0% found this document useful (0 votes)
54 views5 pages

Comp Sci Progression Chart

This document outlines the progression of California's K-12 computer science standards from grades K-2 through grades 9-12. It is organized by core concepts and subconcepts. The standards become more advanced at each grade level, from selecting and operating devices in K-2 to illustrating how computing systems implement logic through hardware in grades 9-12 specialty courses. Across grade levels, standards cover topics such as computing systems, networking, cybersecurity, data collection and analysis, and computational thinking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views5 pages

Comp Sci Progression Chart

This document outlines the progression of California's K-12 computer science standards from grades K-2 through grades 9-12. It is organized by core concepts and subconcepts. The standards become more advanced at each grade level, from selecting and operating devices in K-2 to illustrating how computing systems implement logic through hardware in grades 9-12 specialty courses. Across grade levels, standards cover topics such as computing systems, networking, cybersecurity, data collection and analysis, and computational thinking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Progression of California K-12 Computer Science Standards (updated 01/23/2018)

Grades K–2 Core Grades 3–5 Core Grades 6–8 Core Grades 9–12 Core Grades 9–12 Specialty
Concept + Subconcept By the end of Grade 2 By the end of Grade 5 By the end of Grade 8 By the end of Grade 12 By the end of Grade 12
ALL students will be able to... ALL students will be able to... ALL students will be able to... ALL students will be able to... students will be able to...
K-2.CS.1 Select and operate computing 3-5.CS.1 Describe how computing devices 6-8.CS.1 Design modifications to computing 9-12.CS.1 Describe ways in which 9-12S.CS.1 Illustrate ways computing systems
devices that perform a variety of tasks connect to other components to form a devices in order to improve the ways users abstractions hide the underlying implement logic through hardware components.
Computing Systems Devices accurately and quickly based on user needs system. (P7.2) interact with the devices. (P1.2, P3.3) implementation details of computing systems (P4.4, P7.2)
and preferences. (P1.1) to simplify user experiences. (P4.1)

K-2.CS.2 Explain the functions of common 3-5.CS.2 Demonstrate how computer 6-8.CS.2 Design a project that combines 9-12.CS.2 Compare levels of abstraction and 9-12S.CS.2 Categorize and describe the different
Computing Systems hardware and software components of hardware and software work together as a hardware and software components to interactions between application software, functions of operating system software. (P7.2)
Hardware & Software computing systems. (P7.2) system to accomplish tasks. (P4.4) collect and exchange data. (P5.1) system software, and hardware. (P4.1)

K-2.CS.3 Describe basic hardware and 3-5.CS.3 Determine potential solutions to 6-8.CS.3 Systematically apply 9-12.CS.3 Develop guidelines that convey n/a
software problems using accurate solve simple hardware and software troubleshooting strategies to identify and systematic troubleshooting strategies that
Computing Systems
terminology. (P6.2, P7.2) problems using common troubleshooting resolve hardware and software problems in others can use to identify and fix errors.
Troubleshooting
strategies. (P6.2) computing systems. (P6.2) (P6.2)

K-2.NI.4 Model and describe how people 3-5.NI.4 Model how information is broken 6-8.NI.4 Model the role of protocols in 9-12.NI.4 Describe issues that impact network 9-12S.NI.3 Examine the scalability and reliability of
connect to other people, places, information down into smaller pieces, transmitted as transmitting data across networks and the functionality. (P4.1) networks, by describing the relationship between
Network & The Internet and ideas through a network. (P4.4) packets through multiple devices over Internet. (P4.4) 9-12.NI.5 Describe the design characteristics routers, switches, servers, topology, and
Network Communication & networks and the Internet, and reassembled of the Internet. (P7.2) addressing. (P4.4)
Organization at the destination. (P4.4) 9-12S.NI.4 Explain how the characteristics of the
Internet influence the systems developed on it.
(P7.2)

K-2.NI.5 Explain why people use 3-5.NI.5 Describe physical and digital 6-8.NI.5 Explain potential security threats 9-12.NI.6 Compare and contrast security 9-12S.NI.5 Develop solutions to security threats.
passwords. (P7.2) security measures for protecting personal and security measures to mitigate threats. measures to address various security threats. (P5.3)
K-2.NI.6 Create patterns to communicate a information. (P3.1) (P3.1, P3.3) (P7.2) 9-12S.NI.6 Analyze cryptographic techniques to
Network & The Internet message. (P4.4) 3-5.NI.6 Create patterns to protect 6-8.NI.6 Apply multiple methods of 9-12.NI.7 Compare and contrast model the secure transmission of information.
Cybersecurity information from unauthorized access. information protection to model the secure cryptographic techniques to model the secure (P3.3, P4.2)
(P4.4) transmission of information. (P4.4) transmission of information. (P3.3, P4.4)

