Please enable JavaScript to use CodeHS

West Virginia Computer Science in the Modern World Standards Mapping


Fundamentals of Cybersecurity

48 Standards in this Framework 25 Standards Mapped 52% Mapped to Course

Standard Lessons
CS.MW.1 Use predefined functions and parameters, classes and methods to divide a complex problem into simpler parts.
  1. 4.2 Programming with Karel
CS.MW.2 Describe a software development process used to solve software problems (e.g., design, coding, testing, verification).
CS.MW.3 Explain how sequence, selection, iteration, and recursion are building blocks of algorithms.
  1. 22.5 For Loops in JavaScript
CS.MW.4 Compare techniques for analyzing massive data collections.
CS.MW.5 Describe the relationship between binary and hexadecimal representations.
  1. 10.3 Data Representation
CS.MW.6 Analyze the representation and trade-offs among various forms of digital information.
CS.MW.7 Describe how various types of data are stored in a computer system.
CS.MW.8 Use modeling and simulation to represent and understand natural phenomena.
CS.MW.9 Discuss the value of abstraction to manage problem complexity.
CS.MW.10 Describe the concept of parallel processing as a strategy to solve large problems.
CS.MW.11 Describe how computation shares features with art and music by translating human intention into an artifact.
CS.MW.12 Work in a team to design and develop a software artifact.
CS.MW.13 Use collaborative tools to communicate with project team members (e.g., discussion threads, wikis, blogs, version control, etc.).
CS.MW.14 Describe how computing enhances traditional forms and enables new forms of experience, expression, communication, and collaboration.
  1. 7.4 Software and Applications
  2. 10.10 Impact of the Internet
CS.MW.15 Identify how collaboration influences the design and development of software products.
CS.MW.16 Create and organize Web pages through the use of a variety of web programming design tools.
  1. 19.15 Your First Website
CS.MW.17 Use mobile devices/emulators to design, develop, and implement mobile computing applications.
CS.MW.18 Use various debugging and testing methods to ensure program correctness (e.g., test cases, unit testing, white box, black box, integration testing).
  1. 4.3 Looping
  2. 4.4 Branching
CS.MW.19 Apply analysis, design, and implementation techniques to solve problems (e.g., use one or more software lifecycle models).
CS.MW.20 Use Application Program Interfaces (APIs) and libraries to facilitate programming solutions.
CS.MW.21 Select appropriate file formats for various types and uses of data.
CS.MW.22 Describe a variety of programming languages available to solve problems and develop systems.
  1. 4.1 Programming Concepts
CS.MW.23 Explain the program execution process.
CS.MW.24 Explain the principles of security by examining encryption, cryptography, and authentication techniques.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
CS.MW.25 Explore a variety of careers to which computing is central.
  1. 8.4 Databases
  2. 8.9 Common Security Problems
  3. 10.10 Impact of the Internet
CS.MW.26 Describe techniques for locating and collecting small and large-scale data sets.
CS.MW.27 Describe how mathematical and statistical functions, sets, and logic are used in computation.
CS.MW.28 Describe the unique features of computers embedded in mobile devices and vehicles (e.g., cell phones, automobiles, airplanes).
CS.MW.29 Develop criteria for purchasing or upgrading computer system hardware.
CS.MW.30 Describe the principal components of computer organization (e.g., input, output, processing, and storage).
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
  3. 11.4 Storage Options
CS.MW.31 Compare various forms of input and output.
CS.MW.32 Explain the multiple levels of hardware and software that support program execution (e.g., compilers, interpreters, operating systems, networks).
  1. 4.1 Programming Concepts
  2. 7.1 Operating Systems
  3. 7.4 Software and Applications
  4. 10.4 Internet Hardware and Sending Information
  5. 11.3 Network Devices
CS.MW.33 Apply strategies for identifying and solving routine hardware and software problems that occur in everyday life.
  1. 11.2 Peripheral Devices
  2. 11.3 Network Devices
  3. 12.1 Methodology
  4. 12.2 Support Practice
CS.MW.34 Compare and contrast client-server and peer-to-peer network strategies.
  1. 8.5 Clients and Servers
  2. 10.4 Internet Hardware and Sending Information
  3. 10.7 Routing
CS.MW.35 Explain the basic components of computer networks (e.g., servers, file protection, routing, spoolers and queues, shared resources, and fault-tolerance).
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 11.3 Network Devices
CS.MW.36 Describe how the Internet facilitates global communication.
  1. 10.10 Impact of the Internet
CS.MW.37 Describe the major applications of artificial intelligence and robotics.
CS.MW.38 Compare appropriate and inappropriate social networking behaviors.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
CS.MW.39 Discuss the impact of computing technology on business and commerce (e.g., automated tracking of goods, automated financial transactions, e-commerce, cloud computing).
  1. 10.10 Impact of the Internet
CS.MW.40 Describe the role that adaptive technology can play in the lives of people with special needs.
CS.MW.41 Compare the positive and negative impacts of technology on culture (e.g., social networking, delivery of news and other public media, and intercultural communication).
  1. 10.10 Impact of the Internet
CS.MW.42 Describe strategies for determining the reliability of information found on the Internet.
  1. 2.5 Information Literacy
CS.MW.43 Differentiate between information access and information distribution rights.
  1. 2.6 Creative Credit & Copyright
CS.MW.44 Describe how different kinds of software licenses can be used to share and protect intellectual property.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
CS.MW.45 Discuss the social and economic implications associated with hacking and software piracy.
  1. 2.7 Hacking Ethics
  2. 7.5 Software Licenses
CS.MW.46 Describe different ways in which software is created and shared and their benefits and drawbacks (commercial software, public domain software, open source development).
  1. 7.5 Software Licenses
CS.MW.47 Describe security and privacy issues that relate to computer networks.
  1. 2.4 Privacy & Security
  2. 11.6 Network Communication
  3. 11.7 Network Management
CS.MW.48 Explain the impact of the digital divide on access to critical information.
  1. 10.10 Impact of the Internet