user input, conditional control structures, and functions using a block-based or text-based programming tool.
a. Describe the concept of functions for use in a computer program.
b. Plan an algorithm using plain language, pseudocode, or diagrams.
c. Read and write programs that collect and use numeric and text data
from users.
d. Read and write programs that contain nested conditionals and nested
loops.
7.AP.3 The student will use the iterative design process to create, test, and debug programs using a block-based or text-based programming language.
a. Create and test programs that contain multiple control structures.
b. Trace and predict outcomes of programs.
c. Analyze the outcomes of programs to identify logic and syntax errors.
d. Analyze and describe the results of a program to assess validity of
outcomes.
e. Revise and improve an algorithm to resolve errors or produce desired
outcomes.
7.AP.4 The student will apply proper attribution when incorporating other sources into original work.
a. Apply proper methods of attribution when using work from the Internet
and other sources.
b. Incorporate information or assets from the Internet into a program with
proper attribution.
Computing Systems (CSY)
7.CSY.1 The student will design projects that use computing devices to collect and exchange data.
a. Apply project management skills to distribute tasks and maintain
project timeline.
b. Generate ideas combining hardware and software components that can
be used to collect and exchange data.
c. Describe how hardware and software can be used together to collect and
exchange data.
d. Evaluate the usability of hardware and software to collect and exchange
data.
e. Select the hardware and software components for project designs by
considering factors such as functionality, cost, size, speed, accessibility,
and aesthetics.
7.CSY.2 The student will apply computational thinking to troubleshoot and document hardware and software-related problems.
a. Apply systematic processes to resolve hardware, software, and
connectivity-related problems.
b. Compile and record successful methods used to resolve problems for
common hardware, software, and connectivity-related problems.
Cybersecurity (CYB)
7.CYB.1 The student will differentiate physical and digital security measures that protect electronic information.
a. Compare and contrast physical and digital security measures.
b. Research and synthesize the tradeoffs between usability and security.
c. Identify common threats and vulnerabilities associated with Internet use
and internet-based systems.
d. Identify potential solutions to address common threats and
vulnerabilities.
Data and Analysis (DA)
7.DA.1 The student will utilize computational tools to visualize and evaluate data to draw conclusions and make predictions.
a. Develop computational models that simulate real-world phenomena,
considering relevant variables and relationships.
b. Refine and modify computational models based on observed data and
feedback, ensuring alignment with empirical evidence.
c. Analyze patterns and trends within observed data, comparing them
with the predictions made by computational models.
d. Evaluate the effectiveness and accuracy of computational models in
capturing and explaining the observed data.
7.DA.2 The student will explain the process and application of computational thinking in machine learning.
a. Explain how supervised, unsupervised, and/or reinforcement learning
methods utilize decomposition, pattern recognition, abstraction, and
algorithms to learn from and make decisions.
b. Explore neural networks and its role in machine learning and artificial
intelligence.
Impacts of Computing (IC)
7.IC.1 The student will assess the national and global impact of computing technologies.
a. Discuss specific examples of how computing technologies have
influenced various national and global industries and sectors.
b. Analyze the implications of emerging technologies and potential real-
world impact nationally and globally.
c. Evaluate the environmental impact of computing technologies
nationally and globally.
7.IC.2 The student will describe and explain the impact of screen time on interactions with others.
a. Describe the positive and negative impact of social media on
socialization.
b. Research the type of data collected on social media and online
platforms that monitor social interactions.
c. Describe and explain the evolution of screen time and the impact it has
had on social interactions.
d. Create a social media usage plan that demonstrates safe practices,
meaningful use, and a balanced approach.
7.IC.3 The student will identify individual preferences, skillset, and experiences and determine how these relate to a chosen computer science career field.
a. Use a career interest assessment to identify and categorize preferences,
skillsets, and experiences.
b. Evaluate and connect personal skillsets, interests, talents, and values to a
computer science career.
7.IC.4 The student will identify and apply strategies to prevent personal and public works from being pirated and plagiarized.
a. Discuss and describe intellectual property protections.
b. Research and list safeguards used to prevent intellectual property
infringement.
8th Grade:
Algorithms and Programming (AP)
8.AP.1 The student will apply computational thinking to construct programs to accomplish a task as a means of creative expression or scientific exploration.
a. Identify patterns and repeated steps in an algorithm, problem, or process.
b. Decompose an algorithm, problem, or process into sub-components.
c. Abstract relevant information to identify essential details.
d. Use pseudocode, decision trees, or flowcharts to illustrate complex
problems as algorithms.
