A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Progression of California K–12 Computer Science Standards | |||||||||||||||||||||||||
2 | California Department of Education | |||||||||||||||||||||||||
3 | August 1, 2018 | |||||||||||||||||||||||||
4 | Concept + Subconcept | Grades K–2 Core By the end of Grade 2 ALL students will be able to... | Grades 3–5 Core By the end of Grade 5 ALL students will be able to... | Grades 6–8 Core By the end of Grade 8 ALL students will be able to... | Grades 9–12 Core By the end of Grade 12 ALL students will be able to... | Grades 9–12 Specialty By the end of Grade 12 students will be able to... | ||||||||||||||||||||
5 | Computing Systems Devices | K-2.CS.1 Select and operate computing devices that perform a variety of tasks accurately and quickly based on user needs and preferences. (P1.1) | 3-5.CS.1 Describe how computing devices connect to other components to form a system. (P7.2) | 6-8.CS.1 Design modifications to computing devices in order to improve the ways users interact with the devices. (P1.2, P3.3) | 9-12.CS.1 Describe ways in which abstractions hide the underlying implementation details of computing systems to simplify user experiences. (P4.1) | 9-12S.CS.1 Illustrate ways computing systems implement logic through hardware components. (P4.4, P7.2) | ||||||||||||||||||||
6 | Computing Systems Hardware & Software | K-2.CS.2 Explain the functions of common hardware and software components of computing systems. (P7.2) | 3-5.CS.2 Demonstrate how computer hardware and software work together as a system to accomplish tasks. (P4.4) | 6-8.CS.2 Design a project that combines hardware and software components to collect and exchange data. (P5.1) | 9-12.CS.2 Compare levels of abstraction and interactions between application software, system software, and hardware. (P4.1) | 9-12S.CS.2 Categorize and describe the different functions of operating system software. (P7.2) | ||||||||||||||||||||
7 | Computing Systems Troubleshooting | K-2.CS.3 Describe basic hardware and software problems using accurate terminology. (P6.2, P7.2) | 3-5.CS.3 Determine potential solutions to solve simple hardware and software problems using common troubleshooting strategies. (P6.2) | 6-8.CS.3 Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems. (P6.2) | 9-12.CS.3 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. (P6.2) | n/a | ||||||||||||||||||||
8 | Network & The Internet Network Communication & Organization | K-2.NI.4 Model and describe how people connect to other people, places, information and ideas through a network. (P4.4) | 3-5.NI.4 Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination. (P4.4) | 6-8.NI.4 Model the role of protocols in transmitting data across networks and the Internet. (P4.4) | 9-12.NI.4 Describe issues that impact network functionality. (P4.1) 9-12.NI.5 Describe the design characteristics of the Internet. (P7.2) | 9-12S.NI.3 Examine the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. (P4.4) 9-12S.NI.4 Explain how the characteristics of the Internet influence the systems developed on it. (P7.2) | ||||||||||||||||||||
9 | Network & The Internet Cybersecurity | K-2.NI.5 Explain why people use passwords. (P7.2) K-2.NI.6 Create patterns to communicate a message. (P4.4) | 3-5.NI.5 Describe physical and digital security measures for protecting personal information. (P3.1) 3-5.NI.6 Create patterns to protect information from unauthorized access. (P4.4) | 6-8.NI.5 Explain potential security threats and security measures to mitigate threats. (P3.1, P3.3) 6-8.NI.6 Apply multiple methods of information protection to model the secure transmission of information. (P4.4) | 9-12.NI.6 Compare and contrast security measures to address various security threats. (P7.2) 9-12.NI.7 Compare and contrast cryptographic techniques to model the secure transmission of information. (P3.3, P4.4) | 9-12S.NI.5 Develop solutions to security threats. (P5.3) 9-12S.NI.6 Analyze cryptographic techniques to model the secure transmission of information. (P3.3, P4.2) | ||||||||||||||||||||
