Вы находитесь на странице: 1из 2

Progression of Computer Science Teachers Association (CSTA) K-12 Computer Science Standards, Revised 2017

Con Level 1A (Ages 5-7) Level 1B (Ages 8-11) Level 2 (Ages 11-14) Level 3A (Ages 14-16)
Subconcept
cept By the end of Grade 2, students will be able to... By the end of Grade 5, students will be able to... By the end of Grade 8, students will be able to... By the end of Grade 10, students will be able to...
Select and operate appropriate software to
Recommend improvements to the design of Explain how abstractions hide the underlying
perform a variety of tasks and recognize that Describe how internal and external parts of
Devices P1.1 P7.2 P3.3 computing devices, based on an analysis of P4.1 implementation details of computing systems
Computing Systems

users have different needs and preferences for computing devices function to form a system.
how users interact with the devices. embedded in everyday objects.
the technology they use.
Use appropriate terminology in identifying and
Design projects that combine hardware and Compare levels of abstraction and interactions
Hardware & describing the function of common physical Model how computer hardware and software
P7.2 P4.4 P5.1 software components to collect and exchange P4.1 between application software, system software and
Software components of computing systems work together as a system to accomplish tasks.
data. hardware layers.
(hardware).
Determine potential solutions to solve simple Develop guidelines that convey systematic
P6.2 Describe basic hardware and software Systematically identify and fix problems with
Troubleshooting P6.2 hardware and software problems using common P6.2 P6.2 troubleshooting strategies that others can use to
P7.2 problems using accurate terminology. computing devices and their components.
troubleshooting strategies. identify and fix errors.
Model how information is broken down into
Network Evaluate the scalability and reliability of networks,
smaller pieces, transmitted as packets through Model the role of protocols in transmitting
Communication & P4.4 P4.4 P4.1 by describing the relationship between routers,
multiple devices over networks and the Internet, data across networks and the Internet.
Organization switches, servers, topology and addressing.
and reassembled at the destination.
Networks & The Internet

Explain what passwords are and why we use


them, and use strong passwords to protect Discuss real-world cybersecurity problems and Explain how physical and digital security Give examples to illustrate how sensitive data can
P7.3 P3.1 P7.2 P7.2
devices and information from unauthorized how personal information can be protected. measures protect electronic information. be affected by malware and other attacks.
access.
Recommend security measures to address various
Apply multiple methods of encryption to model
P4.4 P3.3 scenarios based on factors such as efficiency,
Cybersecurity the secure transmission of information.
feasibility, and ethical impacts.
Compare various security measures, considering
P6.3 tradeoffs between the usability and security of a
computer system.
Explain tradeoffs when selecting and implementing
P7.2
cybersecurity recommendations.
Store, copy, search, retrieve, modify, and Translate between different bit representations of
Represent data using multiple encoding
P4.2 delete information using a computing device P4.0 P4.1 real-world phenomena, such as characters,
schemes.
Storage and define the information stored as data. numbers and images.
Data & Analysis

Evaluate the tradeoffs in how data elements are


P3.3
organized and where data is stored.
Collection, Collect data using computational tools and Create interactive data visualizations using software
P7.1 Collect and present the same data in various Organize and present collected data visually to
Visualization & P7.1 P6.3 transform the data to make it more useful and P4.4 tools to help others better understand real-world
P4.4 visual formats. highlight relationships and support a claim.
Transformation reliable. phenomena.
Identify and describe patterns in data Use data to highlight or propose cause-and-effect Create a computational model that represents the
P5.3 Refine computational models based on the
Inference & Models P4.1 visualizations, such as charts or graphs, to P7.1 relationships, predict outcomes, or communicate P4.4 relationships among different elements of data
P4.4 data they have generated.
make a prediction. an idea. collected from a phenomenon or process.
Model daily processes by creating and Compare and refine multiple algorithms for the Create prototypes that use algorithms to solve
P6.3 P4.4 Use flowcharts and/or pseudocode to address
Algorithms P4.4 following algorithms (sets of step-by-step same task and determine which is the most P5.2 computational problems by leveraging prior student
P3.3 P4.1 complex problems as algorithms.
Algorithms & Programming

instructions) to complete tasks. appropriate. knowledge and personal interests


Model the way programs store and manipulate Create clearly named variables that represent Use lists to simplify solutions, generalizing
Create programs that use variables to store and P5.1
Variables P4.4 data by using numbers or other symbols to P5.2 different data types and perform operations P4.1 computational problems instead of repeated use of
modify data. P5.2
represent information. on their values. simple variables.
Justify the selection of specific control structures
Design and iteratively develop programs that
Develop programs with sequences and simple Create programs that include sequences, events, P5.1 when tradeoffs involve implementation, readability,
P5.2 P5.2 combine control structures, including nested P5.2
loops, to express ideas or address a problem. loops, and conditionals. P5.2 and program performance and explain the benefits
loops and compound conditionals.
and drawbacks of choices made.
Control
Design and iteratively develop computational
artifacts for practical intent, personal expression, or
P5.2
to address a societal issue by using events to
initiate instructions.