8.AP.2 The student will plan and implement algorithms that include sequencing, loops, variables, user input, conditional control structures, functions, and various data types.
a. Describe the concept of input and output of various data types for use
in a computer program.
b. Plan an algorithm using plain language, pseudocode, or diagrams.
c. Write and test algorithms expressed using block-based or text-based
programming languages.
8.AP.3 The student will use the iterative design process to create, test, and debug programs using a block-based or text-based programming language.
a. Create and test programs that contain multiple control structures.
b. Trace and predict outcomes of programs.
c. Analyze the outcomes of programs to identify logic and syntax errors.
d. Analyze and describe the results of a program to assess validity of
outcomes.
e. Revise and improve an algorithm to resolve errors or produce desired
outcomes.
8.AP.4 The student will incorporate work from others into programs and projects.
a. Explain the role of Creative Commons licensing for the use and
modification or “remixing” of information.
b. Utilize Creative Commons assets in a programming project.
c. Use and remix code from other projects within a programming project
and provide proper attribution.
Computing Systems (CSY)
8.CSY.1 The student will recommend and design improvements to computing devices based on the needs of various users.
a. Analyze existing computing devices for advantages and limitations.
b. Recommend and design improvements to computing devices based on
user interactions.
8.CSY.2 The student will apply computational thinking to troubleshoot and document hardware and software-related problems.
a. Apply systematic processes to resolve hardware, software, and
connectivity-related problems.
b. Design an end-user document/guide to resolve hardware, software, and
connectivity-related problems.
Cybersecurity (CYB)
8.CYB.1 The student will investigate and describe ways to protect sensitive data from malware and other attacks.
a. Identify impacts of hacking, ransomware, scams, phishing, fake
vulnerability scans and the ethical and legal concerns.
b. Describe how cyber-attacks can affect a computing system.
c. Compare and contrast safe and unsafe computing practices.
d. Explore how industries and emerging technologies are addressing cyber
Solutions.
e. Model common prevention practices for cyber-attacks.
8.CYB.2 The student will investigate and explain how physical and digital security measures can protect electronic information for businesses, governments, and organizations.
a. Investigate and explain how physical and digital security measures are
used to safeguard electronic information.
b. Research the advantages and limitations of different security measures
in protecting users against security threats.
c. Explore how emerging technologies may affect methods to safeguard
personal and public data.
Data and Analysis (DA)
8.DA.1 The student will create computational models to simulate events or represent phenomena.
a. Compare and contrast the use of computational models and simulations
to analyze patterns and replicate phenomena.
b. Design and create complex computational models that simulate dynamic
systems (abstraction), incorporating multiple variables and
interactions.
c. Refine computational models based on generated outcomes.
8.DA.2 The student will evaluate computational models to analyze patterns and make recommendations or predictions.
a. Define data biases within a dataset and the unintended consequences
that may impact data reliability and final analysis.
b. Analyze patterns and interpret data generated by computational models
and simulations, identifying meaningful patterns and relationships.
c. Utilize data visualization techniques to communicate and present
findings derived from computational models and simulations.
Impacts of Computing (IC)
8.IC.1 The student will assess the social impacts and ethical considerations of computing technologies.
a. Analyze the impact of sharing data through computing technologies.
b. Critique the role the Internet plays in social life, the global economy,
and culture.
c. Evaluate online and print sources for credibility and reliability.
d. Research and discuss factors that impact access and availability to
computing technologies.
e. Discuss ethical issues around cybersecurity and networks: censorship,
privacy, safety, and access.
8.IC.2 The student will analyze and evaluate the ramifications of screen time in one’s life.
a. Analyze scenarios or case studies to assess the impact of screen time on
one’s physical and mental health.
8.IC.3 The student will identify opportunities for education, training, and preparation to enter into a chosen computer science career field.
a. Identify an education and training plan for a chosen computer science
career.
b. Outline the use of computer science skills required in a chosen career.
c. Develop short-and long-term goals for a chosen career.
d. Research emerging trends in a chosen career path.
CSF.AP.1 The student will apply computational thinking to address a computational problem.
a. Identify real-world problems that are classification and prediction
problems.
b. Decompose a problem or process into sub-components.
c. Implement abstractions to improve program modularity, reusability, and
readability.
d. Identify computing-based solutions to address a computational problem.
