Please enable JavaScript to use CodeHS

Standards Mapping

for Connecticut 3B

Clear selection Print / Download

28

Standards in this Framework

18

Standards Mapped

64%

Mapped to Course

Standard Lessons
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 6.1 Project: Classic Cipher Newscast
  6. 6.1 Project: Classic Cipher Newscast
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 5.4 Basic Crypto Systems: Cracking Caesar
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 6.1 Project: Classic Cipher Newscast
  4. 6.1 Project: Classic Cipher Newscast
3B-AP-12
Compare and contrast fundamental data structures and their uses.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
  3. 4.5 Arrays and Objects
  4. 22.2 Logical Operators
  5. 22.2 Logical Operators
  6. 22.3 Comparison Operators
  7. 22.3 Comparison Operators
  8. 22.4 If Statements
  9. 22.4 If Statements
  10. 22.5 For Loops in JavaScript
  11. 22.5 For Loops in JavaScript
  12. 22.6 General For Loops
  13. 22.6 General For Loops
  14. 22.7 For Loop Practice
  15. 22.7 For Loop Practice
  16. 22.8 Random Numbers
  17. 22.8 Random Numbers
  18. 22.9 While Loops
  19. 22.9 While Loops
  20. 22.10 Loop and a Half
  21. 22.10 Loop and a Half
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 6.1 Project: Classic Cipher Newscast
  6. 6.1 Project: Classic Cipher Newscast
  7. 21.1 Challenge Problems
  8. 21.1 Challenge Problems
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 21.1 Challenge Problems
  2. 21.1 Challenge Problems
  3. 22.1 Booleans
  4. 22.1 Booleans
  5. 22.2 Logical Operators
  6. 22.2 Logical Operators
  7. 22.3 Comparison Operators
  8. 22.3 Comparison Operators
  9. 22.4 If Statements
  10. 22.4 If Statements
  11. 22.5 For Loops in JavaScript
  12. 22.5 For Loops in JavaScript
  13. 22.6 General For Loops
  14. 22.6 General For Loops
  15. 22.7 For Loop Practice
  16. 22.7 For Loop Practice
  17. 22.8 Random Numbers
  18. 22.8 Random Numbers
  19. 22.9 While Loops
  20. 22.9 While Loops
  21. 22.10 Loop and a Half
  22. 22.10 Loop and a Half
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
  1. 2.7 Hacking Ethics
  2. 2.7 Hacking Ethics
  3. 3.1 Project: Public Service Announcement
  4. 3.1 Project: Public Service Announcement
  5. 5.1 Cryptography, Cryptology, Cryptanalysis
  6. 5.1 Cryptography, Cryptology, Cryptanalysis
  7. 5.2 History of Cryptography
  8. 5.2 History of Cryptography
  9. 6.1 Project: Classic Cipher Newscast
  10. 6.1 Project: Classic Cipher Newscast
  11. 7.6 Application Security
  12. 7.6 Application Security
  13. 7.6 Application Security
  14. 7.6 Application Security
  15. 7.7 Browser Configuration
  16. 7.8 System Administration
  17. 7.8 System Administration
  18. 8.1 Inside Web Apps
  19. 8.1 Inside Web Apps
  20. 8.2 Developer Tools
  21. 8.2 Developer Tools
  22. 8.9 Common Security Problems
  23. 8.9 Common Security Problems
  24. 8.10 SQL Injection Overview
  25. 8.10 SQL Injection Overview
  26. 8.11 Types of SQLi and Prevention
  27. 8.11 Types of SQLi and Prevention
  28. 9.1 Project: Security Assessment Report
  29. 9.1 Project: Security Assessment Report
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.5 Basic Crypto Systems: Vigenere Cipher
  3. 6.1 Project: Classic Cipher Newscast
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 4.1 Programming Concepts
3B-CS-01
Categorize the roles of operating system software.
  1. 7.1 Operating Systems
  2. 7.1 Operating Systems
  3. 7.2 Comparing Operating Systems
  4. 7.3 Compatibility
  5. 7.3 Compatibility
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 10.4 Internet Hardware and Sending Information
  2. 10.4 Internet Hardware and Sending Information
  3. 10.7 Routing
  4. 10.7 Routing
  5. 11.1 Internal Components
  6. 11.1 Internal Components
  7. 11.2 Peripheral Devices
  8. 11.2 Peripheral Devices
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 8.3 The Value of Data
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 8.7 Basic Querying in SQL
  2. 8.8 Filtering Queries in SQL
  3. 9.1 Project: Security Assessment Report
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 1.3 Impact of Cybersecurity
  2. 1.3 Impact of Cybersecurity
  3. 2.3 Internet Safety
  4. 2.3 Internet Safety
  5. 2.4 Privacy & Security
  6. 2.4 Privacy & Security
  7. 2.5 Information Literacy
  8. 2.5 Information Literacy
  9. 2.6 Creative Credit & Copyright
