Please enable JavaScript to use CodeHS

Standards Framework

for Utah Computer Science Principles

48

Standards in this Framework

Standard Description
CSP.1.1a Explain how collaboration affects the development of a solution.
CSP.1.1b Collaborate in the development of solutions.
CSP.1.2a Investigate the situation, context, or task.
CSP.1.2a.i Investigate the purpose of a program.
CSP.1.2a.ii Understand how to break down program specifications into smaller tasks using top-down design and pseudocode.
CSP.1.2b Generalize data sources through variables.
CSP.1.2b.i Understand the uses of different data types (examples: integer, float/double, characters/strings, boolean, etc.)
CSP.1.2c Explain how a code segment or program functions.
CSP.1.3a Identify and correct errors in algorithms and programs, including error discovery through testing.
CSP.1.3b Identify different types of errors such as logic, run-time, and syntax errors
CSP.2.1a Explain the differences between hardware and software and how they relate to input, storage, processing, and output.
CSP.2.1b Understand the different file sizes (bit, byte, kilobyte, megabyte, gigabyte, terabyte, and petabyte).
CSP.2.2a Calculate the binary (base 2) equivalent of a positive integer (base 10) and vice versa.
CSP.2.2b Compare and order binary numbers.
CSP.2.3a Lossy - Compression algorithm in which file size if reduced without any quality loss.
CSP.2.3b Lossless - Compression algorithm in which some of the data from the original file is lost
CSP.3.1a Use variables of different data types (examples: integer, float/double, characters/strings, boolean, etc.)
CSP.3.1b Convert data types to other data types.
CSP.3.1c Determine the value of a variable as a result of an assignment.
CSP.3.2 Implement arithmetic operators =, +, -, *, /, and MOD) and order of operations (PEMDAS).
CSP.3.3a Receive and store user input.
CSP.3.3b Print to console
CSP.3.4 Evaluate expressions that manipulate strings. (String concatenation joins together two or more strings end-to-end to make a new string.)
CSP.3.5a Write and evaluate expressions using relational operators (==, 7, ›, <, 2, and s).
CSP.3.5b Write and evaluate expressions using logical operators (AND, OR, NOT)
CSP.3.6a Write conditional statements, such as IF statements and ELSE IF statements.
CSP.3.6b Determine the result of conditional statements.
CSP.3.7a Write iteration statements, such as for loops and while loops.
CSP.3.7b Determine the result of iteration statements.
CSP.3.8a Write statements to call Procedures/Functions/Methods
CSP.3.8b Determine the result of a Procedures/Functions/Methods
CSP.4.1a Explain how computing devices work together in a network (Network, Path, Routing, Packets, Bandwidth).
CSP.4.1b Explain how the Internet works (Fault Tolerance, Protocols, HTTP, HTTPS).
CSP.4.1c Understand the difference between the Internet and the World Wide Web
CSP.4.2 Students will understand that the HTML programming language is used to create all websites on the internet and acts as the structure for a website.
CSP.4.2a Students will code the foundation for a basic webpage including the element tags <!DOCTYPE html>, <html>, <head›, <title», and <body>.
CSP.4.2b Students will create pages with tags and attributes at the inline level. (<!DOCTYPE html>, <html> <head>, <title>, <body>, <h1>, <h2>, <h6>, <p>, <br>, etc.)
CSP.5.1a Explore how an effect of a computing innovation can be both beneficial and harmful.
CSP.5.1b Explore advances in computing that have generated and increased creativity in other fields, such as medicine, engineering, communications, and the arts.
CSP.5.2a Explore issues that contribute to the digital divide (demographics, geographics, socioeconomic, equity, access, influence).
CSP.5.2b Explore how bias exists in computing innovations.
CSP.5.3a Explain how the use of computing can raise legal and ethical concerns.
CSP.5.3b Understand how ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use.
CSP.5.3c Understand the differences between Copyright, Creative Commons, Public Domain, & Trademark
CSP.5.4a Describe the risks to privacy from collecting and storing personal data on a computer system
CSP.5.4b Explain how computing resources can be protected (password strength) and can be misused.
CSP.5.4c Explain how unauthorized access to computing resources is gained.
CSP.5.4d Understand essential cybersecurity concepts, like malware (adware, trojan horse, virus, ransomware, etc.) and social engineering (phishing, etc.)