Skip to main content
California Department of Education Logo

Computer Science Standards




Results


Showing 1 - 10 of 43 Standards

Standard Identifier: K-2.AP.11

Grade Range: K–2
Concept: Algorithms & Programming
Subconcept: Variables
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Model the way programs store data.

Descriptive Statement:
Information in the real world can be represented in computer programs. Students model the digital storage of data by transforming real-world information into symbolic representations that include text, numbers, and images. For example, after identifying symbols on a map and explaining what they represent in the real world, students could create their own symbols and corresponding legend to represent items on a map of their classroom (HSS.K.4.3, 1.2.3, 2.2.2) Alternatively, students could invent symbols to represent beat and/or pitch. Students could then modify symbols within the notation and explain how the musical phrase changes. (VAPA Music K.1.1, 1.1.1, 2.1.1, 2.2.2)

Standard Identifier: K-2.DA.7

Grade Range: K–2
Concept: Data & Analysis
Subconcept: Storage
Practice(s): Developing and Using Abstractions (4.2)

Standard:
Store, copy, search, retrieve, modify, and delete information using a computing device, and define the information stored as data.

Descriptive Statement:
Information from the real world can be stored and processed by a computing device. When stored on a computing device, it is referred to as data. Data can include images, text documents, audio files, and video files. Students store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data. For example, students could produce a story using a computing device, storing it locally or remotely (e.g., in the cloud). They could then make a copy of the story for peer revision and editing. When the final copy of the story is complete, students delete any unnecessary files. They search for and retrieve data from a local or remote source, depending on where it was stored. (CA CCSS for ELA/Literacy W.K.6, W.K.5, W1.6, W.1.5, W.2.6, W.2.5) Alternatively, students could record their voices singing an age-appropriate song. They could store the data on a computing device, search for peers' audio files, retrieve their own files, and delete unnecesary takes. (VAPA Music K.2.2, 1.2.2, 2.2.2)

Standard Identifier: K-2.IC.18

Grade Range: K–2
Concept: Impacts of Computing
Subconcept: Culture
Practice(s): Recognizing and Defining Computational Problems (3.1)

Standard:
Compare how people lived and worked before and after the adoption of new computing technologies.

Descriptive Statement:
Computing technologies have changed the way people live and work. Students describe the positive and negative impacts of these changes. For example, as a class, students could create a timeline that includes advancements in computing technologies. Each student could then choose an advancement from the timeline and make a graphic organizer noting how people's lives were different before and after its introduction into society. Student responses could include: In the past, if students wanted to read about a topic, they needed access to a library to find a book about it. Today, students can view and read information on the Internet about a topic or they can download e-books about it directly to a device. Such information may be available in more than one language and could be read to a student, allowing for great accessibility. (HSS.K.6.3) Alternatively, students could retell or dramatize stories, myths, and fairy tales from two distinct time periods before and after a particular computing technology had been introduced. For example, the setting of one story could take place before smartphones had been invented, while a second setting could take place with smartphones in use by characters in the story. Students could note the positive and negative aspects of smartphones on the daily lives of the characters in the story. (VAPA Theatre Arts K.3.1, K.3.2, 1.2.2, 2.3.2) (CA CCSS for ELA/Literacy RL.K.2, RL.K.9, RL.1., RL.1.9, RL.2.2, RL.2.9)

Standard Identifier: K-2.IC.19

Grade Range: K–2
Concept: Impacts of Computing
Subconcept: Social Interactions
Practice(s): Collaborating Around Computing (2.1)

Standard:
Work respectfully and responsibly with others when communicating electronically.

Descriptive Statement:
Electronic communication facilitates positive interactions, such as sharing ideas with many people, but the public and anonymous nature of electronic communication also allows intimidating and inappropriate behavior in the form of cyberbullying. Responsible electronic communication includes limiting access to personably identifiable information. Students learn and use appropriate behavior when communicating electronically (often called "netiquette"). For example, students could share their work on a classroom blog or in other collaborative spaces online, taking care to avoid sharing information that is inappropriate or that could personally identify themselves to others. (CA CCSS for ELA/Literacy W.K.6, W.1.6, W.21.6) Alternatively, students could provide feedback to others on their work in a kind and respectful manner. They could learn how written words can be easily misinterpreted and may seem negative when the intention may be to express confusion, give ideas, or prompt further discussion. They could also learn to identify harmful behavior on collaborative spaces and intervening to find the proper authority to help. (CA CCSS for ELA/Literacy W.K.5, W.1.5, W.2.5) (HSS 1.1.2)

Standard Identifier: K-2.NI.4

Grade Range: K–2
Concept: Networks & the Internet
Subconcept: Network Communication & Organization
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Model and describe how people connect to other people, places, information and ideas through a network.

Descriptive Statement:
Information is passed between multiple points (nodes) on a network. The Internet is a network that enables people to connect with other people worldwide through many different points of connection. Students model ways that people communicate, find information, or acquire ideas through a network. Students use a network, such as the internet, to access information from multiple locations or devices. For example, students could utilize a cloud-based platform to access shared documents or note-taking applications for group research projects, and then create a model (e.g., flowchart) to illustrate how this network aids collaboration. (CA CCSS for ELA/Literacy W.K.7, W.1.7, W.2.7) Alternatively, students could design devices that use light or sound to aid communication across distances (e.g., light source to send signals, paper cup and string “telephones,” and a pattern of drum beats) and then describe how networks build connections. (CA NGSS: 1-PS4-4)

Standard Identifier: K-2.NI.5

Grade Range: K–2
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Communicating About Computing (7.2)

Standard:
Explain why people use passwords.

