Please enable JavaScript to use CodeHS

Standards Mapping

for Illinois 11-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Compare the characteristics and uses of traditional and emerging computing devices and systems.
  1. 8.1 Intro to Digital Information
  2. 11.1 Welcome to the Internet
  3. 13.1 Getting Started with Data
Categorize the roles of operating system software.
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 3.5 User Input
  2. 11.2 Internet Hardware
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 11.5 DNS and Routing
  2. 11.7 Sequential, Parallel & Distributed Computing
Compare ways software developers protect devices and information from unauthorized access.
  1. 8.10 Cryptography
  2. 11.8 Cybersecurity
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 13.1 Getting Started with Data
  2. 13.2 Visualizing and Interpreting Data
  3. 13.3 Data Collection & Limitations
  4. 13.4 Data Quiz
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 14.1 Present a Data-Driven Insight
Analyze the ways in which automated data collection is utilized in society.
  1. 13.3 Data Collection & Limitations
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. 7.8 Simulation
Describe how artificial intelligence drives many software and physical systems.
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
Use and adapt classic algorithms to solve computational problems.
  1. 1.17 Karel Algorithms
  2. 4.4 If Statements
  3. 4.6 For Loops in JavaScript
  4. 4.8 For Loop Practice
  5. 4.10 While Loops
  6. 5.8 Basic JavaScript and Graphics Challenges
  7. 7.2 Indexing Into an Array
  8. 7.3 Adding/Removing From an Array
  9. 7.4 Array Length and Looping Through Arrays
  10. 7.5 Iterating Over an Array
  11. 7.7 Removing an Element From an Array
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
Compare and contrast fundamental data structures and their uses.
  1. 7.1 Intro to Lists/Arrays
  2. 33.1 Intro to Objects/Maps
  3. 33.2 Basics of Objects
  4. 33.4 When Do I Use an Object?
  5. 33.5 Intro to Sets
  6. 33.6 Intro to Grids
  7. 33.9 Data Structures Challenges
Illustrate the flow of execution of a recursive algorithm.
Construct solutions to problems using student-created components, such as procedures, modules, or objects.
  1. 5.1 Functions and Parameters 1
  2. 5.2 Functions and Parameters 2
  3. 5.3 Functions and Parameters 3
  4. 5.4 Functions and Return Values 1
  5. 5.5 Functions and Return Values 2
  6. 5.6 Local Variables and Scope
  7. 33.1 Intro to Objects/Maps
  8. 33.2 Basics of Objects
  9. 33.3 Iterating Over an Object
  10. 33.4 When Do I Use an Object?
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 27.7 Crazy Ball Game
  3. 29.1 Conway's Game of Life
  4. 29.2 Connect Four
  5. 30.1 Visualizing Music
  6. 31.1 Tic Tac Toe
  7. 32.1 Game Design: Helicopter
  8. 33.9 Data Structures Challenges
  9. 36.1 Practice PT: The Shopping List
  10. 37.1 Practice PT: Testing 1, 2, 3 ...
Demonstrate code reuse by creating programming solutions using libraries and application programming interfaces (APIs).
  1. 3.7 Using Graphics in JavaScript
  2. 9.1 Practice PT: Steganography
  3. 10.1 Practice PT: Create an Image Filter!
  4. 30.1 Visualizing Music
Plan and develop programs for broad audiences using a software life cycle process.
Demonstrate conversion of source code into machine code using compliers or interpreters.
Explain security issues that might lead to compromised computer programs.
  1. 8.8 Data Compression
  2. 8.9 Lossy Compression
  3. 8.10 Cryptography
  4. 11.8 Cybersecurity
Develop programs for multiple computing platforms.
Use version control systems, integrated development environments, and collaborative tools and practices (code documentation) in a group software project.
Develop and use a series of test cases to verify that a program performs according to its design specifications.
Discuss social, economic, and ethical consequences of malfunctional software and software updates.
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
Evaluate key qualities of a program through a process such as a code review.
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 3.1 What is Code
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 11.9 The Impact of the Internet
  2. 12.1 The Effects of the Internet
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 11.9 The Impact of the Internet
  2. 12.1 The Effects of the Internet
Debate laws and regulations that impact the development and use of software.
  1. 11.8 Cybersecurity
  2. 11.10 Creative Credit & Copyright
  3. 13.3 Data Collection & Limitations
Explain that the field of emerging technologies will be evolving and rapidly growing.
  1. 8.10 Cryptography
  2. 11.1 Welcome to the Internet
  3. 11.8 Cybersecurity
Compare existing and emerging technologies, ideas, and concepts.
  1. 8.10 Cryptography
  2. 11.1 Welcome to the Internet
  3. 11.8 Cybersecurity
Describe how emerging technologies are influencing current events at a local and global scale.
  1. 8.10 Cryptography
  2. 11.9 The Impact of the Internet
  3. 12.1 The Effects of the Internet
  4. 15.1 The Impacts of Computing
Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate.
  1. 11.1 Welcome to the Internet
  2. 11.8 Cybersecurity
  3. 11.9 The Impact of the Internet
  4. 12.1 The Effects of the Internet
Create new or original work by applying emerging technologies.
  1. 8.10 Cryptography
  2. 11.8 Cybersecurity