P1. Fostering an Inclusive Computing Culture P3. Recognizing and Defining Computational Problems P5. Creating Computational Artifacts
Practices P7. Communicating About Computing
P2. Collaborating Around Computing P4. Developing and Using Abstractions P6. Testing and Refining Computational Artifacts
Progression of Computer Science Teachers Association (CSTA) K-12 Computer Science Standards, Revised 2017
Con Level 1A (Ages 5-7) Level 1B (Ages 8-11) Level 2 (Ages 11-14) Level 3A (Ages 14-16)
Subconcept
cept By the end of Grade 2, students will be able to... By the end of Grade 5, students will be able to... By the end of Grade 8, students will be able to... By the end of Grade 10, students will be able to...
Decompose (break down) the steps needed to Decompose (break down) problems into smaller, Decompose problems and subproblems into Decompose problems into smaller components
P3.2 solve a problem into a precise sequence of P3.2 manageable subproblems to facilitate the P3.2 parts to facilitate the design, implementation, P3.2 through systematic analysis, using constructs such
instructions. program development process. and review of programs. as procedures, modules, and/or objects.
Modularity
Modify, remix or incorporate portions of an Create artifacts by using procedures within a
P4.1 Create procedures with parameters to
P5.3 existing program into one's own work, to develop P5.2 program, combinations of data and procedures, or
P4.3 organize code and make it easier to reuse.
something new or add more advanced features. independent but interrelated programs.
Algorithms & Programming

Develop a plan that describes a programs Use an iterative process to plan the development Seek and incorporate feedback from team Systematically design and develop programs for
P5.1 P1.1 P2.3
sequence of events, goals, and expected of a program by including others' perspectives members and users to refine a solution that P5.1 broad audiences by incorporating feedback from
P7.2 P5.1 P1.1
outcomes. and considering user preferences. meets user needs. users.
Observe intellectual property rights and give P4.2 Evaluate licenses that limit or restrict use of
Give attribution when using the ideas and Incorporate existing code, media, and libraries
P7.3 P7.3 appropriate attribution when creating or remixing P5.2 P7.3 computational artifacts when using resources such
creations of others while developing programs. into original programs, and give attribution.
programs. P7.3 as libraries.
Debug (identify and fix) errors in an algorithm Test and debug (identify and fix errors) a
P6.1 Systematically test and refine programs using Evaluate and refine computational artifacts to make
Program P6.2 or program that includes sequences and program or algorithm to insure it runs as P6.1 P6.3
P6.2 a range of test cases. them more usable and accessible.
Development simple loops. intended.
Take on varying roles, with teacher guidance,
Distribute tasks and maintain a project
when collaborating with peers during the design, Design and develop computational artifacts working
P2.2 P2.2 timeline when collaboratively developing P2.4
implementation and review stages of program in team roles using collaborative tools.
computational artifacts.
development.
Using correct terminology, describe steps Describe choices made during program Document design decisions using text, graphics,
Document programs in order to make them
P7.2 taken and choices made during the iterative P7.2 development using code comments, P7.2 P7.2 presentations, and/or demonstrations in the
easier to follow, test, and debug.
process of program development. presentations, and demonstrations. development of complex programs.
Discuss computing technologies that have
Compare how people live and work before and Compare tradeoffs associated with computing
changed the world and express how those Evaluate the ways computing impacts personal,
P7 after the implementation or adoption of new P7.1 P7.2 technologies that affect people's everyday P1.2
technologies influence, and are influenced by, ethical, social, economic, and cultural practices.
computing technology. activities and career options.
cultural practices.
Culture Brainstorm ways to improve the accessibility and
Discuss issues of bias and accessibility in the Test and refine computational artifacts to reduce
P1.2 usability of technology products for the diverse P1.2 P1.2
design of existing technologies. bias and equity deficits.
Impacts of Computing

needs and wants of users.


Demonstrate ways a given algorithm applies to
P3.1
problems across disciplines.
Collaborate with many contributors through Use tools and methods for collaboration on a project
Work respectfully and responsibly with others Seek diverse perspectives for the purpose of P2.4
Social Interactions P2.1 P1.1 strategies such as crowdsourcing or surveys P2.4 to increase connectivity of people in different
online. improving computational artifacts. P5.2
when creating a computational artifact. cultures and career fields.
Use public domain or creative commons media
Explain the beneficial and harmful effects that
P7.3 and refrain from copying or using material P7.3
intellectual property laws can have on innovation.
created by others without permission.
Describe tradeoffs between allowing Explain the privacy concerns related to the
Safety, Law & Ethics Keep login information private, and log off of
P7.3 P7.2 information to be public and keeping P7.2 collection and generation of data through automated
devices appropriately,
information private and secure. processes that may not be evident to users.
Evaluate the social and economic implications of
P7.3
privacy in the context of safety, law or ethics.

P1. Fostering an Inclusive Computing Culture P3. Recognizing and Defining Computational Problems P5. Creating Computational Artifacts
Practices P7. Communicating About Computing
P2. Collaborating Around Computing P4. Developing and Using Abstractions P6. Testing and Refining Computational Artifacts

Вам также может понравиться