K-2.DA.7 Store, copy, search, retrieve, 3-5.DA.7 Explain that the amount of space 6-8.DA.7 Represent data in multiple ways. 9-12.DA.8 Translate between different n/a
modify, and delete information using a required to store data differs based on the (P4.4) representations of data abstractions of real-
computing device, and define the type of data and/or level of detail. (P4.2) world phenomena, such as characters,
Data & Analysis information stored as data. (P4.2) numbers, and images. (P4.1)
Storage 9-12.DA.9 Describe ​tradeoffs​associated with​
​how​​data elements​​are​​organized​​and ​stored.
(P3.3)

K-2.DA.8 Collect and present data in 3-5.DA.8 Organize and present collected 6-8.DA.8 Collect data using computational 9-12.DA.10 Create data visualizations to help 9-12S.DA.7 Select and use data collection tools
various visual formats. (P4.4, P7.1) data visually to highlight relationships and tools and transform the data to make it more others better understand real-world and techniques to generate data sets. (P7.1)
Data & Analysis support a claim. (P7.1) useful. (P7.1) phenomena. (P5.2) 9-12S.DA.8 Use data analysis tools and
Collection, Visualization, & techniques to identify patterns in data representing
Transformation complex systems. (P4.1, P7.1)

K-2.DA.9 Identify and describe patterns in 3-5.DA.9 Use data to highlight and/or 6-8.DA.9 Test and analyze the effects of 9-12.DA.11 Refine computational models to 9-12S.DA.9 Evaluate the ability of models and
data visualizations, such as charts or propose relationships, predict outcomes, or changing variables while using better represent the relationships among simulations to test and support the refinement of
Data & Analysis
graphs, to make predictions. (P4.1) communicate ideas. (P7.1) computational models. (P4.4, P6.1) different elements of data collected from a hypotheses. (P4.4)
Inference & Models
phenomenon or process. (P4.4, P6.3)
Progression of California K-12 Computer Science Standards (updated 01/23/2018)

K-2.AP.10 Model daily processes by 3-5.AP.10 Compare and refine multiple 6-8.AP.10 Use flowcharts and/or 9-12.AP.12 Design algorithms to solve 9-12S.AP.10 Describe how artificial intelligence
creating and following algorithms to algorithms for the same task and determine pseudocode to design and illustrate computational problems using a combination drives many software and physical systems. (P3.1,
complete tasks. (P3.2, P4.4) which is the most appropriate. (P3.3, P6.3) algorithms that solve complex problems. of original and existing algorithms. (P4.2, P7.2)
(P4.1, P4.4) P5.1) 9-12S.AP.11 Implement an algorithm that uses
artificial intelligence to overcome a simple
Algorithms & Programming challenge. (P3.1, P5.3)
Algorithms 9-12S.AP.12 Implement searching and sorting
algorithms to solve computational problems. (P4.2,
P5.2)
9-12S.AP.13 Evaluate algorithms in terms of their
efficiency. (P3.3)

K-2.AP.11 Model the way programs store 3-5.AP.11 Create programs that use 6-8.AP.11 Create clearly named variables 9-12.AP.13 Create more generalized 9-12S.AP.14 Compare and contrast fundamental
data. (P4.4) variables to store and modify data. (P5.2) that store data, and perform operations on computational solutions using collections data structures and their uses. (P4.2)
Algorithms & Programming
their contents. (P5.1, P5.2) instead of repeatedly using simple variables.
Variables
(P4.1)

K-2.AP.12 Create programs with sequences 3-5.AP.12 Create programs that include 6-8.AP.12 Design and iteratively develop 9-12.AP.15 Iteratively design and develop 9-12S.AP.15 Demonstrate the flow of execution of
of commands and simple loops, to express events, loops, and conditionals. (P5.2) programs that combine control structures computational artifacts for practical intent, a recursive algorithm.(P3.2, P7.2)
ideas or address a problem. (P5.2) and use compound conditions. (P5.1, P5.2) personal expression, or to address a societal
issue by using events to initiate instructions.
(P5.1, P5.2, P5.3)
Algorithms & Programming 9-12.AP.14 Justify the selection of specific
Control control structures by identifying tradeoffs
associated with implementation, readability,
and performance. (P5.2)