10 | Data & Analysis Storage | K-2.DA.7 Store, copy, search, retrieve, modify, and delete information using a computing device, and define the information stored as data. (P4.2) | 3-5.DA.7 Explain that the amount of space required to store data differs based on the type of data and/or level of detail. (P4.2) | 6-8.DA.7 Represent data in multiple ways. (P4.4) | 9-12.DA.8 Translate between different representations of data abstractions of real-world phenomena, such as characters, numbers, and images. (P4.1) 9-12.DA.9 Describe tradeoffs associated with how data elements are organized and stored. (P3.3) | n/a | ||||||||||||||||||||
11 | Data & Analysis Collection, Visualization, & Transformation | K-2.DA.8 Collect and present data in various visual formats. (P4.4, P7.1) | 3-5.DA.8 Organize and present collected data visually to highlight relationships and support a claim. (P7.1) | 6-8.DA.8 Collect data using computational tools and transform the data to make it more useful. (P7.1) | 9-12.DA.10 Create data visualizations to help others better understand real-world phenomena. (P5.2) | 9-12S.DA.7 Select and use data collection tools and techniques to generate data sets. (P7.1) 9-12S.DA.8 Use data analysis tools and techniques to identify patterns in data representing complex systems. (P4.1, P7.1) | ||||||||||||||||||||
12 | Data & Analysis Inference & Models | K-2.DA.9 Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions. (P4.1) | 3-5.DA.9 Use data to highlight and/or propose relationships, predict outcomes, or communicate ideas. (P7.1) | 6-8.DA.9 Test and analyze the effects of changing variables while using computational models. (P4.4, P6.1) | 9-12.DA.11 Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process. (P4.4, P6.3) | 9-12S.DA.9 Evaluate the ability of models and simulations to test and support the refinement of hypotheses. (P4.4) | ||||||||||||||||||||
13 | Algorithms & Programming Algorithms | K-2.AP.10 Model daily processes by creating and following algorithms to complete tasks. (P3.2, P4.4) | 3-5.AP.10 Compare and refine multiple algorithms for the same task and determine which is the most appropriate. (P3.3, P6.3) | 6-8.AP.10 Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems. (P4.1, P4.4) | 9-12.AP.12 Design algorithms to solve computational problems using a combination of original and existing algorithms. (P4.2, P5.1) | 9-12S.AP.10 Describe how artificial intelligence drives many software and physical systems. (P3.1, P7.2) 9-12S.AP.11 Implement an algorithm that uses artificial intelligence to overcome a simple challenge. (P3.1, P5.3) 9-12S.AP.12 Implement searching and sorting algorithms to solve computational problems. (P4.2, P5.2) 9-12S.AP.13 Evaluate algorithms in terms of their efficiency. (P3.3) | ||||||||||||||||||||
14 | Algorithms & Programming Variables | K-2.AP.11 Model the way programs store data. (P4.4) | 3-5.AP.11 Create programs that use variables to store and modify data. (P5.2) | 6-8.AP.11 Create clearly named variables that store data, and perform operations on their contents. (P5.1, P5.2) | 9-12.AP.13 Create more generalized computational solutions using collections instead of repeatedly using simple variables. (P4.1) | 9-12S.AP.14 Compare and contrast fundamental data structures and their uses. (P4.2) | ||||||||||||||||||||
15 | Algorithms & Programming Control | K-2.AP.12 Create programs with sequences of commands and simple loops, to express ideas or address a problem. (P5.2) | 3-5.AP.12 Create programs that include events, loops, and conditionals. (P5.2) | 6-8.AP.12 Design and iteratively develop programs that combine control structures and use compound conditions. (P5.1, P5.2) | 9-12.AP.15 Iteratively design and develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. (P5.1, P5.2, P5.3) 9-12.AP.14 Justify the selection of specific control structures by identifying tradeoffs associated with implementation, readability, and performance. (P5.2) | 9-12S.AP.15 Demonstrate the flow of execution of a recursive algorithm.(P3.2, P7.2) | ||||||||||||||||||||
