Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado 9-12

114

Standards in this Framework

46

Standards Mapped

40%

Mapped to Course

Standard Lessons
CS.HS.1.1a
Identify and create different types of algorithms (sort, search, etc.).
CS.HS.1.1b
Predict the outcome of different types of algorithms.
  1. 13.17 If/ Else Statements
  2. 13.18 While Loops
  3. 13.19 Putting Together Control Structures
CS.HS.1.1c
Create or adapt algorithms to solve problems for multiple purposes (e.g., personal interests, client needs).
  1. 13.10 Top Down Design
  2. 13.19 Putting Together Control Structures
CS.HS.1.1d
Use an algorithm that involves mathematical operations and functions to solve problems.
  1. 13.17 If/ Else Statements
  2. 13.18 While Loops
  3. 13.19 Putting Together Control Structures
CS.HS.1.1e
Use an iterative approach to utilizing and/or developing an algorithm.
  1. 13.4 For Loops
  2. 13.14 Using i in For Loops
  3. 13.15 Extended Loop Control
  4. 13.18 While Loops
CS.HS.1.1f
Recognize problems that cannot be solved computationally.
CS.HS.1.1g
Identify and describe algorithms that exist within their personal lives.
  1. 13.4 For Loops
  2. 13.10 Top Down Design
  3. 13.17 If/ Else Statements
CS.HS.1.2a
Identify and compare different algorithms that can be used to solve the same problem.
  1. 13.4 For Loops
CS.HS.1.2b
Illustrate the flow of execution of an iterative algorithm (e.g., recursion).
  1. 13.4 For Loops
  2. 13.14 Using i in For Loops
  3. 13.15 Extended Loop Control
  4. 13.18 While Loops
CS.HS.1.2c
Explain the value of heuristic algorithms to model ways to solve problems.
CS.HS.1.2d
Adapt algorithms used in one problem to solve a related or different problem.
CS.HS.1.2e
Use multiple methods to represent an algorithm (e.g., diagram, programming language, unplugged).
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.14 More Karel Examples and Testing
CS.HS.1.3a
Describe pros and cons of the performance of algorithms for the same task.
  1. 13.4 For Loops
CS.HS.1.3b
Use an iterative approach to developing an algorithm.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.14 More Karel Examples and Testing
  3. 13.10 Top Down Design
CS.HS.1.3c
Test and troubleshoot so that algorithms produce reasonable results.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.18 While Loops
  3. 13.19 Putting Together Control Structures
CS.HS.1.4a
Demonstrate how the process of decomposition is iterative and used to solve problems.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
CS.HS.1.4b
Formulate possible solutions based on the decomposition of a problem.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
CS.HS.1.5a
Describe how abstraction is central to computational thinking.
CS.HS.1.5b
Identify and prioritize the most relevant parts of a problem while filtering out extraneous details.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
CS.HS.1.5c
Demonstrate different ways to represent key problem components.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.16 Karel Challenges
CS.HS.1.6a
Identify different types of data that are exchanged and produced by computers (e.g., protocols).
  1. 7.6 Packets and Protocols
CS.HS.1.6b
Represent data using multiple encoding schemes (e.g., RGB, Hex, HSB, ASCII, Unicode).
  1. 6.1 Intro to Digital Information
  2. 6.3 Encoding Text with Binary
  3. 6.4 Pixel Images
  4. 6.5 Hexadecimal
  5. 6.6 Pixel Colors!
  6. 6.7 Image Manipulation
CS.HS.1.6c
Evaluate the trade-offs for how data elements are organized and where data are stored (e.g., PNG/GIF, structured/unstructured).
CS.HS.1.6d
Compare and contrast various data structures/techniques for storing and processing data (e.g., arrays, lists, tables).
CS.HS.1.7a
Analyze computer programs to identify patterns within the program.
  1. 13.4 For Loops
  2. 13.10 Top Down Design
CS.HS.1.7b
Provide multiple versions of data visualization in order to deepen problem analysis.
CS.HS.1.7c
Interpret and analyze data to make informed decisions.
CS.HS.1.8a
Analyze computer output in different forms (e.g., plain text, CSV, graphs, images).
CS.HS.1.8b
Design visualizations using the appropriate tool(s) with the end user in mind.
CS.HS.1.8c
Provide multiple versions of data visualization in order to deepen problem analysis.
CS.HS.2.1a
Describe key protocols and underlying processes of internet-based services, (e.g., https) and discuss impact of technology change on communication protocols.
  1. 4.13 Viewing Websites
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
  6. 7.7 The Impact of the Internet
CS.HS.2.1b
Illustrate and describe the basic components and various network types and topologies (e.g., personal, local, metropolitan, and wide).
  1. 7.2 Internet Hardware
CS.HS.2.1c
Explain the difference between decimal, hexadecimal, octal and binary number formats and how they are used in computing environments.
