Virginia CS Standards Explorer
CS SOL Search
Integration Ideas
Core Content Area:
Any Core Content Area
Civics & Economics
English Language Arts
History and Social Science
Mathematics
Science
US History 1865 to Present
US History to 1865
Virginia Studies
World Geography
Grade Level:
Any Grade Level
Kindergarten
Grade 1
Grade 2
Grade 3
Grade 4
Grade 5
Grade 6
Grade 7
Grade 8
Keyword:
Keyword:
Strand:
Any Strand
Algorithms and Programming
Computing Systems
Cybersecurity
Data and Analysis
Impacts of Computing
Networking and the Internet
Grade Level:
Any Grade Level
Kindergarten
Grade 1
Grade 2
Grade 3
Grade 4
Grade 5
Grade 6
Grade 7
Grade 8
Activity:
Any Activity
Arranging
Artificial Intelligence
Binary Representation (e.g. Braille, Morse Code)
Cause/Effect
Classroom Surveys
Computing Device Definitions
Cryptography
Data collection
Data Representation
Decomposition
Digital Artifacts
Digital Images
Drones
Encoding
Encoding/Decoding
Finding Problems (Debugging)
Flowcharts
Google
Google Trends
Grouping
Importance of Privacy/Security in History
Input/Output
Internet
Internet of Things (e.g. "Smart" Refrigerators, Li
Interpreting Graphs
Iteration
Making Predictions Based on Historical Data
Mobile Apps
Networks vs. Historical Transporters of Goods and
Patterns
Programming
Remote Work and School
Secret Messages
Self-Driving Cars
Social Media
Solving Mysteries/Puzzles
Sorting
Step-By-Step Instructions
Storyboards
Storytelling
System Modeling
Technology Investigations
Text Messaging
Timelines
Video Games
What If's (e.g., "What if Paul Revere had Twitter
Essential Vocabulary:
Any Essential Vocabulary word
Algorithm
Artifact
ASCII
Attribute
Author
Automation
Binary
Biometrics
Block-based programming language
Blog
Bug
Career Pathway
Cite
Command
Composer
Compound conditionals
Computational thinking
Computer network
Computing device
Computing system
Conditional (if-statement)
Constraints
Control structure
CPU
Creative Commons
Culture
Cyberbullying
Cybersecurity
Data
Data cleaning
Data efficiency
Data integrity
Data transmission
Debug
Debugging
Decompose
Denial-of-Service attack
Design document
Desktop computer
Digital Artifact
Digital Citizenship
Digital footprint
Digital Safety
Documentation
Email
Encryption
End-user
Event
Firewall
Flow of control
Flowchart
Global economy
Goods and services
GPU
Graphic organizer
Hacker
Hacking
Hardware
Identity Theft
If statement
If-else statement
If-statements
Illustrator
Input
Internet
Internet speed
IP address
Keyboard
Laptop computer
Local network
Loop
Malware
Mobile Device
Model
Motherboard
Mouse
Nesting
Network
NIC
Object graph
Output
Pair programming
Parameter
Password
Pattern Matching
Pay rate
Personal information
Phishing
Picture graph
Pixel
Plagiarism
Planning tool
Prediction
Printer
Privacy
Private sector
Processor
Program
Program tracing
Protocols
Pseudocode
Public domain
RAM
Reboot
Reliability
Repeat
Salary
Sensor
Sensors
Sequence
Simulation
Social media
Software
Source
Storage
Storyboard
Subprogram
Subset
Table
Tablet
Technology
Text message
Touch Screen
Trackpad
Trojan horse
Troubleshoot
URL
Variable
Video conferencing
Virus
vocabulary
Website
Workplace readiness skill
Worldwide network