Skip to main content
California Department of Education Logo

Computer Science Standards




Results


Showing 1 - 10 of 16 Standards

Standard Identifier: K-2.AP.11

Grade Range: K–2
Concept: Algorithms & Programming
Subconcept: Variables
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Model the way programs store data.

Descriptive Statement:
Information in the real world can be represented in computer programs. Students model the digital storage of data by transforming real-world information into symbolic representations that include text, numbers, and images. For example, after identifying symbols on a map and explaining what they represent in the real world, students could create their own symbols and corresponding legend to represent items on a map of their classroom (HSS.K.4.3, 1.2.3, 2.2.2) Alternatively, students could invent symbols to represent beat and/or pitch. Students could then modify symbols within the notation and explain how the musical phrase changes. (VAPA Music K.1.1, 1.1.1, 2.1.1, 2.2.2)

Standard Identifier: K-2.DA.8

Grade Range: K–2
Concept: Data & Analysis
Subconcept: Collection, Visualization, & Transformation
Practice(s): Developing and Using Abstractions, Communicating About Computing (4.4, 7.1)

Standard:
Collect and present data in various visual formats.

Descriptive Statement:
Data can be collected and presented in various visual formats. For example, students could measure temperature changes throughout a day. They could then discuss ways to display the data visually. Students could extend the activity by writing different narratives based on collected data, such as a story that begins in the morning when temperatures are low and one that begins in the afternoon when the sun is high and temperatures are higher. (CA CCSS for ELA/Literacy RL.K.9, RL.1.9, RL.2.9, W.K.3, W.1.3, W.2.3). Alternatively, students collect peers' favorite flavor of ice cream and brainstorm differing ways to display the data. In groups, students can choose to display and present the data in a format of their choice. (CA CCSS for Mathematics K.MD.3, 1.MD.4, 2.MD.10)

Standard Identifier: K-2.DA.9

Grade Range: K–2
Concept: Data & Analysis
Subconcept: Inference & Models
Practice(s): Developing and Using Abstractions (4.1)

Standard:
Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions.

Descriptive Statement:
Data can be used to make inferences or predictions about the world. For example, students could record the number of each color of candy in a small packet. Then, they compare their individual data with classmates. Students could use the collected data to predict how many of each colored candy will be in a full size bag of like candy. (CA CCSS for Mathematics K.MD.3, 1.MD.4, 2.MD.10) Alternatively, students could sort and classify objects according to their properties and note observations. Students could then create a graph or chart of their observations and look for connections/relationships (e.g., items that are hard are usually also smooth, or items that are fluffy are usually also light in weight.) Students then look at pictures of additional objects and make predictions regarding the properties of the objects pictured. (CA NGSS: 2-PS1-1, 2-PS1-2)

Standard Identifier: K-2.NI.6

Grade Range: K–2
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Create patterns to communicate a message.

Descriptive Statement:
Connecting devices to a network or the Internet provides great benefit, but care must be taken to protect devices and information from unauthorized access. Messages can be protected by using secret languages or codes. Patterns help to ensure that the intended recipient can decode the message. Students create a pattern that can be decoded and translated into a message. For example, students could use a table to associate each text character with a number. Then, they could select a combination of text characters and use mathematical functions (e.g., simple arithmetic operations) to transform the numbers associated with the characters into a secret message. Using inverse functions, a peer could translate the secret message back into its original form. (CA CCSS for Mathematics 2.OA.A.1, 2.OA.B.2) Alternatively, students could use icons or invented symbols to represent patterns of beat, rhythm, or pitch to decode a musical phrase. (VAPA Music K.1.1, 1.1.1, 2.1.1, 2.2.2)

Standard Identifier: 3-5.CS.2

Grade Range: 3–5
Concept: Computing Systems
Subconcept: Hardware & Software
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Demonstrate how computer hardware and software work together as a system to accomplish tasks.

Descriptive Statement:
Hardware and software are both needed to accomplish tasks with a computing device. Students create a model to illustrate ways in which hardware and software work as a system. Students could draw a model on paper or in a drawing program, program an animation to demonstrate it, or demonstrate it by acting this out in some way. At this level, a model should only include the basic elements of a computer system, such as input, output, processor, sensors, and storage. For example, students could create a diagram or flow chart to indicate how a keyboard, desktop computer, monitor, and word processing software interact with each other. The keyboard (hardware) detects a key press, which the operating system and word processing application (software) displays as a new character that has been inserted into the document and is visible through the monitor (hardware). Students could also create a model by acting out the interactions of these different hardware and software components. Alternatively, when describing that animals and people receive different types of information through their senses, process the information in their brain, and respond to the information in different ways, students could compare this to the interaction of how the information traveling through a computer from mouse to processor are similar to signals sent through the nervous system telling our brain about the world around us to prompt responses. (CA NGSS: 4-LS1-2)

Standard Identifier: 3-5.NI.6

Grade Range: 3–5
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Create patterns to protect information from unauthorized access.

