Please enable JavaScript to use CodeHS

Standards Framework

for CSTA 1A

18

Standards in this Framework

Standard Description
1A-AP-08 Model daily processes by creating and following algorithms (sets of step-by-step instructions) to complete tasks.
1A-AP-09 Model the way programs store and manipulate data by using numbers or other symbols to represent information.
1A-AP-10 Develop programs with sequences and simple loops, to express ideas or address a problem.
1A-AP-11 Decompose (break down) the steps needed to solve a problem into a precise sequence of instructions.
1A-AP-12 Develop plans that describe a program’s sequence of events, goals, and expected outcomes.
1A-AP-13 Give attribution when using the ideas and creations of others while developing programs.
1A-AP-14 Debug (identify and fix) errors in an algorithm or program that includes sequences and simple loops.
1A-AP-15 Using correct terminology, describe steps taken and choices made during the iterative process of program development.
1A-CS-01 Select and operate appropriate software to perform a variety of tasks, and recognize that users have different needs and preferences for the technology they use.
1A-CS-02 Use appropriate terminology in identifying and describing the function of common physical components of computing systems (hardware).
1A-CS-03 Describe basic hardware and software problems using accurate terminology.
1A-DA-05 Store, copy, search, retrieve, modify, and delete information using a computing device and define the information stored as data.
1A-DA-06 Collect and present the same data in various visual formats.
1A-DA-07 Identify and describe patterns in data visualizations, such as charts or graphs, to make predictions.
1A-IC-16 Compare how people live and work before and after the implementation or adoption of new computing technology.
1A-IC-17 Work respectfully and responsibly with others online.
1A-IC-18 Keep login information private, and log off of devices appropriately.
1A-NI-04 Explain what passwords are and why we use them, and use strong passwords to protect devices and information from unauthorized access.