  10. 2.6 Creative Credit & Copyright
  11. 2.6 Creative Credit & Copyright
  12. 2.6 Creative Credit & Copyright
  13. 2.7 Hacking Ethics
  14. 2.7 Hacking Ethics
  15. 3.1 Project: Public Service Announcement
  16. 3.1 Project: Public Service Announcement
  17. 5.2 History of Cryptography
  18. 5.2 History of Cryptography
  19. 6.1 Project: Classic Cipher Newscast
  20. 6.1 Project: Classic Cipher Newscast
  21. 10.10 Creative Credit & Copyright
  22. 10.10 Creative Credit & Copyright
  23. 10.10 Creative Credit & Copyright
  24. 10.10 Creative Credit & Copyright
  25. 10.11 Impact of the Internet
  26. 10.11 Impact of the Internet
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 1.3 Impact of Cybersecurity
  2. 1.3 Impact of Cybersecurity
  3. 1.4 The CIA Triad
  4. 1.4 The CIA Triad
  5. 2.3 Internet Safety
  6. 2.3 Internet Safety
  7. 3.1 Project: Public Service Announcement
  8. 3.1 Project: Public Service Announcement
  9. 10.1 Introduction to the Internet
  10. 10.11 Impact of the Internet
  11. 10.11 Impact of the Internet
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 1.2 What is Cybersecurity?
  2. 1.2 What is Cybersecurity?
  3. 1.3 Impact of Cybersecurity
  4. 1.3 Impact of Cybersecurity
  5. 1.4 The CIA Triad
  6. 1.4 The CIA Triad
  7. 2.3 Internet Safety
  8. 2.3 Internet Safety
  9. 2.4 Privacy & Security
  10. 2.4 Privacy & Security
  11. 2.5 Information Literacy
  12. 2.5 Information Literacy
  13. 2.6 Creative Credit & Copyright
  14. 2.6 Creative Credit & Copyright
  15. 2.6 Creative Credit & Copyright
  16. 2.6 Creative Credit & Copyright
  17. 3.1 Project: Public Service Announcement
  18. 3.1 Project: Public Service Announcement
  19. 5.1 Cryptography, Cryptology, Cryptanalysis
  20. 5.1 Cryptography, Cryptology, Cryptanalysis
  21. 5.2 History of Cryptography
  22. 5.2 History of Cryptography
  23. 6.1 Project: Classic Cipher Newscast
  24. 6.1 Project: Classic Cipher Newscast
  25. 10.1 Introduction to the Internet
  26. 10.1 Introduction to the Internet
  27. 10.10 Creative Credit & Copyright
  28. 10.10 Creative Credit & Copyright
  29. 10.10 Creative Credit & Copyright
  30. 10.10 Creative Credit & Copyright
  31. 10.11 Impact of the Internet
  32. 10.11 Impact of the Internet
3B-IC-28
Debate laws and regulations that impact the development and use of software.
  1. 2.2 Cyberbullying
  2. 2.2 Cyberbullying
  3. 2.4 Privacy & Security
  4. 2.4 Privacy & Security
  5. 2.6 Creative Credit & Copyright
  6. 2.6 Creative Credit & Copyright
  7. 2.6 Creative Credit & Copyright
  8. 2.6 Creative Credit & Copyright
  9. 2.7 Hacking Ethics
  10. 2.7 Hacking Ethics
  11. 3.1 Project: Public Service Announcement
  12. 3.1 Project: Public Service Announcement
  13. 7.5 Software Licenses
  14. 7.5 Software Licenses
  15. 9.1 Project: Security Assessment Report
  16. 9.1 Project: Security Assessment Report
  17. 10.9 Viewing a Webpage
  18. 10.9 Viewing a Webpage
  19. 10.10 Creative Credit & Copyright
  20. 10.10 Creative Credit & Copyright
  21. 10.10 Creative Credit & Copyright
  22. 10.10 Creative Credit & Copyright
  23. 10.11 Impact of the Internet
  24. 10.11 Impact of the Internet
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 10.4 Internet Hardware and Sending Information
  2. 10.4 Internet Hardware and Sending Information
  3. 11.5 Network Options
  4. 11.5 Network Options
  5. 11.5 Network Options
  6. 11.5 Network Options
  7. 11.6 Network Communication
  8. 11.6 Network Communication
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.
  1. 1.4 The CIA Triad
  2. 1.4 The CIA Triad
  3. 2.1 Digital Footprint and Reputation
  4. 2.1 Digital Footprint and Reputation
  5. 2.4 Privacy & Security
  6. 2.4 Privacy & Security
  7. 2.7 Hacking Ethics
  8. 2.7 Hacking Ethics
  9. 3.1 Project: Public Service Announcement
  10. 3.1 Project: Public Service Announcement
  11. 5.2 History of Cryptography
  12. 5.2 History of Cryptography
  13. 6.1 Project: Classic Cipher Newscast
  14. 6.1 Project: Classic Cipher Newscast
  15. 8.1 Inside Web Apps
  16. 8.1 Inside Web Apps
  17. 8.2 Developer Tools
  18. 8.2 Developer Tools
  19. 8.9 Common Security Problems
  20. 8.9 Common Security Problems
  21. 8.11 Types of SQLi and Prevention
  22. 8.11 Types of SQLi and Prevention
  23. 9.1 Project: Security Assessment Report
  24. 9.1 Project: Security Assessment Report
  25. 10.8 Packets & Protocols
  26. 10.8 Packets & Protocols