BPS District Computer Science and Cybersecurity Standards Book

K-12 Grade Levels

Grade 08

BPS-S CSC Standards logo

Eighth Grade

Computer Science and Cybersecurity Standards

8th Grade CSC Standards Global Glossary

BPS-S CSC - Technology Systems logo

CSC-08.TS TS Technology Systems

(NI) Network & Internet - Networks link computers and devices locally and around the world allowing people to access and communicate information.
(HS) Hardware & Software - Devices, hardware, and software work together as a system to accomplish tasks..
(T) Troubleshooting - Strategies for solving technology system problems.
  • CSC-08.TS_NI.1 Investigate how data is sent from one computer to another across networks.
  • CSC-08.TS_HS.1 Choose appropriate device/hardware/software to complete a task. 
  • CSC-08.TS_HS.2 Use software features to accomplish a goal. (Continued growth) 
  • CSC-08.TS_HS.3 Organize, store, and retrieve digital information efficiently. 
  • CSC-08.TS_HS.4 Describe ways to protect against threats to technology systems. (CYSEC) 
  • CSC-08.TS_HS.5 Compare and contrast security measures used to protect technology systems. (CYSEC)
  • CSC-08.TS_T.1 Apply basic troubleshooting strategies. (Continued growth.)

BPS-S CSC - (CT) Computation Thinking logo

CSC-08.CT CT Computational Thinking

(PSA) Problem Solving & Algorithms - Strategies for understanding and solving problems.
(DCA) Data Creation & Analysis - Data can be collected, used, and presented with computing devices or digital tools.
(DD) Development & Design - Design processes to create new, useful, and imaginative solutions to problems.
  • CSC-08.CT_PSA.1 Create and test an algorithm to solve a problem across disciplines. 
  • CSC-08.CT_PSA.2 Debug a program that includes sequencing, loops, or conditionals. (Continued growth)
  • CSC-08.CT_DCA.1 Represent data from multiple sources in order to defend or refute a claim.
  • CSC-08.CT_DD.1 Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.

BPS-S CSC - (IL) Information Literacy logo

CSC-08.IL IL Information Literacy

(A) Access - Effective search strategies can locate information for intellectual or creative pursuits.
(E) Evaluate - Information sources can be evaluated for accuracy, currency, appropriateness, and purpose.
(C) Create - It is important to both consume and produce information to be digitally literate.
(IP) Intellectual Property - Respect for the rights and obligations of using and sharing intellectual property.
  • CSC-08.IL_A.1 Use advanced search strategies to locate information online.
  • CSC-08.IL_E.1 Independently, evaluate information and its sources using student selected processes and strategies. (Continued growth)
  • CSC-08.IL_C.1 Repurpose or remix original works following fair use guidelines. (Continued growth)
  • CSC-08.IL_IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain. 
  • CSC-08.IL_IP.2 Cite a variety of sources using the appropriate format. (Continued growth) 
  • CSC-08.IL_IP.3 Debate the risks and benefits of sharing personal works online (CYSEC)

BPS-S CSC - (CS) Computers in Society logo

CSC-08.CS CS Computers in Society

(IC) Impacts of Computing - Past, present, and possible future impact of technology on society.
(SI) Social Interactions - Technology facilitates collaboration with others.
  • CSC-08.CS_IC.1 Explore and create solutions for the negative impacts of technology, including bias and accessibility.
  • CSC-08.CS_SI.1 Use collaborative technology to communicate information to a specific audience. 
  •  CSC-08.CS_SI.2 Identify how social interactions can impact a person’s self-image. (Continued growth)

BPS-S CSC - (IL) Digital Citizenship logo

CSC-08.DC DC Digital Citizenship

(SE) Safety & Ethics - There are both positive and negative impacts in social and ethical behaviors for using technology.
(RU) Responsible Use - Respect and dignity in virtual communities.
(DI) Digital Identity - Responsibilities and opportunities of living, learning and working in an interconnected digital world.
  • CSC-08.DC_SE.1 Identify steps for responding to uncomfortable situations when interacting online. (CYSEC) (Continued growth) 
  • CSC-08.DC_SE.2 Identify advanced methods to maintain digital privacy and security. (CYSEC) 
  • CSC-08.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC) (Continued growth) 
  • CSC-08.DC_SE.4 Discuss the consequences of identity theft. (CYSEC)
  • CSC-08.DC_RU.1 Describe different forms of cyberbullying and the effects on all parties involved. (Continued growth) 
  • CSC-08.DC_RU.2 Identify strategies to prevent and stop cyberbullying. 
  • CSC-08.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth) 
  • CSC-08.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  • CSC-08.DC_DI.1 Evaluate how digital identity can impact a person now and in the future. (Continued growth.)