CSF.AP.2 The student will use the iterative design process to create, test, and refine programs using a text-based programming language.
a. Create programs using a text-based programming language.
b. Document programs to improve the ability to trace, test, and debug.
c. Trace the execution of an algorithm and predict its results.
d. Analyze the outcomes of programs to identify logic and syntax errors.
e. Use multiple test cases to verify and refine the program.
f. Revise and improve an algorithm to resolve errors or produce desired
outcomes.
g. Use version control and incorporate user feedback to refine program.
CSF.AP.3 The student will plan and implement algorithms and programs that include loops, variables, and compound and nested control structures using a text-based programming language.
a. Read and interpret algorithms and programs expressed using plain
language, pseudocode, and text-based programming languages.
b. Create design documents using plain language, pseudocode, or
diagrams.
c. Read and write algorithms and programs that accept multiple input
values, use variables, and produce output.
d. Read and write algorithms and programs that include predefined
functions and procedures with parameters and returns.
e. Compare several implementations of the same algorithm using
different control structures.
CSF.AP.4 The student will design programs that use and manipulate data.
a. Determine appropriate data structures to address program
specifications.
b. Apply basic computations on numeric and non-numeric data types.
c. Read and write programs that create, store, and manipulate primitive
data.
d. Read and write programs that create, store, and manipulate linear
collections of primitive data types: arrays or list.
e. Read and write programs that use relational, logical, and arithmetic
expressions.
f. Read and write programs that traverse and manipulate data structures.
CSF.AP.5 The student will define and describe neural network learning algorithms.
a. Define and describe neural network learning algorithms.
b. Illustrate and describe a neural network structure.
c. Identify and discuss examples of computing technologies that utilize
neural networks.
d. Compare and contrast a decision tree learning algorithm and a neural
network learning algorithm.
CSF.AP.6 The student will investigate different coding languages.
a. Identify and describe characteristics of block-based and text-based
coding languages.
b. Analyze the advantages and disadvantages of block-based and text-
based coding languages.
c. Analyze the advantages and disadvantages of various text-based coding
languages.
CSF.AP.7 The student will use search algorithms and sort algorithms.
a. Define the concept and role of a search algorithm.
b. Define the concept and role of a sort algorithm.
c. Compare and contrast bubble sort, quick sort, and merge sort.
d. Compare and contrast linear search and binary search.
e. Evaluate and determine the best search or sort algorithm to use based on
intended results.
CSF.AP.8 The student will work collaboratively in an iterative design process to solve problems, including peer review and feedback.
a. Identify project management frameworks and methodologies that
emphasize iteration.
b. Discuss the significance of communication and methods of
communication when working collaboratively.
c. Distribute roles and responsibilities and adhere to predetermined
timeline and/or project scope.
d. Collaboratively plan, design, and revise programs.
e. Provide constructive feedback through peer review.
f. Use project management tools to support collaboration.
g. Justify and explain design choices, including constraints, and audiences.
h. Reflect and discuss collaborative experience with team.
CSF.CSY.1 The student will explain the use of abstraction to hide underlying implementation of computing systems embedded in everyday objects.
a. Provide real-world examples of abstraction in computing.
b. Explain the role of abstraction to simplify complex systems.
c. Identify and describe levels of abstraction between application
software, system software, and hardware layers.
CSF.CSY.2 The student will illustrate how computers create visual representations.
a. Describe how computers receive visual data from various sensors and
tools.
b. Describe image processing techniques to include filtering,
segmentation, and feature extraction.
c. Explain how computers use pattern recognition and classify data to interpret and make decisions.
d. Discuss ethical considerations related to the use of visual data and
computer vision technologies.
CSF.CSY.3 The student will illustrate how computers can use visual representations of the world to solve problems.
a. Describe the parts of a network diagram and how they are related.
b. Explain the relationship between nodes, links, and other components of
graphs.
c. Explain how a computer can solve a maze, find a route on a map, and use
reasoning to solve
problems.
CSF.CSY.4 The student will describe and explain the methods in which computers learn through the use of machine learning.
a. Compare and contrast the learning process of humans and computers.
b. Identify mathematical models used by supervised learning to produce
classifications and predictions.
Cybersecurity (CYB)
CSF.CYB.1 The student will evaluate the methods of protecting data and computing systems, considering the context of the user and other stakeholders, with the level of cybersecurity risk.
a. Describe ways data and computing systems can be threatened by
malware, ransomware, social engineering, phishing, and other
cyberattacks.
b. Compare strategies to protect data and computing systems from
malware, ransomware, social engineering, phishing, and other
cyberattacks.