16 | Algorithms & Programming Modularity | K-2.AP.13 Decompose the steps needed to solve a problem into a sequence of instructions. (P3.2) | 3-5.AP.13 Decompose problems into smaller, manageable tasks which may themselves be decomposed. (P3.2) 3-5.AP.14 Create programs by incorporating smaller portions of existing programs, to develop something new or add more advanced features. (P4.2, P5.3) | 6-8.AP.13 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. (P3.2) 6-8.AP.14 Create procedures with parameters to organize code and make it easier to reuse. (P4.1, P4.3) | 9-12.AP.16 Decompose problems into smaller subproblems through systematic analysis, using constructs such as procedures, modules, and/or classes. (P3.2) 9-12.AP.17 Create computational artifacts using modular design. (P4.3, P5.2) | 9-12S.AP.16 Analyze a large-scale computational problem and identify generalizable patterns or problem components that can be applied to a solution. (P3.2, P4.2) 9-12S.AP.17 Construct solutions to problems using student-created components, such as procedures, modules, and/or objects. (P4.3, P5.2) 9-12S.AP.18 Demonstrate code reuse by creating programming solutions using libraries and APIs. (P4.2, P5.3, P6.2) | ||||||||||||||||||||
17 | Algorithms & Programming Program Development | K-2.AP.14 Develop plans that describe a program’s sequence of events, goals, and expected outcomes. (P5.1, P7.2) K-2.AP.15 Give attribution when using the ideas and creations of others while developing programs. (P7.3) K-2.AP.16 Debug errors in an algorithm or program that includes sequences and simple loops. (P6.2) K-2.AP.17 Describe the steps taken and choices made during the iterative process of program development. (P7.2) | 3-5.AP.15 Use an iterative process to plan and develop a program by considering the perspectives and preferences of others. (P1.1, P5.1) 3-5.AP.16 Observe intellectual property rights and give appropriate attribution when creating, remixing, or combining programs. (P5.2, P7.3) 3-5.AP.17 Test and debug a program or algorithm to ensure it accomplishes the intended task. (P6.2) 3-5.AP.18 Perform different roles when collaborating with peers during the design, implementation, and review stages of program development. (P2.2) 3-5.AP.19 Describe choices made during program development using code comments, presentations, and demonstrations. (P7.2) | 6-8.AP.15 Seek and incorporate feedback from team members and users to refine a solution that meets user needs. (P1.1, P2.3) 6-8.AP.16 Incorporate existing code, media, and libraries into original programs, and give attribution. (P4.2, P5.2, P7.3) 6-8.AP.17 Systematically test and refine programs using a range of test cases. (P6.1) 6-8.AP.18 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. (P2.2, P5.1) 6-8.AP.19 Document programs in order to make them easier to use, read, test, and debug. (P7.2) | 9-12.AP.18 Systematically design programs for broad audiences by incorporating feedback from users. (P1.1, P5.1) 9-12.AP.19 Explain the limitations of licenses that restrict use of computational artifacts when using resources such as libraries. (P7.3) 9-12.AP.20 Iteratively evaluate and refine a computational artifact to enhance its performance, reliability, usability, and accessibility. (P6.3) 9-12.AP.21 Design and develop computational artifacts working in team roles using collaborative tools. (P2.4) 9-12.AP.22 Document decisions made during the design process using text, graphics, presentations, and/or demonstrations in the development of complex programs. (P7.2) | 9-12S.AP.19 Plan and develop programs for broad audiences using a specific software life cycle process. (P2.2, P2.3, P5.2) 9-12S.AP.20 Develop programs for multiple computing platforms. (P5.2) 9-12S.AP.21 Identify and fix security issues that might compromise computer programs. (P6.2) 9-12S.AP.22 Develop and use a series of test cases to verify that a program performs according to its design specifications. (P6.1) 9-12S.AP.23 Modify an existing program to add additional functionality and discuss intended and unintended implications. (P4.2, P5.3) 9-12S.AP.24 Evaluate key qualities of a program through a process such as a code review. (P6.3) 9-12S.AP.25 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (e.g., code documentation) while developing software within a group. (P2.4, P5.2) 9-12S.AP.26 Compare multiple programming languages, and discuss how their features make them suitable for solving different types of problems. (P7.2) | ||||||||||||||||||||
