Please enable JavaScript to use CodeHS

Standards Framework

for Virginia Middle School Elective Computer Science 36 Weeks

28

Standards in this Framework

Standard Description
36.AP.1a Identify problems that can be solved with a program.
36.AP.1b Justify a proposed solution to a problem.
36.AP.1c Use project management tools to support collaboration.
36.AP.1d Engage in peer review and incorporate evaluative feedback through the design process.
36.AP.1e Incorporate feedback provided through peer review to refine prototypes.
36.AP.2a Decompose problems into subcomponents to facilitate the creation of a program.
36.AP.2b Use documentation to explain the purpose of a section of code and its relationship to other parts of a program.
36.AP.2c Evaluate the limitations of models, algorithms, and programs considering multiple perspectives.
36.AP.2d Systematically test and refine programs.
36.AP.3a Read and write programs that combine loops and conditional control structures.
36.AP.3b Read and write programs using functions and procedures.
36.CSY.1a Analyze and evaluate the design of a computing device for the end user
36.CSY.1b Propose recommendations for improvements to a computing device to include accessibility, functionality, cost, size, speed, accessibility, data bias, and aesthetics.
36.CSY.1c Investigate additional improvements available through emerging technologies.
36.CYB.1a Identify different types of data that can be encrypted.
36.CYB.1b Use simple encryption and decryption strategies to encode and decode a message.
36.DA.1a Communicate the significance of data visualizations and computation models in the real-world.
36.DA.1b Use existing data visualizations that refresh in real-time to make predictions about real-world phenomena.
36.DA.1c Create interactive data visualizations of real-world phenomena.
36.IC.1a Describe tradeoffs between allowing information to be public and keeping information private and secure.
36.IC.1b Evaluate policies, laws, and regulations for computing technologies.
36.IC.1c Propose strategies to mitigate risks and increase benefits of computing technologies.
36.IC.1d Assess the benefits and drawbacks of using Internet technologies by considering factors such as: data storage, cost, speed, reliability, and privacy.
36.NI.1a Define client, server, router, and switches.
36.NI.1b Identify how computing devices collect and exchange data.
36.NI.1c Compare and contrast network topologies.
36.NI.1d Illustrate the arrangement of topology among elements of a network.
36.NI.1e Model how information is transmitted amongst multiple computing devices within a network.