Please enable JavaScript to use CodeHS

South Carolina 9-12 Framework

Standards

Standard Description
HS1.CS.1.1 Analyze the impact that computing devices have in real-world settings (e.g., traffic lights, medical devices, facial recognition). Lessons
HS2.CS.1.1 Investigate how a problem is systematically solved through the selection and integration of hardware and software components. Lessons
HS3.CS.1.1 Recommend modifications for existing computing devices and software to improve functionality for end users. Lessons
HS4.CS.1.1 Develop a solution to a given problem using appropriate hardware and software (e.g., sensor devices, Wi-Fi capabilities, specialized displays, runtime modules, operating systems, application programming interfaces (APIs)). Lessons
HS1.CS.1.2 Compare and contrast the elements of a computing system by examining hardware elements for their intended use (e.g., input-output (I/O) devices, random access memory (RAM), read only memory (ROM), storage devices, motherboards, and processors including the arithmetic logic unit (ALU), control unit, registers, cache memory, example implementations of some of these components using logic gates) (Virginia, 2017). Lessons
HS2.CS.1.2 Analyze how various hardware and software layers provide simplifying abstractions (e.g., a redundant array of independent disks (RAID) controller hiding details of data storage on multiple disks, an operating system hiding details of virtual memory, the presentation layer of a network hiding details about encryption). Lessons
HS3.CS.1.2 Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, specialized devices like global positioning systems (GPSs)). Lessons
HS4.CS.1.2 Cite evidence of how selecting appropriate hardware and software components enhances user interfaces to provide better solutions for real-world problems. Lessons
HS1.CS.1.3 Compare and contrast the strengths and weaknesses of various popular operating systems, (e.g., Windows, Windows Server, OS-X, Android, iOS, UNIX, Linux). Lessons
HS2.CS.1.3 Analyze the roles of operating system software components (e.g., memory management, data storage and retrieval, process management, access control) in a specific solution (CSTA, 2017). Lessons
HS3.CS.1.3 Investigate how the components of an operating system provide simplifying abstractions for a user or developer (e.g., the basic inputoutput system (BIOS), user interface, memory management, process management, file systems, devices, drivers). Lessons
HS4.CS.1.3 Defend the choice of an appropriate operating system based on the requirements of a given computer system or project. Lessons
HS1.CS.2.1 Interpret various types of error messages from various sources (e.g., operating systems, applications, application programming interfaces (APIs)) to assist in solving common computer malfunctions. Lessons
HS2.CS.2.1 Research credible sources of information that can be used for complex troubleshooting strategies (e.g., modifying system settings, correcting connectivity problems). Lessons
HS3.CS.2.1 Solve common computer malfunctions or describe the problem accurately, using technical vocabulary, so that others can solve it. Lessons
HS4.CS.2.1 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors (CSTA, 2017). Lessons
HS1.NI.1.1 Describe how hardware, software, and protocols work together for transmitting data across networks. Lessons
HS2.NI.1.1 Compare and contrast common network protocols (e.g., Internet Protocol (IP), File Transfer Protocol (FTP), Transmission Control Protocol (TCP), Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol with Secure Sockets Layer (HTTPS), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), Telnet, Secure Shell Protocol (SSH)) (Arkansas, 2016). Lessons
HS3.NI.1.1 Explain each layer of the Open Systems Interconnect (OSI) Model (Arkansas, 2016). Lessons
HS4.NI.1.1 Trace data through the Open Systems Interconnect (OSI) Model. Lessons
HS1.NI.1.2 Model the relationship between routers, switches, servers, topology, and addressing (CSTA, 2017). Lessons
HS2.NI.1.2 Analyze the tradeoffs and hierarchical structures of various common network topologies (Arkansas, 2016). Lessons
HS3.NI.1.2 Design a practical, efficient, and secure network solution (e.g., small office network) (Arkansas, 2016). Lessons
