BPS District Computer Science and Cybersecurity Standards Book
Completion requirements
Concepts
(TS)
Computer Science and Cybersecurity
TS Technology Systems
Sub-Concepts
(NI) Network & Internet - Networks link computers and devices locally and around the world allowing people to access and communicate information.
(HS) Hardware & Software - Devices, hardware, and software work together as a system to accomplish tasks..
(T) Troubleshooting - Strategies for solving technology system problems.
- CSC-00.TS_NI.1 Recognize that computing devices can be connected together.
- CSC-00.TS_HS.1 Follow directions to use computing devices to perform a variety of appropriate tasks.
- CSC-00.TS_T.1 Understand technology systems might not work as expected.
- CSC-01.TS_NI.1 Recognize that connecting computing devices allows information sharing.
- CSC-01.TS_HS.1 Use appropriate terminology to identify common computing devices and components.
- CSC-01.TS_HS.2 With guidance, use a computing device to perform a variety of tasks.
- CSC-01.TS_HS.3 Recognize users have different technology needs.
- CSC-01.TS_T.1 Understand technology systems might not work as expected and with guidance, use appropriate terminology to describe a problem.
- CSC-02.TS_NI.1 Explain that connecting computing devices allows information sharing.
- CSC-02.TS_HS.1 Identify the components and basic functions of a computer system.
- CSC-02.TS_HS.2 Independently use a computing device to perform a variety of tasks.
- CSC-02.TS_HS.3 Recognize users have different technology needs and preferences.
- CSC-02.TS_T.1 Understand technology systems might not work as expected and independently use appropriate terminology to describe a problem.
- CSC-03.TS_NI.1 Recognize that information is sent and received over physical or wireless paths.
- CSC-03.TS_HS.1 Identify the components and the basic functions of a computer system including peripherals and external storage features.
- CSC-03.TS_HS.2 Independently use a computing device to perform a variety of tasks.
- CSC-03.TS_HS.3 Recognize users have different technology needs and preferences.
- CSC-03.TS_T.1 With guidance, apply basic troubleshooting strategies.
- CSC-04.TS_NI.1 Recognize that computing devices can be connected in a variety of ways to share information.
- CSC-04.TS_HS.1 Explain the difference between hardware and software.
- CSC-04.TS_HS.2 Independently use a computing device to perform a variety of tasks. (Continued growth)
- CSC-04.TS_HS.3 Recognize users have different technology needs and preferences. (Continued growth)
- CSC-04.TS_T.1 With guidance, apply basic troubleshooting strategies. (Continued growth)
- CSC-05.TS_NI.1 Understand that information is sent and received across physical or wireless paths.
- CSC-05.TS_HS.1 Compare and contrast physical and virtual systems.
- CSC-05.TS_HS.2 Independently use a computing device to perform a variety of tasks. (Continued growth)
- CSC-05.TS_HS.3 Recognize users have different technology needs and preferences. (Continued growth)
- CSC-05.TS_T.1 With guidance, apply basic troubleshooting strategies. (Continued growth)
- CSC-06.TS_NI.1 Explain how data is sent across networks.
- CSC-06.TS_HS.1 Use hardware and/or software to complete a task.
- CSC-06.TS_HS.2 Use software features to accomplish a goal.
- CSC-06.TS_HS.3 Organize, store, and retrieve digital information with guidance.
- CSC-06.TS_HS.4 Identify threats to technology systems. (CYSEC)
- CSC-06.TS_HS.5 Identify security measures to protect technology systems. (CYSEC)
- CSC-06.TS_T.1 Apply basic troubleshooting strategies.
- CSC-07.TS_NI.1 Model how data is sent from one computer to another across networks.
- CSC-07.TS_HS.1 Compare and contrast hardware and/or software options to complete a task.
- CSC-07.TS_HS.2 Use software features to accomplish a goal. (Continued growth)
- CSC-07.TS_HS.3 Organize, store, and retrieve digital information with minimal guidance.
- CSC-07.TS_HS.4 Describe threats to technology systems. (CYSEC)
- CSC-07.TS_HS.5 Explain how security measures protect technology systems. (CYSEC)
- CSC-07.TS_T.1 Apply basic troubleshooting strategies. (Continued growth.)
- CSC-08.TS_NI.1 Investigate how data is sent from one computer to another across networks.
- CSC-08.TS_HS.1 Choose appropriate device/hardware/software to complete a task.
- CSC-08.TS_HS.2 Use software features to accomplish a goal. (Continued growth)
- CSC-08.TS_HS.3 Organize, store, and retrieve digital information efficiently.
- CSC-08.TS_HS.4 Describe ways to protect against threats to technology systems. (CYSEC)
- CSC-08.TS_HS.5 Compare and contrast security measures used to protect technology systems. (CYSEC)
- CSC-08.TS_T.1 Apply basic troubleshooting strategies. (Continued growth.)
- CSC-09.TS_NI.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
- CSC-09.TS_NI.2 Understand the implications of accessing publicly available Internet connections. (CYSEC)
- CSC-09.TS_HS.1 Compare and contrast appropriate device/hardware/software to complete a task.
- CSC-09.TS_HS.2 Define software and security patches/update. (CYSEC)
- CSC-09.TS_HS.3 Explain why a backup is necessary. (CYSEC)
- CSC-09.TS_T.1 Describe basic hardware and software problems using appropriate and accurate terminology.
- CSC-10.TS_NI.1 Identify and define different network connection types (e.g., wifi, mobile data, ethernet).
- CSC-10.TS_NI.2 Identify networkable devices.
- CSC-10.TS_HS.1 Compare and contrast appropriate device/hardware/software to complete a task. (Continued growth)
- CSC-10.TS_HS.2 Recognize the importance of and effectively perform software and security patches/updates. (CYSEC)
- CSC-10.TS_HS.3 Identify important data or systems that need redundancy. (CYSEC)
- CSC-10.TS_T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors.
- CSC-11.TS_NI.1 Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet).
- CSC-11.TS_NI.2 Understand the global impact of networkable devices.
- CSC-11.TS_HS.1 Compare and contrast appropriate device/hardware/software to complete a task. (Continued growth)
- CSC-11.TS_HS.2 Identify and choose hardware and software to help protect a system. (CYSEC)
- CSC-11.TS_HS.3 Identify different options for redundancy (e.g., cloud storage, external, duplicate devices). (CYSEC)
- CSC-11.TS_T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors. (Continued growth)
- CSC-12.TS_NI.1 Choose an appropriate network connection given a scenario or situation.
- CSC-12.TS_NI.2 Compare and contrast the benefits and security risks of networkable devices.
- CSC-12.TS_HS.1 Compare and contrast appropriate device/hardware/software to complete a task. (Continued growth)
- CSC-12.TS_HS.2 Identify and choose hardware and software to help protect a system. (CYSEC) (Continued growth)
- CSC-12.TS_HS.3 Implement redundancy. (CYSEC)
- CSC-12.TS_T.1 Implement systematic troubleshooting strategies to identify and fix errors.
- PASTE
- PASTE
- PASTE