Skip to main content
California Department of Education Logo

Computer Science Standards




Results


Showing 41 - 50 of 66 Standards

Standard Identifier: 9-12.IC.23

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Culture
Practice(s): Fostering an Inclusive Computing Culture, Recognizing and Defining Computational Problems (1.2, 3.1)

Standard:
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.

Descriptive Statement:
Computing may improve, harm, or maintain practices. An understanding of how equity deficits, such as minimal exposure to computing, access to education, and training opportunities, are related to larger, systemic problems in society enables students to create more meaningful artifacts. Students illustrate the positive, negative, and/or neutral impacts of computing. For example, students could evaluate the accessibility of a product for a broad group of end users, such as people who lack access to broadband or who have various disabilities. Students could identify potential bias during the design process and evaluate approaches to maximize accessibility in product design. Alternatively, students could evaluate the impact of social media on cultural, economic, and social practices around the world.

Standard Identifier: 9-12.IC.25

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Culture
Practice(s): Recognizing and Defining Computational Problems (3.1)

Standard:
Demonstrate ways a given algorithm applies to problems across disciplines.

Descriptive Statement:
Students identify how a given algorithm can be applied to real-world problems in different disciplines. For example, students could demonstrate how a randomization algorithm can be used to select participants for a clinical medical trial or to select a flash card to display on a vocabulary quiz. Alternatively, students could demonstrate how searching and sorting algorithms are needed to organize records in manufacturing settings, or to support doctors queries of patient records, or to help governments manage support services they provide to their citizens.

Standard Identifier: 9-12.IC.26

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Culture
Practice(s): Communicating About Computing (7.2)

Standard:
Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources.

Descriptive Statement:
For example, after studying the rise of artifical intelligence, students create a cause and effect chart to represent positive and negative impacts of this technology on society.

Standard Identifier: 9-12.IC.27

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Social Interactions
Practice(s): Collaborating Around Computing (2.4)

Standard:
Use collaboration tools and methods to increase connectivity with people of different cultures and careers.

Descriptive Statement:
Increased digital connectivity and communication between people across a variety of cultures and in differing professions has changed the collaborative nature of personal and professional interaction. Students identify, explain, and use appropriate collaborative tools. For example, students could compare ways that various technological collaboration tools could help a team become more cohesive and then choose one of these tools to manage their teamwork. Alternatively, students could use different collaborative tools and methods to solicit input from not only team members and classmates but also others, such as participants in online forums or local communities.

Standard Identifier: 9-12.IC.28

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Safety, Law, & Ethics
Practice(s): Communicating About Computing (7.3)

Standard:
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.

Descriptive Statement:
Laws and ethics govern aspects of computing such as privacy, data, property, information, and identity. Students explain the beneficial and harmful effects of intellectual property laws as they relate to potential innovations and governance. For example, students could explain how patents protect inventions but may limit innovation. Alternatively, students could explain how intellectual property laws requiring that artists be paid for use of their media might limit the choice of songs developers can use in their computational artifacts.

Standard Identifier: 9-12.IC.29

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Safety, Law, & Ethics
Practice(s): Communicating About Computing (7.2)

Standard:
Explain the privacy concerns related to the collection and generation of data through automated processes.

Descriptive Statement:
Data can be collected and aggregated across millions of people, even when they are not actively engaging with or physically near the data collection devices. Students recognize automated and non-evident collection of information and the privacy concerns they raise for individuals. For example, students could explain the impact on an individual when a social media site's security settings allows for mining of account information even when the user is not online. Alternatively, students could discuss the impact on individuals of using surveillance video in a store to track customers. Additionally, students could discuss how road traffic can be monitored to change signals in real time to improve road efficiency without drivers being aware and discuss policies for retaining data that identifies drivers' cars and their behaviors.

Standard Identifier: 9-12.IC.30

Grade Range: 9–12
Concept: Impacts of Computing
Subconcept: Safety, Law, & Ethics
Practice(s): Communicating About Computing (7.2)

Standard:
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.

Descriptive Statement:
Laws govern many aspects of computing, such as privacy, data, property, information, and identity. International differences in laws and ethics have implications for computing. Students make and justify claims about potential and/or actual privacy implications of policies, laws, or ethics and consider the associated tradeoffs, focusing on society and the economy. For example, students could explore the case of companies tracking online shopping behaviors in order to decide which products to target to consumers. Students could evaluate the ethical and legal dilemmas of collecting such data without consumer knowledge in order to profit companies. Alternatively, students could evaluate the implications of net neutrality laws on society's access to information and on the impacts to businesses of varying sizes.

Standard Identifier: 9-12.NI.5

Grade Range: 9–12
Concept: Networks & the Internet
Subconcept: Network Communication & Organization
Practice(s): Communicating About Computing (7.2)

Standard:
Describe the design characteristics of the Internet.

Descriptive Statement:
The Internet connects devices and networks all over the world. Large-scale coordination occurs among many different machines across multiple paths every time a web page is opened or an image is viewed online. Through the domain name system (DNS), devices on the Internet can look up Internet Protocol (IP) addresses, allowing end-to-end communication between devices. The design decisions that direct the coordination among systems composing the Internet also allow for scalability and reliability. Students factor historical, cultural, and economic decisions in their explanations of the Internet. For example, students could explain how hierarchy in the DNS supports scalability and reliability. Alternatively, students could describe how the redundancy of routing between two nodes on the Internet increases reliability and scales as the Internet grows.

Standard Identifier: 9-12.NI.6

Grade Range: 9–12
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Communicating About Computing (7.2)

Standard:
Compare and contrast security measures to address various security threats.

Descriptive Statement:
Network security depends on a combination of hardware, software, and practices that control access to data and systems. The needs of users and the sensitivity of data determine the level of security implemented. Potential security problems, such as denial-of-service attacks, ransomware, viruses, worms, spyware, and phishing, present threats to sensitive data. Students compare and contrast different types of security measures based on factors such as efficiency, feasibility, ethical impacts, usability, and security. At this level, students are not expected to develop or implement the security measures that they discuss. For example, students could review case studies or current events in which governments or organizations experienced data leaks or data loss as a result of these types of attacks. Students could provide an analysis of actual security measures taken comparing to other security measure which may have led to different outcomes. Alternatively, students might discuss computer security policies in place at the local level that present a tradeoff between usability and security, such as a web filter that prevents access to many educational sites but keeps the campus network safe.

Standard Identifier: 9-12.NI.7

Grade Range: 9–12
Concept: Networks & the Internet
Subconcept: Cybersecurity
Practice(s): Recognizing and Defining Computational Problems, Developing and Using Abstractions (3.3, 4.4)

Standard:
Compare and contrast cryptographic techniques to model the secure transmission of information.

Descriptive Statement:
Cryptography is a technique for transforming information on a computer in such a way that it becomes unreadable by anyone except authorized parties. Cryptography is useful for supporting secure communication of data across networks. Examples of cryptographic methods include hashing, symmetric encryption/decryption (private key), and assymmetric encryption/decryption (public key/private key). Students use software to encode and decode messages using cryptographic methods. Students compare the costs and benefits of using various cryptographic methods. At this level, students are not expected to perform the mathematical calculations associated with encryption and decryption. For example, students could compare and contrast multiple examples of symmetric cryptographic techiques. Alternatively, students could compare and contrast symmetric and asymmetric cryptographic techniques in which they apply for a given scenario.

Showing 41 - 50 of 66 Standards


Questions: Curriculum Frameworks and Instructional Resources Division | CFIRD@cde.ca.gov | 916-319-0881