18 | Impacts of Computing Culture | K-2.IC.18 Compare how people lived and worked before and after the adoption of new computing technologies. (P3.1) | 3-5.IC.20 Discuss computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices. (P3.1) 3-5.IC.21 Propose ways to improve the accessibility and usability of technology products for the diverse needs and wants of users. (P1.2) | 6-8.IC.20 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. (P7.2) 6-8.IC.21 Discuss issues of bias and accessibility in the design of existing technologies. (P1.2) | 9-12.IC.23 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. (P1.2, P3.1) 9-12.IC.24 Identify impacts of bias and equity deficit on design and implementation of computational artifacts and apply appropriate processes for evaluating issues of bias. (P1.2) 9-12.IC.25 Demonstrate ways a given algorithm applies to problems across disciplines. (P3.1) 9-12.IC.26 Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources. (P7.2) | 9-12S.IC.27 Evaluate computational artifacts with regard to improving their beneficial effects and reducing harmful effects on society. (P1.2, P6.1) 9-12S.IC.28 Evaluate how computational innovations that have revolutionized aspects of our culture might evolve. (P7.2) 9-12S.IC.29 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society. (P1.2) | ||||||||||||||||||||
19 | Impacts of Computing Social Interactions | K-2.IC.19 Work respectfully and responsibly with others when communicating electronically. (P2.1) | 3-5.IC.22 Seek and explain the impact of diverse perspectives for the purpose of improving computational artifacts. (P1.1) | 6-8.IC.22 Collaborate with many contributors when creating a computational artifact. (P2.4, P5.2) | 9-12.IC.27 Use collaboration tools and methods to increase connectivity with people of different cultures and careers. (P2.4) | n/a | ||||||||||||||||||||
20 | Impacts of Computing Safety, Law, & Ethics | K-2.IC.20 Describe approaches and rationales for keeping login information private, and for logging off of devices appropriately. (P3.1) | 3-5.IC.23 Describe reasons creators might limit the use of their work. (P7.3) | 6-8.IC.23 Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts. (P7.3) 6-8.IC.24 Compare tradeoffs between allowing information to be public and keeping information private and secure. (P7.2) | 9-12.IC.28 Explain the beneficial and harmful effects that intellectual property laws can have on innovation. (P7.3) 9-12.IC.29 Explain the privacy concerns related to the collection and generation of data through automated processes. (P7.2) 9-12.IC.30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.2) | 9-12S.IC.30 Debate laws and regulations that impact the development and use of software. (P7.2) | ||||||||||||||||||||
21 | Practices | P1. Fostering an Inclusive Computing Culture P2. Collaborating Around Computing | P3. Recognizing and Defining Computational Problems | P4. Developing and Using Abstractions P5. Creating Computational Artifacts | P6. Testing and Refining Computational Artifacts P7. Communicating About Computing | [See K-12 CS Framework (k12cs.org) for subpractices.] | ||||||||||||||||||||
22 | ||||||||||||||||||||||||||
23 | ||||||||||||||||||||||||||
24 | ||||||||||||||||||||||||||
25 | ||||||||||||||||||||||||||
26 | ||||||||||||||||||||||||||
27 | ||||||||||||||||||||||||||
28 | ||||||||||||||||||||||||||
29 | ||||||||||||||||||||||||||
30 | ||||||||||||||||||||||||||
31 | ||||||||||||||||||||||||||
32 | ||||||||||||||||||||||||||
33 | ||||||||||||||||||||||||||
34 | ||||||||||||||||||||||||||
35 | ||||||||||||||||||||||||||
36 | ||||||||||||||||||||||||||
37 | ||||||||||||||||||||||||||
38 | ||||||||||||||||||||||||||
39 | ||||||||||||||||||||||||||
40 | ||||||||||||||||||||||||||
41 | ||||||||||||||||||||||||||
42 | ||||||||||||||||||||||||||
43 | ||||||||||||||||||||||||||
44 | ||||||||||||||||||||||||||
45 | ||||||||||||||||||||||||||
46 | ||||||||||||||||||||||||||
47 | ||||||||||||||||||||||||||
48 | ||||||||||||||||||||||||||
49 | ||||||||||||||||||||||||||
50 | ||||||||||||||||||||||||||
51 | ||||||||||||||||||||||||||
52 | ||||||||||||||||||||||||||
53 | ||||||||||||||||||||||||||
54 | ||||||||||||||||||||||||||
55 | ||||||||||||||||||||||||||
56 | ||||||||||||||||||||||||||
57 | ||||||||||||||||||||||||||
58 | ||||||||||||||||||||||||||
59 | ||||||||||||||||||||||||||
60 | ||||||||||||||||||||||||||
61 | ||||||||||||||||||||||||||
62 | ||||||||||||||||||||||||||
63 | ||||||||||||||||||||||||||
64 | ||||||||||||||||||||||||||
65 | ||||||||||||||||||||||||||
66 | ||||||||||||||||||||||||||
67 | ||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||
100 |