Skip to main content
California Department of Education Logo

Computer Science Standards




Results


Showing 21 - 27 of 27 Standards

Standard Identifier: 9-12.NI.7

Grade Range: 9–12
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Recognizing and Defining Computational Problems, Developing and Using Abstractions (3.3, 4.4)

Standard:
Compare and contrast cryptographic techniques to model the secure transmission of information.

Descriptive Statement:
Cryptography is a technique for transforming information on a computer in such a way that it becomes unreadable by anyone except authorized parties. Cryptography is useful for supporting secure communication of data across networks. Examples of cryptographic methods include hashing, symmetric encryption/decryption (private key), and assymmetric encryption/decryption (public key/private key). Students use software to encode and decode messages using cryptographic methods. Students compare the costs and benefits of using various cryptographic methods. At this level, students are not expected to perform the mathematical calculations associated with encryption and decryption. For example, students could compare and contrast multiple examples of symmetric cryptographic techiques. Alternatively, students could compare and contrast symmetric and asymmetric cryptographic techniques in which they apply for a given scenario.

Standard Identifier: 9-12S.AP.15

Grade Range: 9–12 Specialty
Concept: Algorithms & Programming
Subconcept: Control
Practice(s): Recognizing and Defining Computational Problems, Communicating About Computing (3.2, 7.2)

Standard:
Demonstrate the flow of execution of a recursive algorithm.

Descriptive Statement:
Recursion is a powerful problem-solving approach where the problem solution is built on solutions of smaller instances of the same problem. A base case, which returns a result without referencing itself, must be defined, otherwise infinite recursion will occur. Students represent a sequence of calls to a recursive algorithm and show how the process resolves to a solution. For example, students could draw a diagram to illustrate flow of execution by keeping track of parameter and returned values for each recursive call. Alternatively, students could create a video showing the passing of arguments as the recursive algorithm runs.

Standard Identifier: 9-12S.CS.2

Grade Range: 9–12 Specialty
Concept: Computing Systems
Subconcept: Hardware & Software
Practice(s): Communicating About Computing (7.2)

Standard:
Categorize and describe the different functions of operating system software.

Descriptive Statement:
Operating systems (OS) software is the code that manages the computer’s basic functions. Students describe at a high level the different functions of different components of operating system software. Examples of functions could include memory management, data storage/retrieval, processes management, and access control. For example, students could use monitoring tools including within an OS to inspect the services and functions running on a system and create an artifact to describe the activity that they observed (e.g., when a browser is running with many tabs open, memory usage is increased). They could also inspect and describe changes in the activity monitor that occur as different applications are executing (e.g., processor utilization increases when a new application is launched).

Standard Identifier: 9-12S.DA.7

Grade Range: 9–12 Specialty
Concept: Data & Analysis
Subconcept: Collection, Visualization, & Transformation
Practice(s): Communicating About Computing (7.1)

Standard:
Select and use data collection tools and techniques to generate data sets.

Descriptive Statement:
Data collection and organization is essential for obtaining new information insights and revealing new knowledge in our modern world. As computers are able to process larger sets of data, gathering data in an efficient and reliable matter remains important. The choice of data collection tools and quality of the data collected influences how new information, insights, and knowledge will support claims and be communicated. Students devise a reliable method to gather information, use software to extract digital data from data sets, and clean and organize the data in ways that support summaries of information obtained from the data. At this level, students may, but are not required to, create their own data collection tools. For example, students could create a computational artifact that records information from a sonic distance sensor to monitor the motion of a prototype vehicle. Alternatively, students could develop a reliable and practical way to automatically digitally record the number of animals entering a portion of a field to graze. Additionally, students could also find a web site containing data (e.g., race results for a major marathon), scrape the data from the web site using data collection tools, and format the data so it can be analyzed.

Standard Identifier: 9-12S.DA.8

Grade Range: 9–12 Specialty
Concept: Data & Analysis
Subconcept: Collection, Visualization, & Transformation
Practice(s): Developing and Using Abstractions, Communicating About Computing (4.1, 7.1)

Standard:
Use data analysis tools and techniques to identify patterns in data representing complex systems.

Descriptive Statement:
Data analysis tools can be useful for identifying patterns in large amounts of data in many different fields. Computers can help with the processing of extremely large sets of data making very complex systems manageable. Students use computational tools to analyze, summarize, and visualize a large set of data. For example, students could analyze a data set containing marathon times and determine how age, gender, weather, and course features correlate with running times. Alternatively, students could analyze a data set of social media interactions to identify the most influential users and visualize the intersections between different social groups.

Standard Identifier: 9-12S.NI.5

Grade Range: 9–12 Specialty
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Creating Computational Artifacts (5.3)

Standard:
Develop solutions to security threats.

Descriptive Statement:
Designing and implementing cybersecurity measures requires knowledge of software, hardware, and human components and understanding tradeoffs. Students design solutions to security threats and compare tradeoffs of easier access and use against the costs of losing information and disrupting services. For example, students could refine a technology that allows users to use blank or weak passwords. Alternatively, students could implement a firewall or proxy protection between an organization's private local area network (LAN) and the public Internet. Additionally, students could find and close exploitable threats on an infected computer in order to protect information.

Standard Identifier: 9-12S.NI.6

Grade Range: 9–12 Specialty
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Recognizing and Defining Computational Problems, Developing and Using Abstractions (3.3, 4.2)

Standard:
Analyze cryptographic techniques to model the secure transmission of information.

Descriptive Statement:
Cryptography is essential to many models of cybersecurity. Open standards help to ensure cryptographic security. Certificate Authorities (CAs) issue digital certificates that validate the ownership of encrypted keys used in secured communications across the Internet. Students encode and decode messages using encryption and decryption methods, and they should understand the different levels of complexity to hide or secure information. For example, students could analyze the relative designs of private key vs. public key encryption techniques and apply the best choice for a particular scenario. Alternatively, students could analyze the design of the Diffie-Helman algorithm to RSA (Rivest–Shamir–Adleman) and apply the best choice for a particular scenario. They could provide a cost-benefit analysis of runtime and ease of cracking for various encryption techniques which are commonly used to secure transmission of data over the Internet.

Showing 21 - 27 of 27 Standards


Questions: Curriculum Frameworks and Instructional Resources Division | CFIRD@cde.ca.gov | 916-319-0881