  1. 6.2 Number Systems
  2. 6.3 Encoding Text with Binary
  3. 6.4 Pixel Images
  4. 6.5 Hexadecimal
  5. 6.6 Pixel Colors!
  6. 6.7 Image Manipulation
CS.HS.2.2a
Explain the difference between memory and disk storage, internal and external storage, Random Access Memory (RAM), flash, cloud.
  1. 2.2 Computer Organization
  2. 7.2 Internet Hardware
CS.HS.2.2b
List and explain the common working parts of a computing device.
  1. 2.2 Computer Organization
CS.HS.2.2c
Explain how to maintain safety when working on PCs, e.g., electromagnetic precautions.
  1. 2.2 Computer Organization
CS.HS.2.2d
Describe how computing devices are engineered for fault tolerance and reliability, and identify potential sources of weakness (e.g., redundant power supplies, RAID, SAN/NAS connections).
  1. 7.5 Routing
CS.HS.2.3a
Identify and differentiate between different kinds of software (e.g., operating systems vs. applications) and their purposes.
  1. 2.3 Software
CS.HS.2.3b
Explain what an operating system is, and why it is important for a computer or computing device (e.g., Linux, Windows, iOS).
  1. 2.3 Software
CS.HS.2.3c
Describe how software interacts with hardware to complete tasks.
  1. 2.3 Software
  2. 2.4 Hardware
CS.HS.2.4a
Explain the integration of hardware, software and network communications components to create a networked system.
  1. 7.2 Internet Hardware
CS.HS.2.4b
Summarize security approaches using a systems approach perspective
CS.HS.2.5a
Identify client’s problems/needs.
CS.HS.2.5b
Articulate design requirements back to client.
CS.HS.2.5c
Illustrate options for considerations and develop conceptual model.
CS.HS.2.5d
Perform system analysis based on client considerations.
CS.HS.2.6a
Identify different ways that systems might lose data or functionality.
CS.HS.2.6b
Describe elements of an effective backup system.
CS.HS.2.6c
Compare backup systems for computer users, or a network.
  1. 7.5 Routing
CS.HS.2.6d
List the various backup methodologies (e.g., full, differential), and why one would pick one over the other, or use all.
CS.HS.2.6e
Explain the ways an organization would continue to operate in light of a systems failure.
CS.HS.2.7a
Identify examples of threats to systems and data.
  1. 9.4 Privacy & Security
CS.HS.2.7b
Describe the process by which intruders gain entry into a production system (e.g., reconnaissance).
CS.HS.2.7c
Describe and compare methods to test/validate how well systems and data are protected.
  1. 9.4 Privacy & Security
CS.HS.2.7d
Investigate different career pathways relating to systems security.
  1. 15.3 Impact of Cybersecurity
CS.HS.3.1a
Analyze and apply a design methodology to identify constraints and requirements of an identified problem.
CS.HS.3.1b
Utilize tools and resources such as pseudocode, flowcharts, wireframes, etc., as part of the design process.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
CS.HS.3.1c
Determine and use graphical or text-based languages.
  1. 13.1 Intro to Python with Tracy the Turtle
CS.HS.3.1d
Understand and apply core programming concepts.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 13.4 For Loops
  5. 13.8 Functions
  6. 13.11 Variables
  7. 13.13 Parameters
  8. 13.16 If Statements
  9. 13.17 If/ Else Statements
  10. 13.18 While Loops
CS.HS.3.2a
Write code per selected design.
  1. 5.1 Project: Your First Website
  2. 13.10 Top Down Design
  3. 13.19 Putting Together Control Structures
CS.HS.3.2b
Create code comments to communicate to other developers and ensure documentation of code.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
CS.HS.3.2c
Use various troubleshooting and debugging techniques to improve code.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
CS.HS.3.2d
Create appropriate variables to store and retrieve data.
  1. 13.11 Variables
CS.HS.3.3a
Integrate collaborative strategies to improve programming outputs.
CS.HS.3.3b
Identify and analyze a variety of collaborative tools (e.g., commenting, development repositories) in order to determine the appropriateness for intended use.
  1. 1.7 Commenting Your Code
CS.HS.3.3c
Identify strategies such as peer reviews to test and refine artifacts in development.
CS.HS.3.3d
Determine when to use standard software tools like APIs, libraries, version control repositories, etc.
CS.HS.3.4a
Understand and apply principles of client-based design.
CS.HS.3.4b
Guide/advise clients on strategies and solutions best suited for their problem (i.e., type of platform).
CS.HS.3.4c
Construct effective methods for gathering feedback from client.
CS.HS.3.4d
Respond to feedback from clients to improve computing solutions.
CS.HS.3.4e
Create and share product support documentation for potential users.
CS.HS.3.4f
Articulate lessons learned as a result of the design and creation process.
  1. 5.1 Project: Your First Website
CS.HS.3.5a
