Skip to content
Browse by Grade: 10th Grade

United States · Common Core State Standards

10th Grade Computer Science

This course challenges students to move beyond basic coding into the realm of complex problem solving and systems architecture. Students explore how data structures, network security, and algorithmic efficiency shape the modern digital landscape while developing advanced programming skills.

4 units·49 topics·Ages 15-16

01Algorithmic Logic and Complexity

13 topics·Weeks 1-9

Students analyze the efficiency of different algorithms and learn to decompose complex problems into manageable computational steps.

Problem Decomposition Strategies

Students practice breaking down large-scale problems into smaller, manageable modules using various decomposition techniques.

Concept MappingCollaborative Problem-Solving
Identifying Algorithmic Patterns

Students identify recurring logic patterns in computational problems and explore how these patterns can be generalized.

Hexagonal ThinkingThink-Pair-Share
Introduction to Algorithm Analysis

Students are introduced to the concept of algorithm efficiency and basic methods for comparing algorithms.

Inquiry CircleProblem-Based Learning
Linear and Binary Search Algorithms

Students explore and implement linear and binary search algorithms, analyzing their performance characteristics.

Simulation GameStations Rotation
Basic Sorting Algorithms: Selection & Bubble Sort

Students learn and implement fundamental sorting algorithms, understanding their mechanics and limitations.

Peer TeachingCollaborative Problem-Solving
Advanced Sorting Algorithms: Merge & Quick Sort

Students investigate more efficient sorting algorithms, focusing on divide-and-conquer strategies.

Inquiry CircleProblem-Based Learning
Pseudocode for Algorithm Design

Students practice writing pseudocode to clearly communicate algorithmic logic before actual coding.

Think-Pair-SharePeer Teaching
Flowcharting Complex Logic

Students use flowcharts to visually map out complex conditional logic and iterative processes.

Concept MappingCollaborative Problem-Solving
Introduction to Big O Notation

Students are introduced to Big O notation as a formal way to describe the asymptotic behavior of algorithms.

Flipped ClassroomExpert Panel
Recursive Algorithms

Students explore the concept of recursion, implementing and analyzing simple recursive functions.

Problem-Based LearningPeer Teaching
Algorithmic Strategies: Heuristics and Approximation

Students explore heuristic approaches and approximation algorithms for problems where exact solutions are impractical or too slow.

Case Study AnalysisProblem-Based Learning
Introduction to Graph Algorithms

Students are introduced to basic graph theory concepts and simple graph traversal algorithms.

Concept MappingSimulation Game
Problem Solving with Constraints

Students learn to approach problems with specific constraints, such as limited memory or time, and adapt their algorithmic choices.

Problem-Based LearningDecision Matrix

02Advanced Data Structures and Management

12 topics·Weeks 10-18

Focuses on how data is organized, stored, and manipulated to optimize software performance and user experience.

Arrays and Lists: Static vs. Dynamic

Students differentiate between static arrays and dynamic lists, understanding their memory allocation and use cases.

Stations RotationThink-Pair-Share
Dictionaries and Hash Tables

Students explore key-value pair data structures, focusing on hash tables and their efficiency for data retrieval.

Inquiry CircleSimulation Game
Stacks and Queues: LIFO & FIFO

Students learn about abstract data types: stacks (Last-In, First-Out) and queues (First-In, First-Out), and their applications.

Role PlayProblem-Based Learning
Introduction to Trees and Graphs

Students are introduced to non-linear data structures like trees and graphs, understanding their basic properties and uses.

Concept MappingGallery Walk
Relational Database Design

Students learn the principles of relational database design, including entities, attributes, and relationships.

Case Study AnalysisCollaborative Problem-Solving
SQL Fundamentals: Querying Data

Students gain hands-on experience with SQL to query and retrieve data from relational databases.

Problem-Based LearningStations Rotation
Data Redundancy and Consistency

Students learn about the problems caused by redundant data and basic strategies to maintain data consistency in databases.

JigsawCollaborative Problem-Solving
Introduction to NoSQL Databases

Students are introduced to NoSQL databases, understanding their differences from relational databases and use cases.

Case Study AnalysisFormal Debate
Principles of Data Visualization

Students learn the fundamental principles of effective data visualization, focusing on clarity and impact.

Gallery WalkDecision Matrix
Interpreting Data Visualizations

Students practice interpreting various data visualizations to extract meaningful conclusions and identify trends.