K-2.AP.13 Decompose the steps needed to 3-5.AP.13 Decompose problems into 6-8.AP.13 Decompose problems and 9-12.AP.16 Decompose problems into 9-12S.AP.16 Analyze a large-scale computational
solve a problem into a sequence of smaller, manageable tasks which may subproblems into parts to facilitate the smaller subproblems through systematic problem and identify generalizable patterns or
instructions. (P3.2) themselves be decomposed. (P3.2) design, implementation, and review of analysis, using constructs such as problem components that can be applied to a
3-5.AP.14 Create programs by incorporating programs. (P3.2) procedures, modules, and/or classes. (P3.2) solution. (P3.2, P4.2)
smaller portions of existing programs, to 6-8.AP.14 Create procedures with 9-12.AP.17 Create computational artifacts 9-12S.AP.17 Construct solutions to problems using
Algorithms & Programming develop something new or add more parameters to organize code and make it using modular design. (P4.3, P5.2) student-created components, such as procedures,
Modularity advanced features. (P4.2, P5.3) easier to reuse. (P4.1, P4.3) modules, and/or objects. (P4.3, P5.2)
9-12S.AP.18 Demonstrate code reuse by creating
programming solutions using libraries and APIs.
(P4.2, P5.3, P6.2)
Progression of California K-12 Computer Science Standards (updated 01/23/2018)

K-2.AP.14 Develop plans that describe a 3-5.AP.15 Use an iterative process to plan 6-8.AP.15 Seek and incorporate feedback 9-12.AP.18 Systematically design programs 9-12S.AP.19 Plan and develop programs for broad
program’s sequence of events, goals, and and develop a program by considering the from team members and users to refine a for broad audiences by incorporating audiences using a specific software life cycle
expected outcomes. (P5.1, P7.2) perspectives and preferences of others. solution that meets user needs. (P1.1, P2.3) feedback from users. (P1.1, P5.1) process. (P2.2, P2.3, P5.2)
K-2.AP.15 Give attribution when using the (P1.1, P5.1) 6-8.AP.16 Incorporate existing code, media, 9-12.AP.19 Explain the limitations of licenses 9-12S.AP.20 Develop programs for multiple
ideas and creations of others while 3-5.AP.16 Observe intellectual property and libraries into original programs, and give that restrict use of computational artifacts computing platforms. (P5.2)
developing programs. (P7.3) rights and give appropriate attribution when attribution. (P4.2, P5.2, P7.3) when using resources such as libraries. 9-12S.AP.21 Identify and fix security issues that
K-2.AP.16 Debug errors in an algorithm or creating, remixing, or combining programs. 6-8.AP.17 Systematically test and refine (P7.3) might compromise computer programs. (P6.2)
program that includes sequences and (P5.2, P7.3) programs using a range of test cases. (P6.1) 9-12.AP.20 Iteratively evaluate and refine a 9-12S.AP.22 Develop and use a series of test
simple loops. (P6.2) 3-5.AP.17 Test and debug a program or 6-8.AP.18 Distribute tasks and maintain a computational artifact to enhance its cases to verify that a program performs according
K-2.AP.17 Describe the steps taken and algorithm to ensure it accomplishes the project timeline when collaboratively performance, reliability, usability, and to its design specifications. (P6.1)
choices made during the iterative process of intended task. (P6.2) developing computational artifacts. (P2.2, accessibility. (P6.3) 9-12S.AP.23 Modify an existing program to add
program development. (P7.2) 3-5.AP.18 Perform different roles when P5.1) 9-12.AP.21 Design and develop additional functionality and discuss intended and
collaborating with peers during the design, 6-8.AP.19 Document programs in order to computational artifacts working in team roles unintended implications. (P4.2, P5.3)
implementation, and review stages of make them easier to use, read, test, and using collaborative tools. (P2.4) 9-12S.AP.24 Evaluate key qualities of a program
Algorithms & Programming program development. (P2.2) debug. (P7.2) 9-12.AP.22 Document decisions made during through a process such as a code review. (P6.3)
Program Development 3-5.AP.19 Describe choices made during the design process using text, graphics, 9-12S.AP.25 Use version control systems,
program development using code presentations, and/or demonstrations in the integrated development environments (IDEs), and
comments, presentations, and development of complex programs. (P7.2) collaborative tools and practices (e.g., code
demonstrations. (P7.2) documentation) while developing software within a
group. (P2.4, P5.2)
9-12S.AP.26 Compare multiple programming
languages, and discuss how their features make
them suitable for solving different types of
problems. (P7.2)

