K-12 Computer Science Standards

Illinois 9-10

37 Standards

1

9-10.CS.01

Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.

2

9-10.CS.02

Compare levels of abstraction and interactions between application software, system software, and hardware layers.

3

9-10.CS.03

Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.

4

9-10.NI.04

Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.

5

9-10.NI.05

Give examples to illustrate how sensitive data can be affected by malware and other attacks.

6

9-10.NI.06

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

7

9-10.NI.07

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

8

9-10.NI.08

Explain tradeoffs when selecting and implementing cybersecurity recommendations.

9

9-10.DA.09

Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.

10

9-10.DA.10

Evaluate the tradeoffs in how data elements are organized and stored.

11

9-10.DA.11

Create interactive data visualizations using software tools to help others better understand real-world phenomena.

12

9-10.DA.12

Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.

13

9-10.AP.13

Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.

14

9-10.AP.14

Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.

15

9-10.AP.15

Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made.

16

9-10.AP.16

Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.

17

9-10.AP.17

Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects.

18

9-10.AP.18

Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.

19

9-10.AP.19

Systematically design and develop programs for broad audiences by incorporating feedback from users.

20

9-10.AP.20

Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.

21

9-10.AP.21

Evaluate and refine computational artifacts to make them more usable and accessible.

22

9-10.AP.22

Design and develop computational artifacts working in team roles using collaborative tools.

23

9-10.AP.23

Document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs.

24

9-10.AP.24

Describe the characteristics and evaluate the impact of human computer interaction.

25

9-10.IC.25

Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.

26

9-10.IC.25b

Evaluate the ways digital social interactions impact personal, ethical, social, economic, and cultural practices.

27

9-10.IC.26

Test and refine computational artifacts to reduce bias and equity deficits.

28

9-10.IC.27

Demonstrate ways a given algorithm applies to problems across disciplines.

29

9-10.IC.28

Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.

30

9-10.IC.29

Explain the beneficial and harmful effects that intellectual property laws can have on innovation.

31

9-10.IC.30

Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

32

9-10.IC.31

Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.

33

9-10.ET.A

Explain that the field of emerging technologies will be evolving and rapidly growing.

34

9-10.ET.B

Compare existing and emerging technologies, ideas, and concepts.

35

9-10.ET.C

Describe how emerging technologies are influencing current events at a local and global scale.

36

9-10.ET.D

Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate.

37

9-10.ET.E

Create new or original work by applying emerging technologies.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program