CSF.CYB.2 The student will identify and describe typical targets and perpetrators of cyberattacks.
a. Identify common targets and perpetrators of cyberattacks.
b. Identify ways data is automatically collected and generated that may or may not be evident to users.
c. Describe potential vulnerabilities when using publicly available
networks.
d. Assess the impact of cyber threats on systems and people with diverse
backgrounds, technical knowledge, or threat profiles.
CSF.CYB.3 The student will compare various security measures, considering tradeoffs between the usability and security of a computing system.
a. Evaluate tradeoffs between usability and security.
b. Analyze scenarios to determine tradeoffs between usability and
security.
c. Propose recommendations for optimizing balance between usability and security in a given computing system.
CSF.DA.1 The student will identify and explain specific examples of real-world problems that can be effectively addressed using data analysis.
a. Describe the types of data that business, industry, and government
entities collect and maintain.
b. Identify privacy and consumer protection issues that impact data
representation.
c. Identify real-world problems that can be addressed through data
analysis.
d. Compare two real-world datasets to identify how the values of features
are encoded and represented.
e. Formulate questions to decompose a problem and develop a data project plan.
CSF.DA.2 The student will evaluate data collection and storage practices, including their impact on the stakeholders involved.
a. Identify methods for collecting and storing data of different data sizes.
b. Evaluate the technical and ethical implications of collecting and storing data from the perspectives of users, programmers, companies, and communities.
c. Identify impacts of bias in data collection and storage practices.
d. Analyze the impact of data quality, quantity, diversity, and other factors on the accuracy and reliability of data visualizations.
e. Research emerging technologies that have the capability to construct reasoning from stakeholder data.
CSF.DA.3 The student will investigate data collection practices and the role of consent, transparency, and responsible data handling.
a. Evaluate the quality of training data: completeness, accuracy, consistency, and relevance.
b. Analyze and discuss the ethical implications and social and economic impact of training data choices.
CSF.DA.4 The student will differentiate between the use of training data and reasoning models.
a. Explain the use of training data and the role it has in the development of
machine learning models.
b. Explain the use of reasoning models and the role it has in the development of machine learning models.
c. Identify and discuss the similarities and differences between training
data and reasoning models in artificial intelligence systems.
CSF.DA.5 The student will utilize data analysis to solve computational problems that make an impact and create solutions.
a. Formulate questions that require data collection.
b. Identify appropriate data to address predetermined question.
c. Define the stages of the data cycle and the interrelationship between each stage.
d. Identify and explain constraints of a data-driven approach.
e. Create a computational artifact of the data analysis results.
CSF.IC.1 The student will research and hypothesize the societal, environmental, and ethical impacts of present and future computing technologies.
a. Identify the societal impacts of computing technologies and the various aspects of daily life and industry.
b. Evaluate the effect of advances in information technology on the economy, environment, and ethics, including advancements of Artificial Intelligence (AI), quantum computing, and emerging technologies.
c. Examine the environmental impact of computing technologies.
d. Propose strategies to address the ethical impacts and potential challenges of computing technologies.
CSF.IC.2 The student will examine the impact of screen-related distractions on productivity.
a. Identify digital tools and applications designed to monitor or regulate screen time usage.
b. Evaluate the impact of screen time management on productivity and well-being.
c. Examine and discuss the impact of screen time and social media on academic or workplace performance.
CSF.IC.3 The student will identify historical advancements in computer science and their parallels with changes in society.
a. Examine correlations between historical developments in computing technologies and changes in society.
b. Appraise contributions of pioneers in the field of computer science.
c. Explore the impact of Moore’s Law on scientific and mathematical advancements.
CSF.IC.4 The student will explore computer science careers in Virginia and globally.
a. Research and explain the preparation and job outlook for computer science careers.
b. Examine current and future computer science career pathways involving emerging technologies.
CSF.NI.1 The student will model the transmission of data across computing networks and the Internet.
a. Identify the roles of computing devices: routers, switches, servers, and clients.
b. Explain the role of Internet protocols: Hypertext Transfer Protocol Secure (HTTPS) and Transmission Control Protocol/Internet Protocol (TCP/IP) to provide reliable and secure data.
c. Analyze and create network topology diagrams.
d. Model how computing devices communicate via networks using TCP/IP protocols.
e. Identify common problems that impact network functionality.
Identify solutions to resolve common network issues.