HS4.NI.1.2 Evaluate the scalability and reliability of a network (e.g., bandwidth, load, delay, topology) (CSTA, 2017). Lessons
HS1.NI.2.1 Reflect on case studies or current events in which governments or organizations experienced data leaks or data loss as a result of cybersecurity attacks (CSTA, 2017). Lessons
HS2.NI.2.1 Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-of-service attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017). Lessons
HS3.NI.2.1 Research security measures (i.e., hardware, software, and practices that control access to data and systems) to combat a variety of cybersecurity vulnerabilities (CSTA, 2017). Lessons
HS4.NI.2.1 Recommend security measures (i.e., hardware, software, and practices that control access to data and systems) to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts (CSTA, 2017). Lessons
HS1.NI.2.2 Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017). Lessons
HS2.NI.2.2 Compare and contrast ways software developers protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017). Lessons
HS3.NI.2.2 Evaluate various security measures, considering tradeoffs between the usability and security of a computing system. (e.g., a web filter that prevents access to many educational sites but keeps a campus’ network safe) (CSTA, 2017). Lessons
HS4.NI.2.2 Select and justify cybersecurity recommendations (i.e., hardware, software, and practices that control access to data and systems) appropriate for an intended audience and purpose (CSTA, 2017). Lessons
HS1.DA.1.1 Describe the various data collection methods, data analysis tools, and data representation tools. Lessons
HS2.DA.1.1 Compare and contrast the various data collection methods, data analysis tools, and data representation tools. Lessons
HS3.DA.1.1 Explain how different collection methods and tools influence the amount and quality of the data that is observed and recorded. Lessons
HS4.DA.1.1 Justify the choice of a data collection method, data analysis tool, and data representation tool over alternate options. Lessons
HS1.DA.1.2 Describe the various data storage tools and data organization methods. Lessons
HS2.DA.1.2 Compare and contrast the various data storage tools and data organization methods. Lessons
HS3.DA.1.2 Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity (e.g., local storage, portable storage, cloud storage). Lessons
HS4.DA.1.2 Evaluate the data storage needs of a computing solution (e.g., file compression). Lessons
HS1.DA.1.3 Distinguish between various methods of data representation (i.e., analog, digital, binary). Lessons
HS2.DA.1.3 Translate between various methods of data representation (i.e., analog, digital, ASCII, binary). Lessons
HS1.DA.2.1 Describe the properties of a data set that could be used to explore a realworld phenomenon or support a claim. Lessons
HS2.DA.2.1 Compare and contrast data sets that could be used to explore a real-world phenomenon or support a claim. Lessons
HS3.DA.2.1 Create data sets that could be used to explore a realworld phenomenon or support a claim. Lessons
HS4.DA.2.1 Evaluate the use of large data sets to explore a realworld phenomenon or support a claim. Lessons
HS1.DA.2.2 Identify various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016). Lessons
HS2.DA.2.2 Compare and contrast various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016). Lessons
HS3.DA.2.2 Evaluate the limitations of a computational model and the accuracy of inferences. Lessons
HS4.DA.2.2 Create a computational model using large data sets, make inferences, and address the limitations of the model. Lessons
HS1.DA.3.1 Identify a data set that could be used to solve a real-world problem. Lessons
HS2.DA.3.1 Evaluate how the same data set can be visualized and reconstructed to support multiple sides of an issue. Lessons
HS3.DA.3.1 Construct a data visualization to solve a real-world problem using software tools or programming (e.g., generated scatter, bar, and line charts). Lessons
HS4.DA.3.1 Analyze patterns in a data visualization then select a collection tool to validate a claim or share information with a group of people. Lessons
HS1.DA.3.2 Organize collected data to communicate the solution to a real-world phenomenon and support a claim. Lessons
HS2.DA.3.2 Compare and contrast data visualizations for exploring real-world phenomenon or supporting a claim. Lessons