K-2.IC.18 Compare how people lived and 3-5.IC.20 Discuss computing technologies 6-8.IC.20 Compare tradeoffs associated with 9-12.IC.23 Evaluate the ways computing 9-12S.IC.27 Evaluate computational artifacts with
worked before and after the adoption of new that have changed the world, and express computing technologies that affect people's impacts personal, ethical, social, economic, regard to improving their beneficial effects and
computing technologies. (P3.1) how those technologies influence, and are everyday activities and career options. and cultural practices. (P1.2, P3.1) reducing harmful effects on society. (P1.2, P6.1)
influenced by, cultural practices. (P3.1) (P7.2) 9-12.IC.24 Identify impacts of bias and equity 9-12S.IC.28 Evaluate how computational
3-5.IC.21 Propose ways to improve the 6-8.IC.21 Discuss issues of bias and deficit on design and implementation of innovations that have revolutionized aspects of our
accessibility and usability of technology accessibility in the design of existing computational artifacts and apply appropriate culture might evolve. (P7.2)
products for the diverse needs and wants of technologies. (P1.2) processes for evaluating issues of bias. 9-12S.IC.29 Evaluate the impact of equity, access,
users. (P1.2) (P1.2) and influence on the distribution of computing
9-12.IC.25 Demonstrate ways a given resources in a global society. (P1.2)
Impacts of Computing
algorithm applies to problems across
Culture
disciplines. (P3.1)
9-12.IC.26 Study, discuss, and think critically
about the potential impacts and implications
of emerging technologies on larger social,
economic, and political structures, with
evidence from credible sources. (P7.2)

K-2.IC.19 Work respectfully and responsibly 3-5.IC.22 Seek and explain the impact of 6-8.IC.22 Collaborate with many contributors 9-12.IC.27 Use collaboration tools and n/a
Impacts of Computing with others when communicating diverse perspectives for the purpose of when creating a computational artifact. methods to increase connectivity with people
Social Interactions electronically. (P2.1) improving computational artifacts. (P1.1) (P2.4, P5.2) of different cultures and careers. (P2.4)
Progression of California K-12 Computer Science Standards (updated 01/23/2018)

K-2.IC.20 Describe approaches and 3-5.IC.23 Describe reasons creators might 6-8.IC.23 Compare tradeoffs associated with 9-12.IC.28 Explain the beneficial and harmful 9-12S.IC.30 Debate laws and regulations that
rationales for keeping login information limit the use of their work. (P7.3) licenses for computational artifacts to effects that intellectual property laws can impact the development and use of software.
private, and for logging off of devices balance the protection of the creators' rights have on innovation. (P7.3) (P7.2)
appropriately. (P3.1) and the ability for others to use and modify 9-12.IC.29 Explain the privacy concerns
the artifacts. (P7.3) related to the collection and generation of
Impacts of Computing 6-8.IC.24 Compare tradeoffs between data through automated processes. (P7.2)
Safety, Law, & Ethics allowing information to be public and 9-12.IC.30 Evaluate the social and economic
keeping information private and secure. implications of privacy in the context of safety,
(P7.2) law, or ethics. (P7.2)

P1. Fostering an Inclusive Computing P6. Testing and Refining Computational


P3. Recognizing and Defining P4. Developing and Using Abstractions [See K-12 CS Framework (k12cs.org) for
Practices Culture Artifacts
Computational Problems P5. Creating Computational Artifacts subpractices.]
P2. Collaborating Around Computing P7. Communicating About Computing
The California Computer Science Standards Advisory Committee (CS SAC) developed these K-12 Computer Scien
Standards, under guidance of the California Department of Education (CDE) and State Board of Education (S
The 2017 Computer Science Teachers Association (CSTA) K-12 Computer Science Standards (csteachers.org/standar
Computer Science Framework (k12cs.org) informed the development of this work.
CDE Curriculum Frameworks and Instructional Resources Division: [email protected] | phone: 916-319-0
California Department of Education, August 2018

You might also like