K-12 Computer Science Standards

North Carolina Intro to CS

35 Standards

1

ICS-CS-01

Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.

2

ICS-CS-02

Compare levels of abstraction and interactions between application software, system software, and hardware layers.

3

ICS-CS-03

Explain the roles of operating systems including memory management, data storage/retrieval, process management, and access control.

4

ICS-CS-04

Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.

5

ICS-NI-01

Evaluate the relationship between routers, switches, servers, and topology with regard to networks.

6

ICS-NI-02

Identify examples to illustrate how sensitive data can be affected by malware and other attacks.

7

ICS-NI-03

Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

8

ICS-NI-04

Compare various security measures and consider tradeoffs between the usability and security of a computing system.

9

ICS-DA-01

Compare different binary representations of data, including text, sound, images, and numbers.

10

ICS-DA-02

Evaluate the tradeoffs in how data elements are organized and where data is stored.

11

ICS-DA-03

Create interactive data visualizations using software tools to help others better understand real-world phenomena.

12

ICS-DA-04

Create computational models that represent the relationships among different elements of data collected.

13

ICS-AP-01

Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.

14

ICS-AP-02

Explain the use of artificial intelligence within computing systems.

15

ICS-AP-03

Utilize lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.

16

ICS-AP-04

Justify the selection of specific control structures, considering implementation, readability, and program performance.

17

ICS-AP-05

Iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.

18

ICS-AP-06

Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.

19

ICS-AP-07

Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.

20

ICS-AP-08

Systematically design programs for broad audiences.

21

ICS-AP-09

Refine programs by incorporating feedback from users.

22

ICS-AP-10

Evaluate licenses that limit or restrict use of computational artifacts when using resources such as software libraries.

23

ICS-AP-11

Evaluate computational artifacts for usability.

24

ICS-AP-12

Modify computational artifacts to increase usability and accessibility.

25

ICS-AP-13

Develop computational artifacts working in team roles using collaborative tools.

26

ICS-AP-14

Explain design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs.

27

ICS-IC-01

Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.

28

ICS-IC-02

Elaborate how computational innovations have and may continue to impact society.

29

ICS-IC-03

Evaluate how equity, access, and influence impact distribution of computing resources in a global society.

30

ICS-IC-04

Test computational artifacts to reduce bias and equity deficits.

31

ICS-IC-05

Demonstrate ways a given algorithm applies to problems across disciplines.

32

ICS-IC-06

Utilize tools and methods for collaboration on a project to increase connectivity of peers.

33

ICS-IC-07

Explain the beneficial and harmful effects that intellectual property laws can have on innovation.

34

ICS-IC-08

Explain privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

35

ICS-IC-09

Evaluate the social and economic implications of privacy in the context of safety, law, and ethics.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program