HS3.DA.3.2 Evaluate possible computational models for data visualizations that aid in solving a variety of problems. Lessons
HS4.DA.3.2 Create a computational model for data visualization. Lessons
HS1.AP.1.1 Create flowcharts and/or pseudocode to express a problem or idea as an algorithm. Lessons
HS2.AP.1.1 Create algorithms to solve computational problems that have an application in the real world (e.g., local community, church, civic organization, school, home life). Lessons
HS3.AP.1.1 Adapt predefined algorithms to solve computational problems. Lessons
HS4.AP.1.1 Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017). Lessons
HS1.AP.2.1 Trace the flow of execution of a program that uses a combination of control structures (e.g., conditionals, loops, event handlers, recursion). Lessons
HS2.AP.2.1 Design and iteratively develop programs that combine control structures (e.g., conditionals, loops, event handlers, recursion). Lessons
HS3.AP.2.1 Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., tradeoffs involving implementation, readability, and program performance). Lessons
HS1.AP.2.2 Trace the flow of execution of a program that uses a variety of programming constructs (e.g., procedures, modules, objects). Lessons
HS2.AP.2.2 Design a solution through systematic analysis using programming constructs (e.g., procedures, modules, objects). Lessons
HS3.AP.2.2 Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution. Lessons
HS1.AP.3.1 Decompose tasks into smaller, reusable parts to facilitate the design, implementation, and review of programs. Lessons
HS2.AP.3.1 Develop code to solve the smaller parts of a decomposed task that can be reused to solve similar problems (e.g., procedures, functions, objects). Lessons
HS3.AP.3.1 Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries). Lessons
HS4.AP.3.1 Justify the selection of modular parts in the creation of a complex solution. Lessons
HS1.AP.4.1 Plan and develop programs for a variety of audiences using a process that incorporates development, feedback, and revision. Lessons
HS2.AP.4.1 Plan and develop a program that addresses potential security issues. Lessons
HS3.AP.4.1 Plan and develop a program that is accessible across multiple computing platforms (e.g., iOS, Unix, Windows, web-based). Lessons
HS4.AP.4.1 Evaluate a program through a review process (e.g., code review, beta testing, pilot group). Lessons
HS1.AP.4.2 Seek and incorporate feedback to refine a solution (e.g., users, team members, code review, teachers). Lessons
HS2.AP.4.2 Systematically test programs using a range of test cases to meet design specifications (e.g., specific outcomes, functionality, user interface, error handling) (CSTA, 2017). Lessons
HS3.AP.4.2 Evaluate and refine programs to make them more usable, functional, and accessible. Lessons
HS4.AP.4.2 Implement version control to track program refinements. Lessons
HS1.AP.4.3 Recognize the variety of documentation methods available while developing a program (e.g., inline comments, procedure header, purposeful naming). Lessons
HS2.AP.4.3 Document programs in order to make them easier to follow, test, and debug. Lessons
HS3.AP.4.3 Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator. Lessons
HS4.AP.4.3 Justify design decisions by documenting the design process of complex programs (e.g., developer journal, digital portfolio, presentation). Lessons
HS1.AP.4.4 Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons). Lessons
HS2.AP.4.4 Discuss the implications of using licensed resources in a developed solution. Lessons
HS3.AP.4.4 Develop a systematic solution that incorporates licensed resources. Lessons
HS4.AP.4.4 Research the process for licensing student-created resources. Lessons
HS1.AP.5.1 Justify and use appropriate data types (i.e., primitive and non-primitive) in simple programs. Lessons
HS2.AP.5.1 Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types and incorporate them in programs. Lessons
HS3.AP.5.1 Determine when external data structures (e.g., databases, flat files) are appropriate and incorporate them in programs. Lessons
HS4.AP.5.1 Justify how data structures and abstraction are used to manage program complexity. Lessons