Descriptive Statement:
Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. At this level, students use patterns as a code for encryption, to protect information. Patterns should be decodable to the party for whom the message is intended, but difficult or impossible for those with unauthorized access. For example, students could create encrypted messages via flashing a flashlight in Morse code. Other students could decode this established language even if it wasn't meant for them. To model the idea of protecting data, students should create their own variations on or changes to Morse code. This ensures that when a member of that group flashes a message only other members of their group can decode it, even if other students in the room can see it. (CA NGSS: 4-PS4-3) Alternatively, students could engage in a CS Unplugged activity that models public key encryption: One student puts a paper containing a written secret in a box, locks it with a padlock, and hands the box to a second student. Student 2 puts on a second padlock and hands it back. Student 1 removes her lock and hands the box to student 2 again. Student 2 removes his lock, opens the box, and has access to the secret that student 1 sent him. Because the box always contained at least one lock while in transit, an outside party never had the opportunity to see the message and it is protected.

Standard Identifier: 6-8.DA.9

Grade Range: 6–8
Concept: Data & Analysis
Subconcept: Inference & Models
Practice(s): Developing and Using Abstractions, Testing and Refining Computational Artifacts (4.4, 6.1)

Standard:
Test and analyze the effects of changing variables while using computational models.

Descriptive Statement:
Variables within a computational model may be changed, in order to alter a computer simulation or to more accurately represent how various data is related. Students interact with a given model, make changes to identified model variables, and observe and reflect upon the results. For example, students could test a program that makes a robot move on a track by making changes to variables (e.g., height and angle of track, size and mass of the robot) and discussing how these changes affect how far the robot travels. (CA NGSS: MS-PS2-2) Alternatively, students could test a game simulation and change variables (e.g., skill of simulated players, nature of opening moves) and analyze how these changes affect who wins the game. (CA NGSS: MS-ETS1-3) Additionally, students could modify a model for predicting the likely color of the next pick from a bag of colored candy and analyze the effects of changing variables representing the common color ratios in a typical bag of candy. (CA CCSS for Mathematics 7.SP.7, 8.SP.4)

Standard Identifier: 6-8.NI.6

Grade Range: 6–8
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Developing and Using Abstractions (4.4)

Standard:
Apply multiple methods of information protection to model the secure transmission of information.

Descriptive Statement:
Digital information is protected using a variety of cryptographic techniques. Cryptography is essential to many models of cybersecurity. At its core, cryptography has a mathematical foundation. Cryptographic encryption can be as simple as letter substitution or as complicated as modern methods used to secure networks and the Internet. Students encode and decode messages using encryption methods, and explore different levels of complexity used to hide or secure information. For example, students could identify methods of secret communication used during the Revolutionary War (e.g., ciphers, secret codes, invisible ink, hidden letters) and then secure their own methods such as substitution ciphers or steganography (i.e., hiding messages inside a picture or other data) to compose a message from either the Continental Army or British Army. (HSS.8.1) Alternatively, students could explore functions and inverse functions for encryption and decryption and consider functions that are complex enough to keep data secure from their peers. (CA CCSS for Mathematics 8.F.1)

Standard Identifier: 9-12.AP.13

Grade Range: 9–12
Concept: Algorithms & Programming
Subconcept: Variables
Practice(s): Developing and Using Abstractions (4.1)

Standard:
Create more generalized computational solutions using collections instead of repeatedly using simple variables.

Descriptive Statement:
Computers can automate repetitive tasks with algorithms that use collections to simplify and generalize computational problems. Students identify common features in multiple segments of code and substitute a single segment that uses collections (i.e., arrays, sets, lists) to account for the differences. For example, students could take a program that inputs students' scores into multiple variables and modify it to read these scores into a single array of scores. Alternatively, instead of writing one procedure to find averages of student scores and another to find averages of student absences, students could write a single general average procedure to support both tasks.

Standard Identifier: 9-12.CS.2

Grade Range: 9–12
Concept: Computing Systems
Subconcept: Hardware & Software
Practice(s): Developing and Using Abstractions (4.1)

Standard:
Compare levels of abstraction and interactions between application software, system software, and hardware.

Descriptive Statement:
At its most basic level, a computer is composed of physical hardware on which software runs. Multiple layers of software are built upon various layers of hardware. Layers manage interactions and complexity in the computing system. System software manages a computing device's resources so that software can interact with hardware. Application software communicates with the user and the system software to accomplish its purpose. Students compare and describe how application software, system software, and hardware interact. For example, students could compare how various levels of hardware and software interact when a picture is to be taken on a smartphone. Systems software provides low-level commands to operate the camera hardware, but the application software interacts with system software at a higher level by requesting a common image file format (e.g., .png) that the system software provides.

Showing 1 - 10 of 16 Standards


Questions: Curriculum Frameworks and Instructional Resources Division | CFIRD@cde.ca.gov | 916-319-0881