36420094ComputerScienceVol.36No.4Apr.2009:2008204230(1965-),,CCF,2008(541004)20086,ACMCS2001(),ACM,,,,,,,,,,,G642ComputationalThinkingandIntroductiontoComputerScienceDONGRong2sheng(SchoolofComputerandControl,GuilinUniversityofElectronicTechnology,Guilin541004,China)AbstractComputationalthinkingisbecominganimportantconceptwidelyconcernedoverthefieldofcomputersciencetoday.CS2001InterimReview(draft),submittedbyACMinJune2008,proposedthattheintroductorycourseshouldcapturetheessenceofcomputationalthinking.Accordingtothereport,thispaperrespectivelydescribedtwokindsofintroductorycourses:oneisbasedoncomputationalthinking,andtheotherbasedondisciplineprinciplesandmethodo2logies;italsoprovidedtheirsyllabusesandpointedouttheirdifferencesandconsistencyinessence.Finallywethoughtthestrengthsofthetwokindsofintroductorycoursesaredifferentbutcomplementary,andthecomplementaritycanal2socontributetotheteachingreformofthecourseIntroductiontocomputersciencewithacoreofcompetencytrainingofcomputationalthinking,whichwillprovideagoodexamplefortheteachingofothercoursesofcomputerscience.KeywordsComputerscience,Computationalthinking,Introductiontocomputerscience,Methodologyofcomputerscienceandtechnology1,,ACMIEEE2CS1989,ACM(Computingasadiscipline),,[1],,,CC2001,,[2]CC2005,,,[3]20086,ACMCS2001(CC2001)(CS2001InterimReview)(),(JeannetteM.Wing),[426],ACMIEEE2CS,,,ACMIEEE2CS,05()[5],()[728],2,:()[4],,,(Reading,writing,andarithmetic,3R),:,,,:,,,,11()(1),;(2),,,;(3),(SeparationofConcerns,SoC);(4),;(5),;(6),;(7),,,,,,,221.:21,3R;,2.A::(Abstraction),(Automation)A,A,:?3.:14.:,5.:6:,;,;,;;,;,6.:,;;,,,,,CSD,();;7.:P=NP????8.:,!3,,,ACM,,,,,331.:;;;;4;,;;2.:;;;;PNP;;P=NP;;;GOTO;;;;;3.3:;;;;3;34.:;;;;;(,,,,);CC19915.:;;,,(,);,;;;;156.:;;;7.:;;;;;;;8.:,,4,,,,:,,;,,,(),,,:?,,,,,,3,,,,,,,,,,,:1.?2.?,,;,,,[9210],,200875000(NSF)CDI(Cyber2En2abledDiscoveryandInnovation,Cyber)[9],,,,,[1]DenningPJ,etal.Computingasadiscipline.CommunicationsoftheACM,1989,32(1)[2]ACM/IEEE2Curriculum2001TaskForce.ComputingCurricula2001,ComputerScience.IEEEComputerSocietyPressandACMPress,2001[3]TheJointTaskForceforComputingCurricula2005.TheOver2viewReport.AcooperativeprojectofACM,AIS,andIEEE2CS.Sept2005[4]CS2001InterimReview(draft).2008.=Main_Page[5]WingJM.ComputationalThinking.CommunicationsoftheACM,2006,49(3)[6]WingJM.ComputationalThinkingandThinkingaboutCompu2ting[EB/OL].2008.[7],.[M].:,2002[8].[M].:,2007[9][10]BCS.Thescienceofthinking:Europesnextpolicychallenge[EB/OL].2008.(24)[23]WagnerD,SotoP.MimicryAttacksonHost2basedIntrusionDetectionSystems[C]Proceedingsofthe9thACMConfer2enceonComputerandCommunicationsSecurity.Washington,DC,USA,2002:2552264[24]FoglaP,LeeW.EvadingNetworkAnomalyDetectionSystems:FormalReasoningandPracticalTechniques[C]Proceedingsofthe13thACMConferenceonComputerandCommunicationsSecurity.Alexandria,Virginia,USA,2006:5926825