HS1.IC.1.1 Research computing solutions to problems in different countries, considering the personal, ethical, social, economic, and cultural impact (e.g., the use of drones to deliver blood and medical supplies in countries in Africa, the use of Uber in India to address traffic congestion). Lessons
HS2.IC.1.1 Compare and contrast the efficiency, feasibility, and ethical impacts of deploying the same computing solution in various countries. Lessons
HS3.IC.1.1 Hypothesize the future impacts of computing across the world (e.g., personal, health, workforce, economy, education, culture, environment). Lessons
HS1.IC.1.2 Research traditional and non-traditional computer science careers. Lessons
HS2.IC.1.2 Identify a computer science career in a nontraditional computer science industry for each of the five computing disciplines (i.e., computer science, software engineering, information technology, information systems, computer engineering). Lessons
HS3.IC.1.2 Research how computing is used in non-traditional computer science careers (e.g., sensors on soldiers’ or firefighters’ uniforms, robots to detect and diffuse explosive devices). Lessons
HS1.IC.2.1 Select the most appropriate means of communication for given situations (e.g., personal versus professional communication, communication with teachers and employers). Lessons
HS2.IC.2.1 Discuss how social media and computing devices have positively and negatively impacted communication. Lessons
HS3.IC.2.1 Justify proper and improper use of social media and computing devices (e.g., role-playing and example scenarios). Lessons
HS4.IC.2.1 Create rules of etiquette for proper use of social media and computing devices. Lessons
HS1.IC.2.2 Discuss issues related to personal security (e.g., personal, financial, professional). Lessons
HS2.IC.2.2 Define and visually display students’ digital footprint. Lessons
HS3.IC.2.2 Analyze the relationship between students’ digital footprint and personal security. Lessons
HS4.IC.2.2 Recommend methods to protect digital information in different situations (e.g., traveling to other countries, two-factor authentication, encryption). Lessons
HS1.IC.2.3 Explain the implications of proper and improper use of social media (e.g., college admissions, employment, cyberbullying laws). Lessons
HS2.IC.2.3 Identify ethical and legal computing practices. Lessons
HS3.IC.2.3 Distinguish among ethical, unethical, legal, and illegal computing practices (e.g., fair-use, illegal music/video downloads, sharing copyrighted pictures/videos, black-hat hacking, white-hat hacking). Lessons
HS4.IC.2.3 Investigate how computer use and digital privacy are governed across the globe (e.g., government regulations for computer use in the United State, Canada, China, North Korea, and Russia). Lessons
HS1.IC.3.1 Identify factors (e.g., net neutrality, government regulations, infrastructure, funding) that impact equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status). Lessons
HS2.IC.3.1 Research current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status). Lessons
HS3.IC.3.1 Evaluate the effectiveness of current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status). Lessons
HS4.IC.3.1 Design a solution to improve equitable access to computing resources for underrepresented groups (e.g. classroom, school, neighborhood). Lessons
HS1.IC.3.2 Identify computer scientists from underrepresented groups and their specific contributions (e.g., African-American, Latino, women, disabled). Lessons
HS1.IC 3.3 Identify the advantages and disadvantages of diverse perspectives and backgrounds when solving computational problems. Lessons
HS2.IC 3.3 Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age). Lessons
HS3.IC 3.3 Recommend modifications to make a current computing solution more inclusive for all users. Lessons
HS1.IC.4.1 Discuss how Moore’s Law has impacted computing. Lessons
HS2.IC.4.1 Discuss the advantages and disadvantages of advancing and emerging technologies over time (e.g., the impacts of artificial intelligence, virtual reality, and biometrics on productivity, job loss, inventions, quality of life, and globalization). Lessons
HS3.IC.4.1 Hypothesize problems that the next generation of computing will solve. Lessons
HS1.IC.4.2 Define and provide examples of big data (e.g., information collected from social media or smartphone use). Lessons
HS2.IC.4.2 Research how big data is used to solve computing problems. Lessons