Investigate and understand privacy, security and protection laws.
  1. 9.4 Privacy & Security
CS.HS.3.5b
Articulate the importance of securing personal data information on encrypted storage systems.
  1. 9.4 Privacy & Security
CS.HS.3.5c
Identify and analyze current events to ensure the safety, security and wellbeing of all potential clients and end users.
CS.HS.3.5d
Identify influential computing innovations, and identify the beneficial and harmful effects they have had, or could have, on society, economy and culture.
  1. 7.7 The Impact of the Internet
CS.HS.3.5e
Discuss and explain how diversity of design and issues of accessibility impact a wide-range of users.
CS.HS.3.5f
Demonstrate ways to improve the accessibility of computational technologies and artifacts.
CS.HS.3.6a
Describe how software licensing influences program development.
CS.HS.3.6b
Investigate and develop solutions that discourage online software piracy.
CS.HS.3.6c
Explore and integrate security measures such as encryption, authentication and verification strategies to secure developed computer programs.
CS.HS.3.6d
Research and abide by intellectual property laws and patents.
  1. 7.7 The Impact of the Internet
  2. 9.6 Creative Credit & Copyright
  3. 9.6 Creative Credit & Copyright
CS.HS.4.1a
Define confidentiality, integrity and availability in the context of cybersecurity, and share a basic example of each.
CS.HS.4.1b
Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why.
CS.HS.4.1c
Critically analyze case studies of cyber security incidents and identify where breaches in CIA have occurred.
CS.HS.4.1d
Research real-world examples of cyber security breaches and share their findings, focusing on how CIA principles were impacted.
CS.HS.4.2a
Compare and contrast applications based on their privacy policies and permissions, evaluating the impact on individuals and society.
CS.HS.4.2b
Synthesize understanding of privacy practices to inform peers on healthy vs harmful practices.
CS.HS.4.2h
Explain why trying every possible combination (a brute force attack) will always break encryption if given enough time.
CS.HS.4.2j
Evaluate strengths and weaknesses of an encryption method in context.
CS.HS.4.3a
Build a list of common threats students face and explain how an adversary may try to exploit those threats (adversarial thinking).
CS.HS.4.3b
Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why. (This covers “Demonstrate adversarial thinking for a given problem. example: attack trees”)
CS.HS.4.3d
Evaluate digital habits and practices to identify potential risks and predict how an adversary might seek to exploit vulnerabilities.
CS.HS.4.3e
Analyze the motives of threat actors (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)
CS.HS.4.3f
Explain the variety of ways in which a security vulnerability could be created and exploited (for example: system error, social engineering, or input by an adversary).
CS.HS.4.3g
Explain the difference between protecting against a random failure versus protecting against an intentional attack.
CS.HS.5.1a
Explain the evolution of AI, the scope and limitations of current AI and the future of AI.
CS.HS.5.1b
Describe the purpose of different AI tools.
CS.HS.5.1d
Distinguish between AI and general computer programming.
CS.HS.5.1e
Describe real-world applications of AI, such as personal assistants, recommendation systems, advertising systems, and autonomous vehicles.
CS.HS.5.1f
Examine the differences between narrow AI and general AI, and their implications.
CS.HS.5.2b
Describe how AI can create novel outcomes by identifying patterns in data from the domain of interest.
CS.HS.5.3b
Evaluate the results produced by an AI tool before using it.
CS.HS.5.3f
Recognize the purpose and suitability of AI tools for achieving specific outcomes.
CS.HS.5.4a
Identify arguments regarding the dilemmas created by advances in artificial intelligence.
CS.HS.5.4c
Describe the "Turing Test" and its implications for distinguishing human and artificial intelligences.
CS.HS.5.4d
Articulate arguments against "artificial intelligence" qualifying as "actual intelligence" and counterarguments that refute those specific arguments.
CS.HS.6.1a
a. Describe how active and passive social media use can lead to positive and negative feelings.
CS.HS.6.1b
5 b. Identify research trends related to the health impact of screen time.
CS.HS.6.1e
10 e. Define "digital reputation," and identify examples of social media posts that can have a positive or negative effect.
CS.HS.6.1f
12 f. Explain why you should ask permission before posting pictures or information about someone else.
CS.HS.6.1g
14 g. Identify strategies for protecting their privacy, including opting out of specific features and analyzing app or website privacy policies and terms of service.
CS.HS.6.1h
16 h. Define "misinformation" and explore the consequences of spreading misinformation online.