BPS District Computer Science and Cybersecurity Standards Book

K-12 Grade Levels

Grade 11

BPS-S CSC Standards logo

Junior

Computer Science and Cybersecurity Standards

11th Grade Standards Glossary 

BPS-S CSC - Technology Systems logo

CSC-11.TS TS Technology Systems

Sub-Concepts
(NI) Network & Internet - Networks link computers and devices locally and around the world allowing people to access and communicate information.
(HS) Hardware & Software - Devices, hardware, and software work together as a system to accomplish tasks..
(T) Troubleshooting - Strategies for solving technology system problems.
  • CSC-11.TS_NI.1 Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet). 
  • CSC-11.TS_NI.2 Understand the global impact of networkable devices.
  • CSC-11.TS_HS.1 Compare and contrast appropriate device/hardware/software to complete a task. (Continued growth) 
  • CSC-11.TS_HS.2 Identify and choose hardware and software to help protect a system. (CYSEC) 
  • CSC-11.TS_HS.3 Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). (CYSEC)
  • CSC-11.TS_T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. (Continued growth)

BPS-S CSC - (CT) Computation Thinking logo

CSC-11.CT CT Computational Thinking

Sub-Concepts
(PSA) Problem Solving & Algorithms - Strategies for understanding and solving problems.
(DCA) Data Creation & Analysis - Data can be collected, used, and presented with computing devices or digital tools.
(DD) Development & Design - Design processes to create new, useful, and imaginative solutions to problems.
  • CSC-11.CT_PSA.1 Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made.
  • CSC-11.CT_DCA.1 Represent complex data in multiple ways to defend a student-generated claim.
  • none

BPS-S CSC - (IL) Information Literacy logo

CSC-11.IL IL Information Literacy

Sub-Concepts
(A) Access - Effective search strategies can locate information for intellectual or creative pursuits.
(E) Evaluate - Information sources can be evaluated for accuracy, currency, appropriateness, and purpose.
(C) Create - It is important to both consume and produce information to be digitally literate.
(IP) Intellectual Property - Respect for the rights and obligations of using and sharing intellectual property.
  • CSC-11.IL_A.1 Devise new search strategies based on information gaps and new understanding.
  • CSC-11.IL_E.1 Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
  • CSC-11.IL_C.1 Publish or present content that customizes the message and medium for their intended audiences to communicate their idea.
  • CSC-11.IL_IP.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration. 
  • CSC-11.IL_IP.2 Cite sources in a standard format to ethically reference the intellectual property of others. (Continued growth) 
  • CSC-11.IL_IP.3 Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics.

BPS-S CSC - (CS) Computers in Society logo

CSC-11.CS CS Computers in Society

Sub-Concepts
(IC) Impacts of Computing - Past, present, and possible future impact of technology on society.
(SI) Social Interactions - Technology facilitates collaboration with others.
  • CSC-11.CS_IC.1 Explain how computing may change cultural aspects of society.
  • CSC-11.CS_SI.1 Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society.

BPS-S CSC - (IL) Digital Citizenship logo

CSC-11.DC DC Digital Citizenship

Sub-Concepts
(SE) Safety & Ethics - There are both positive and negative impacts in social and ethical behaviors for using technology.
(RU) Responsible Use - Respect and dignity in virtual communities.
(DI) Digital Identity - Responsibilities and opportunities of living, learning and working in an interconnected digital world.
  • CSC-11.DC_SE.1 Understand encryption and how it is used to protect data. (CYSEC) 
  • CSC-11.DC_SE.2 Explain the privacy concerns related to the collection and generation of data through automated processes. (CYSEC) 
  • CSC-11.DC_SE.3 Manage personal data to maintain digital privacy and security and are aware of data-collection technology used to track online behaviors. (CYSEC) Continued Growth) 
  • CSC-11.DC_SE.4 Develop a plan to recover from an incident that was tied to unauthorized access. (CYSEC)
  • CSC-11.DC_RU.1 Apply cyberbullying prevention strategies. (Continued growth) 
  • CSC-11.DC_RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. (CYSEC) (Continued growth) 
  • CSC-11.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth) 
  • CSC-11.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  • CSC-11.DC_DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. (CYSEC) (Continued growth)