Inquiry CircleSocratic Seminar
Ethical Considerations in Data Management

Students discuss the ethical implications of data collection, storage, and usage, including privacy and bias.

Socratic SeminarPhilosophical Chairs
Data Cleaning and Preprocessing

Students learn techniques for cleaning and preprocessing raw data to ensure its quality and suitability for analysis.

Collaborative Problem-SolvingProblem-Based Learning

03Network Architecture and Web Systems

13 topics·Weeks 19-27

An investigation into how computers communicate across global networks and the protocols that keep them connected.

Introduction to Network Topologies

Students learn about different network layouts (bus, star, ring, mesh) and their advantages/disadvantages.

Concept MappingSimulation Game
The OSI Model: Layers 1-3

Students break down the physical, data link, and network layers of the OSI model, understanding their functions.

JigsawRole Play
The OSI Model: Layers 4-7

Students explore the transport, session, presentation, and application layers, focusing on end-to-end communication.

JigsawDocument Mystery
TCP/IP Protocol Suite

Students focus on the TCP/IP model, understanding its relationship to OSI and its practical implementation.

Simulation GamePeer Teaching
Routing and Switching

Students learn how routers and switches direct network traffic, ensuring data reaches its intended destination.

Simulation GameProblem-Based Learning
Introduction to Cloud Computing

Students explore the fundamental concepts of cloud computing, including service models (IaaS, PaaS, SaaS) and deployment models.

Formal DebateCase Study Analysis
Introduction to Parallel Processing

Students explore the concept of parallel processing, understanding how tasks can be divided and executed simultaneously to improve performance.

Simulation GameThink-Pair-Share
HTTP/S and Web Communication

Students learn about the Hypertext Transfer Protocol (HTTP) and its secure version (HTTPS) for web browsing.

Flipped ClassroomDocument Mystery
Domain Name System (DNS)

Students explore how DNS translates human-readable domain names into machine-readable IP addresses.

Simulation GameEscape Room
Introduction to Web Development (Frontend)

Students get an overview of frontend web development using HTML, CSS, and basic JavaScript.

Project-Based LearningStations Rotation
Introduction to Web Development (Backend)

Students are introduced to backend concepts, including server-side scripting and database interaction.

Flipped ClassroomCase Study Analysis
Network Security Fundamentals

Students learn basic network security concepts, including firewalls, intrusion detection, and prevention systems.

Carousel BrainstormDocument Mystery
Wireless Network Technologies

Students explore different wireless networking standards (Wi-Fi, Bluetooth) and their security considerations.

Inquiry CircleExpert Panel

04Cybersecurity and Digital Defense

11 topics·Weeks 28-36

Students learn to identify vulnerabilities and implement strategies to protect systems from malicious attacks.

Introduction to Cybersecurity Threats

Students identify common cybersecurity threats such as malware, phishing, and denial-of-service attacks.

Carousel BrainstormDocument Mystery
Social Engineering Tactics

Students learn about social engineering techniques and how human psychology is exploited in cyberattacks.

Role PlayCase Study Analysis
Common Software Security Flaws

Students identify common software security flaws and understand how they can be exploited, focusing on prevention.

Problem-Based LearningCase Study Analysis
Introduction to Cryptography

Students learn the basic principles of cryptography, including symmetric and asymmetric encryption.

Document MysteryJigsaw
Digital Signatures and Certificates

Students learn how digital signatures verify authenticity and integrity, and the basic role of digital certificates in trust.

Document MysteryFlipped Classroom
Authentication and Authorization

Students learn about different authentication methods (passwords, biometrics, MFA) and authorization principles.

Stations RotationDecision Matrix
Incident Response Planning

Students develop an understanding of the steps involved in responding to a cybersecurity incident or data breach.

Mock TrialCase Study Analysis
Cybersecurity Ethics and Laws

Students discuss the ethical dilemmas in cybersecurity and explore relevant laws and regulations.

Socratic SeminarPhilosophical Chairs
Introduction to Digital Evidence

Students are introduced to the concept of digital evidence, its importance, and basic principles of its preservation.

Document MysteryCase Study Analysis
Privacy Enhancing Technologies

Students explore technologies and practices designed to protect user privacy online, such as VPNs and anonymizers.

Formal DebateExpert Panel
Future of Cybersecurity

Students discuss emerging threats and future trends in cybersecurity, including AI in defense and quantum cryptography.

World CaféCarousel Brainstorm