Please enable JavaScript to use CodeHS

Standards Framework

for Virginia Middle School Elective Computer Science 9 Weeks

44

Standards in this Framework

Standard Description
9.AP.1a Decompose a problem or process into sub-components.
9.AP.1b Recognize characteristics or patterns to determine commonalities.
9.AP.1c Abstract relevant information to identify essential details.
9.AP.1d Use pseudocode and/or flowcharts to address complex problems as algorithms.
9.AP.2a Identify the goal and objectives of the program.
9.AP.2b Plan for the design or prototype of the program.
9.AP.2c Develop an outline for the program’s functionality.
9.AP.2d Engage with peers to collect feedback on relevant aspects.
9.AP.3a Read and interpret algorithms expressed using plain language, pseudocode, and block-based or text-based programming languages.
9.AP.3b Create an algorithm using plain language, pseudocode, or diagrams.
9.AP.3c Implement programs that accept input values, use variables, and produce output.
9.AP.3d Write and test algorithms using block-based or text-based programming languages.
9.AP.4a Trace a program for accuracy.
9.AP.4b Analyze and describe the results of a program for validity.
9.AP.4c Revise and improve an algorithm to resolve errors or produce desired outcomes.
9.AP.4d Document programs to improve the ability to trace, test, and debug.
9.CSY.1a Explain the structure and function of hardware and software in computing devices.
9.CSY.1b Describe the interactions of hardware and software in computing systems.
9.CSY.1c Evaluate the usability of hardware and software from different perspectives.
9.CSY.2a Abstract the problems with computing devices and apply appropriate troubleshooting strategies.
9.CSY.2b Propose and implement solutions to a variety of hardware and software problems.
9.CYB.1a Describe how cyber-attacks can affect a computing system
9.CYB.1b Compare and contrast safe and unsafe computing practices.
9.CYB.1c Explore how industries and emerging technologies are addressing cyber solutions.
9.CYB.1d Model common prevention practices for cyber-attacks.
9.DA.1a Identify and use computing technologies to collect data sets.
9.DA.1b Evaluate data sets and visualizations for limitations, reliability, and bias.
9.DA.1c Identify encoding schemes used to represent similar data.
9.DA.1d Transform data utilizing decomposition, pattern recognition, and abstraction to make inferences, predictions, and decisions about real-world phenomena.
9.DA.1e Explore how machine learning, Artificial Intelligence (AI), and emerging technologies automate data analysis.
9.IC.1a Compare and contrast the benefits and risks of everyday use of computing technologies and their influences on daily life and society.
9.IC.1b Discuss issues of digital citizenship, ethics, bias, and accessibility in relation to computing technologies and the Internet.
9.IC.1c Identify and describe significant historical figures that made an impact in the computer science field.
9.IC.2a Investigate physical health effects associated with excessive screen time to include risk of obesity and related health issues.
9.IC.2b Investigate social and emotional effects associated with excessive screen time to include development of social skills and emotional intelligence.
9.IC.2c Investigate cognitive effects associated with excessive screen time to include the impact on attention span, concentration, and ability to focus.
9.IC.2d Analyze and differentiate between the use of technology and screen time for instructional benefits compared to recreational activities.
9.IC.2e Synthesize and report findings of the screen time usage and impact on one’s mental and physical health.
9.IC.3a Research computer science and information technology career pathways.
9.IC.3b Discuss careers that use computer science skills and practices.
9.NI.1a Explain the role of networks and the Internet in different computing contexts: gaming, web browsing, communication, streaming, or other common use cases.
9.NI.1b Identify and describe hardware and software components that make up the Internet.
9.NI.1c Explain how hardware and software components can be combined to collect and exchange data.
9.NI.1d Compare and contrast different methods of data transfer.