Descriptive Statement:
Passwords protect information from unwanted use by others. When creating passwords, people often use patterns of familiar numbers and text to more easily remember their passwords. However, this may make the passwords weaker. Knowledge about the importance of passwords is an essential first step in learning about cybersecurity. Students explain that strong passwords are needed to protect devices and information from unwanted use. For example, students could play a game of guessing a three-character code. In one version of the game, the characters are only numbers. In the second version, characters are numbers or letters. Students describe why it would take longer to guess the correct code in the second case. Alternatively, students could engage in a collaborative discussion regarding passwords and their importance. Students may follow-up the discussion by exploring strong password components (combination of letters, numbers, and characters), creating their own passwords, and writing opinion pieces indicating reasons their passwords are strong. (CA CCSS for ELA/Literacy SL.K.1, SL.1.1, SL 2.1, W.1.1, W.2.1)

Standard Identifier: K-2.NI.6

Grade Range: K–2
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Create patterns to communicate a message.

Descriptive Statement:
Connecting devices to a network or the Internet provides great benefit, but care must be taken to protect devices and information from unauthorized access. Messages can be protected by using secret languages or codes. Patterns help to ensure that the intended recipient can decode the message. Students create a pattern that can be decoded and translated into a message. For example, students could use a table to associate each text character with a number. Then, they could select a combination of text characters and use mathematical functions (e.g., simple arithmetic operations) to transform the numbers associated with the characters into a secret message. Using inverse functions, a peer could translate the secret message back into its original form. (CA CCSS for Mathematics 2.OA.A.1, 2.OA.B.2) Alternatively, students could use icons or invented symbols to represent patterns of beat, rhythm, or pitch to decode a musical phrase. (VAPA Music K.1.1, 1.1.1, 2.1.1, 2.2.2)

Standard Identifier: 3-5.AP.11

Grade Range: 3–5
Concept: Algorithms & Programming
Subconcept: Variables
Practice(s): Creating Computational Artifacts (5.2)

Standard:
Create programs that use variables to store and modify data.

Descriptive Statement:
Variables are used to store and modify data. Students use variables in programs they create. At this level, students may need guidance in identifying when to create variables (i.e., performing the abstraction). For example, students could create a game to represent predators and prey in an ecosystem. They could declare a "score" variable, assign it to 0 at the start of the game, and add 1 (increment) the score each time the predator captures its prey. They could also declare a second "numberOfLives" variable, assign it to 3 at the start of the game, and subtract 1 (decrement) each time a prey is captured. They could program the game to end when "numberOfLives" equals 0. (CA NGSS: 5-LS2-1) (CA CCSS for Mathematics 5.OA.3) Alternatively, when students create programs to draw regular polygons, they could use variables to store the line size, line color, and/or side length. Students can extend learning by creatively combining a variety of polygons to create digital artwork, comparing and contrasting this to another work of art made by the use of different art tools and media, such as watercolor or tempera paints. (CA CCSS for Mathematics 3.G.1) (VAPA Visual Arts 3.1.4)

Standard Identifier: 3-5.DA.7

Grade Range: 3–5
Concept: Data & Analysis
Subconcept: Storage
Practice(s): Developing and Using Abstractions (4.2)

Standard:
Explain that the amount of space required to store data differs based on the type of data and/or level of detail.

Descriptive Statement:
All saved data requires space to store it, whether locally or not (e.g., on the cloud). Music, images, video, and text require different amounts of storage. Video will often require more storage and different format than music or images alone because video combines both. The level of detail represented by that data also affects storage requirements. For instance, two pictures of the same object can require different amounts of storage based upon their resolution, and a high-resolution photo could require more storage than a low-resolution video. Students select appropriate storage for their data. For example, students could create an image using a standard drawing app. They could save the image in different formats (e.g., .png, .jpg, .pdf) and compare file sizes. They should also notice that different file sizes can result in differences in quality or resolution (e.g., some pictures could be more pixelated while some could be sharper). Alternatively, in an unplugged activity, students could represent images by coloring in squares within a large grid. They could model how a larger grid requires more storage but also represents a clearer image (i.e., higher resolution).

Standard Identifier: 3-5.IC.20

Grade Range: 3–5
Concept: Impacts of Computing
Subconcept: Culture
Practice(s): Recognizing and Defining Computational Problems (3.1)

Standard:
Discuss computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.

Descriptive Statement:
New computing technologies are created and existing technologies are modified for many reasons, including to increase their benefits, decrease their risks, and meet societal needs. Students, with guidance from their teacher, discuss topics that relate to the history of computing technologies and changes in the world due to these technologies. Topics could be based on current news content, such as robotics, wireless Internet, mobile computing devices, GPS systems, wearable computing, and how social media has influenced social and political changes. For example, students could conduct research in computing technologies that impact daily life such as self-driving cars. They engage in a collaborative discussion describing impacts of these advancements (e.g., self-driving cars could reduce crashes and decrease traffic, but there is a cost barrier to purchasing them). (CA CCSS for ELA/Literacy W.3.7, W.4.7, W.5.7, SL.3.1, SL.4.1, SL.5.1) Alternatively, students could discuss how technological advancements affected the entertainment industry and then compare and contrast the impacts on audiences. For instance, people with access to high-speed Internet may be able to choose to utilize streaming media (which may cost less than traditional media options), but those in rural areas may not have the same access and be able to reap those benefits. (VAPA Theatre Arts 4.3.2, 4.4.2)

Showing 1 - 10 of 43 Standards


Questions: Curriculum Frameworks and Instructional Resources Division | CFIRD@cde.ca.gov | 916-319-0881