Please enable JavaScript to use CodeHS

North Carolina Intro to CS Framework


Standard Description
ICS-CS-01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. Lessons
ICS-CS-02 Compare levels of abstraction and interactions between application software, system software, and hardware layers. Lessons
ICS-CS-03 Explain the roles of operating systems including memory management, data storage/retrieval, process management, and access control. Lessons
ICS-CS-04 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. Lessons
ICS-NI-01 Evaluate the relationship between routers, switches, servers, and topology with regard to networks. Lessons
ICS-NI-02 Identify examples to illustrate how sensitive data can be affected by malware and other attacks. Lessons
ICS-NI-03 Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. Lessons
ICS-NI-04 Compare various security measures and consider tradeoffs between the usability and security of a computing system. Lessons
ICS-DA-01 Compare different binary representations of data, including text, sound, images, and numbers. Lessons
ICS-DA-02 Evaluate the tradeoffs in how data elements are organized and where data is stored. Lessons
ICS-DA-03 Create interactive data visualizations using software tools to help others better understand real-world phenomena. Lessons
ICS-DA-04 Create computational models that represent the relationships among different elements of data collected. Lessons
ICS-AP-01 Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. Lessons
ICS-AP-02 Explain the use of artificial intelligence within computing systems. Lessons
ICS-AP-03 Utilize lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. Lessons
ICS-AP-04 Justify the selection of specific control structures, considering implementation, readability, and program performance. Lessons
ICS-AP-05 Iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. Lessons
ICS-AP-06 Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects. Lessons
ICS-AP-07 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. Lessons
ICS-AP-08 Systematically design programs for broad audiences. Lessons
ICS-AP-09 Refine programs by incorporating feedback from users. Lessons
ICS-AP-10 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as software libraries. Lessons
ICS-AP-11 Evaluate computational artifacts for usability. Lessons
ICS-AP-12 Modify computational artifacts to increase usability and accessibility. Lessons
ICS-AP-13 Develop computational artifacts working in team roles using collaborative tools. Lessons
ICS-AP-14 Explain design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs. Lessons
ICS-IC-01 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. Lessons
ICS-IC-02 Elaborate how computational innovations have and may continue to impact society. Lessons
ICS-IC-03 Evaluate how equity, access, and influence impact distribution of computing resources in a global society. Lessons
ICS-IC-04 Test computational artifacts to reduce bias and equity deficits. Lessons
ICS-IC-05 Demonstrate ways a given algorithm applies to problems across disciplines. Lessons
ICS-IC-06 Utilize tools and methods for collaboration on a project to increase connectivity of peers. Lessons
ICS-IC-07 Explain the beneficial and harmful effects that intellectual property laws can have on innovation. Lessons
ICS-IC-08 Explain privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. Lessons
ICS-IC-09 Evaluate the social and economic implications of privacy in the context of safety, law, and ethics. Lessons