Please enable JavaScript to use CodeHS

Standards Mapping

for California 9-12

30

Standards in this Framework

15

Standards Mapped

50%

Mapped to Course

Standard Lessons
9-12.AP.12
Design algorithms to solve computational problems using a combination of original and existing algorithms.
9-12.AP.13
Create more generalized computational solutions using collections instead of repeatedly using simple variables.
9-12.AP.14
Justify the selection of specific control structures by identifying tradeoffs associated with implementation, readability, and performance.
9-12.AP.15
Iteratively design and develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
9-12.AP.16
Decompose problems into smaller subproblems through systematic analysis, using constructs such as procedures, modules, and/or classes.
9-12.AP.17
Create computational artifacts using modular design.
9-12.AP.18
Systematically design programs for broad audiences by incorporating feedback from users.
9-12.AP.19
Explain the limitations of licenses that restrict use of computational artifacts when using resources such as libraries.
  1. 2.6 Creative Credit & Copyright
9-12.AP.20
Iteratively evaluate and refine a computational artifact to enhance its performance, reliability, usability, and accessibility.
9-12.AP.21
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 3.1 Project: Public Service Announcement
9-12.AP.22
Document decisions made during the design process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
9-12.CS.1
Describe ways in which abstractions hide the underlying implementation details of computing systems to simplify user experiences.
  1. 7.7 Viewing a Webpage
  2. 14.13 Viewing Websites
9-12.CS.2
Compare levels of abstraction and interactions between application software, system software, and hardware.
  1. 7.7 Viewing a Webpage
  2. 14.13 Viewing Websites
9-12.CS.3
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
9-12.DA.10
Create data visualizations to help others better understand real-world phenomena.
9-12.DA.11
Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
9-12.DA.8
Translate between different representations of data abstractions of real-world phenomena, such as characters, numbers, and images.
9-12.DA.9
Describe ​​tradeoffs​ associated with​ ​how​ ​data elements​ ​are​ ​organized​​ and ​stored.
  1. 6.3 Databases
9-12.IC.23
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 7.8 Impact of the Internet
9-12.IC.24
Identify impacts of bias and equity deficit on design and implementation of computational artifacts and apply appropriate processes for evaluating issues of bias.
9-12.IC.25
Demonstrate ways a given algorithm applies to problems across disciplines.
9-12.IC.26
Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources.
  1. 7.8 Impact of the Internet
9-12.IC.27
Use collaboration tools and methods to increase connectivity with people of different cultures and careers.
  1. 3.1 Project: Public Service Announcement
9-12.IC.28
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 2.6 Creative Credit & Copyright
9-12.IC.29
Explain the privacy concerns related to the collection and generation of data through automated processes.
  1. 2.4 Privacy & Security
  2. 6.9 Common Security Problems
  3. 6.10 SQL Injection Overview
  4. 6.11 Types of SQLi and Prevention
  5. 6.12 Cross-site Scripting
  6. 7.10 Securing a Network
  7. 8.1 Project: Secure the Company's Network
9-12.IC.30
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 2.3 Internet Safety
9-12.NI.4
Describe issues that impact network functionality.
  1. 7.2 Internet Hardware and Sending Information
  2. 7.9 Network Attacks
  3. 7.10 Securing a Network
9-12.NI.5
Describe the design characteristics of the Internet.
  1. 7.1 Introduction to the Internet
  2. 7.2 Internet Hardware and Sending Information
  3. 7.3 Internet Addresses
  4. 7.4 Domain Name System (DNS)
  5. 7.6 Packets & Protocols
9-12.NI.6
Compare and contrast security measures to address various security threats.
  1. 2.4 Privacy & Security
  2. 6.10 SQL Injection Overview
  3. 6.11 Types of SQLi and Prevention
  4. 7.10 Securing a Network
  5. 8.1 Project: Secure the Company's Network
9-12.NI.7
Compare and contrast cryptographic techniques to model the secure transmission of information.
  1. 4.1 Cryptography, Cryptology, Cryptanalysis
  2. 4.4 Basic Crypto Systems: Caesar Cipher
  3. 4.5 Basic Crypto Systems: Cracking Caesar
  4. 4.6 Basic Crypto Systems: Vigenere Cipher
  5. 4.7 Advanced Cryptography
  6. 4.8 Hash Functions
  7. 4.9 Hash Function Development