Please enable JavaScript to use CodeHS

Standards Mapping

for California 9-12

30

Standards in this Framework

30

Standards Mapped

100%

Mapped to Course

Standard Lessons
9-12.AP.12
Design algorithms to solve computational problems using a combination of original and existing algorithms.
  1. 3.9 Super Karel
  2. 10.1 Functions and Parameters 1
  3. 10.2 Functions and Parameters 2
  4. 10.3 Functions and Parameters 3
  5. 10.5 Functions and Return Values 2
9-12.AP.13
Create more generalized computational solutions using collections instead of repeatedly using simple variables.
  1. 10.11 Intro to Lists/Arrays
  2. 18.2 Basics of Objects
  3. 18.5 Intro to Sets
  4. 18.6 Intro to Grids
9-12.AP.14
Justify the selection of specific control structures by identifying tradeoffs associated with implementation, readability, and performance.
  1. 3.14 Control Structures Example
  2. 8.4 If Statements
  3. 8.5 For Loops in JavaScript
  4. 8.9 While Loops
  5. 8.10 Loop and a Half
9-12.AP.15
Iteratively design and develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 10.10 Mouse Events: Mouse Clicked
  2. 16.1 Mouse Events: Mouse Moved
  3. 16.3 Key Events
9-12.AP.16
Decompose problems into smaller subproblems through systematic analysis, using constructs such as procedures, modules, and/or classes.
  1. 10.1 Functions and Parameters 1
  2. 10.2 Functions and Parameters 2
  3. 10.3 Functions and Parameters 3
  4. 10.4 Functions and Return Values 1
  5. 10.5 Functions and Return Values 2
  6. 18.1 Intro to Objects/Maps
  7. 18.2 Basics of Objects
9-12.AP.17
Create computational artifacts using modular design.
  1. 10.1 Functions and Parameters 1
  2. 10.2 Functions and Parameters 2
  3. 10.3 Functions and Parameters 3
  4. 10.4 Functions and Return Values 1
  5. 10.5 Functions and Return Values 2
9-12.AP.18
Systematically design programs for broad audiences by incorporating feedback from users.
  1. 11.4 Test
9-12.AP.19
Explain the limitations of licenses that restrict use of computational artifacts when using resources such as libraries.
  1. 1.10 Creative Credit & Copyright
9-12.AP.20
Iteratively evaluate and refine a computational artifact to enhance its performance, reliability, usability, and accessibility.
  1. 10.4 Functions and Return Values 1
  2. 10.5 Functions and Return Values 2
  3. 16.1 Mouse Events: Mouse Moved
9-12.AP.21
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 1.12 Project: Public Service Announcement
9-12.AP.22
Document decisions made during the design process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
  1. 3.7 Commenting Your Code
9-12.CS.1
Describe ways in which abstractions hide the underlying implementation details of computing systems to simplify user experiences.
  1. 3.8 Abstraction
  2. 3.9 Super Karel
9-12.CS.2
Compare levels of abstraction and interactions between application software, system software, and hardware.
  1. 5.2 Internet Hardware
  2. 5.6 Packets and Protocols
9-12.CS.3
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.7 Commenting Your Code
  3. 3.16 How to Indent Your Code
  4. 3.17 Debugging Strategies
9-12.DA.10
Create data visualizations to help others better understand real-world phenomena.
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
9-12.DA.11
Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
  1. 10.15 Simulation
9-12.DA.8
Translate between different representations of data abstractions of real-world phenomena, such as characters, numbers, and images.
  1. 6.2 Variables
  2. 6.3 User Input
9-12.DA.9
Describe ​​tradeoffs​ associated with​ ​how​ ​data elements​ ​are​ ​organized​​ and ​stored.
  1. 10.11 Intro to Lists/Arrays
  2. 18.1 Intro to Objects/Maps
  3. 18.5 Intro to Sets
  4. 18.6 Intro to Grids
9-12.IC.23
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 5.7 The Impact of the Internet
9-12.IC.24
Identify impacts of bias and equity deficit on design and implementation of computational artifacts and apply appropriate processes for evaluating issues of bias.
  1. 11.2 Empathy
9-12.IC.25
Demonstrate ways a given algorithm applies to problems across disciplines.
  1. 10.14 Iterating Over an Array
9-12.IC.26
Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources.
  1. 5.7 The Impact of the Internet
9-12.IC.27
Use collaboration tools and methods to increase connectivity with people of different cultures and careers.
  1. 1.12 Project: Public Service Announcement
9-12.IC.28
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 1.10 Creative Credit & Copyright
9-12.IC.29
Explain the privacy concerns related to the collection and generation of data through automated processes.
  1. 1.6 Privacy & Security
9-12.IC.30
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 1.5 Internet Safety
9-12.NI.4
Describe issues that impact network functionality.
  1. 5.5 Routing
  2. 5.6 Packets and Protocols
9-12.NI.5
Describe the design characteristics of the Internet.
  1. 5.2 Internet Hardware
  2. 5.3 Internet Addresses
  3. 5.4 DNS
  4. 5.6 Packets and Protocols
9-12.NI.6
Compare and contrast security measures to address various security threats.
  1. 1.6 Privacy & Security
9-12.NI.7
Compare and contrast cryptographic techniques to model the secure transmission of information.
  1. 2.1 Cryptography, Cryptology, Cryptanalysis
  2. 2.3 Basic Crypto Systems: Caesar Cipher
  3. 2.4 Basic Crypto Systems: Cracking Caesar
  4. 2.5 Basic Crypto Systems: Vigenere Cipher