Please enable JavaScript to use CodeHS

Arkansas Cybersecurity Year 1 Framework

Standards

Standard Description
CSCS.Y1.1.1 Leverage problem-solving strategies to solve problems of level-appropriate complexity Lessons
CSCS.Y1.1.2 Analyze and utilize multiple representations of problem-solving logic used to solve problems of appropriate complexity Lessons
CSCS.Y1.1.3 Analyze and utilize collaborative methods in problem solving of level-appropriate complexity Lessons
CSCS.Y1.1.4 Analyze and utilize level-appropriate troubleshooting strategies for hardware and software Lessons
CSCS.Y1.2.1 Interpret relational and logical expressions of level-appropriate complexity using comparison and Boolean operators Lessons
CSCS.Y1.2.2 Classify the types of information that can be stored as variables and analyze the appropriateness of each (e.g., Booleans, characters, integers, floating points, strings) Lessons
CSCS.Y1.2.3 Analyze how computer science concepts relate to the field of mathematics Lessons
CSCS.Y1.2.4 Discuss and apply concepts of abstraction Lessons
CSCS.Y1.2.5 Perform operations of level-appropriate complexity with binary, decimal, and hexadecimal numbers Lessons
CSCS.Y1.2.6 Demonstrate operator precedence in expressions and statements Lessons
CSCS.Y1.3.1 Define, store, access, and manipulate level-appropriate data (e.g., primitive, linear) Lessons
CSCS.Y1.3.2 Define and discuss different examples of level-appropriate quantitative and qualitative data Lessons
CSCS.Y1.3.4 Analyze, utilize, and visually represent level-appropriate data Lessons
CSCS.Y1.3.5 Perform level-appropriate data analysis using computing tool Lessons
CSCS.Y1.4.1 Identify the five pillars of cybersecurity and evaluate the relevance of each pillar to computer science concepts Lessons
CSCS.Y1.4.2 Research and describe different roles within the hacking community (e.g., white hat, black hat, gray hat hacking), including positive and negative motivations, significant impacts, and social stereotypes Lessons
CSCS.Y1.4.3 Research and describe the impacts of ransomware, trojans, viruses, and other malware Lessons
CSCS.Y1.4.4 Explain implications related to identification and responsible reporting of a vulnerability versus exploitation Lessons
CSCS.Y1.5.1 Design and implement level-appropriate algorithms that use iteration, selection, and sequence Lessons
CSCS.Y1.5.2 Illustrate the flow of execution of algorithms in level-appropriate programs including branching and looping Lessons
CSCS.Y1.5.3 Evaluate the qualities of level-appropriate student-created and non-student-created algorithms Lessons
CSCS.Y1.5.4 Use a systematic approach to detect and resolve errors in a given algorithm Lessons
CSCS.Y1.6.1 Create programs using procedures to solve problems of level-appropriate complexity Lessons
CSCS.Y1.6.2 Discuss and apply best practices of program design and format (e.g., descriptive names, documentation, indentation, user experience design, whitespace) Lessons
CSCS.Y1.6.3 Determine the scope and state of variables declared in procedures and control structures over time Lessons
CSCS.Y1.6.4 Create programs of level-appropriate complexity that read from standard input, write to standard output, read from a file, write to a file, and append to a file Lessons
CSCS.Y1.6.5 Use a systematic approach to detect logic, runtime, and syntax errors within a program Lessons
CSCS.Y1.7.1 Identify hardware and software specific to carrying out the mission of regional industries Lessons
CSCS.Y1.7.2 Research advancing and emerging technologies (e.g., artificially intelligent agents, blockchain, extended reality, Internet of Things (IoT), machine learning, robotics) Lessons
CSCS.Y1.8.1 Utilize the command line to accomplish common network troubleshooting tasks at an introductory level Lessons
CSCS.Y1.8.2 Research and describe common networking concepts at an introductory level Lessons
CSCS.Y1.8.3 Research and describe modems, network interface cards, routers (e.g., consumer, industrial), switches, and wireless access points, and identify their purposes within a network Lessons
CSCS.Y1.8.4 Describe the importance of creating and using common rules for communication and the utilization of common network protocols including the relationship between client and server Lessons
CSCS.Y1.9.1 Compare and contrast computer programming paradigms (e.g., functional, imperative, object-oriented) Lessons
CSCS.Y1.9.2 Research, describe, and utilize at an appropriate level: debugging strategies; integrated development environments (IDE); source-code editors; version control strategies Lessons
CSCS.Y1.9.3 Classify layers of software (e.g., applications, drivers, firmware, operating systems) utilized within various platforms (e.g., Android, ChromeOS, iOS, Linux, macOS, Windows) Lessons
CSCS.Y1.9.4 Identify and describe the purpose of hardware components within various personal computing platforms Lessons
CSCS.Y1.10.1 Research and describe the risks and risk mitigation strategies associated with the utilization and implementation of social media and other digital technology implications Lessons
CSCS.Y1.10.3 Research and describe the potential benefits associated with the utilization and implementation of social media and other digital technologies Lessons
CSCS.Y1.10.4 Research and describe the relationship between access and security (e.g., active and passive data, convenience, data mining, digital marketing, online wallets, privacy, theft of personal information) Lessons
CSCS.Y1.10.6 Research the history of computing devices and their impact on society Lessons
CSCS.Y1.10.7 Research and identify diverse careers and career opportunities (e.g., accessibility, availability, demand) that are influenced by computer science and the technical and soft skills needed for each Lessons
CSCS.Y1.11.1 Communicate basic technical information effectively to diverse audiences including, but not limited to, non-technical audience members Lessons
CSCS.Y1.11.2 Describe and utilize the concepts of storytelling with data Lessons
CSCS.Y1.11.3 Describe the following common types of data bias:; confirmation bias; confounding variables; outliers; overfitting/underfitting; selection bias Lessons
CSCS.Y1.11.4 Compare and contrast causation and correlation Lessons
CSCS.Y1.11.5 Compare and contrast interpreting data, inferring using data, and implicating with data Lessons