Please enable JavaScript to use CodeHS

Standards Mapping

for Kentucky 9-12

51

Standards in this Framework

21

Standards Mapped

41%

Mapped to Course

Standard Lessons
H-NI-01
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, end devices, topology, and addressing.
H-NI-02
Give examples to illustrate how sensitive data can be affected by viruses, malware and other attacks.
H-NI-03
Recommend security measures to address various scenarios based on factors such as usability, efficiency, feasibility, and ethical impacts.
H-NI-04
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). *
H-NI-05
Compare ways software developers protect devices and information from unauthorized access. *
H-DA-01
Evaluate the tradeoffs in how data elements are organized and where data is stored.*
  1. 6.1 Array
  2. 7.1 ArrayList
  3. 8.1 2D Arrays
H-DA-02
Collect data using appropriate data collection tools and techniques to support a claim or to communicate information.
H-DA-03
Understand and design database structures to optimize search and retrieval.*
H-DA-04
Explain the privacy concerns related to the collection and generation of data.
  1. 7.7 Ethical Issues Around Data Collection
H-DA-05
Use data analysis tools (e.g. formulas and other software data / statistical tools) to process and transform the data to make it more useful and reliable.
H-DA-06
Use data analysis tools and techniques to identify patterns and analyze data represented in complex systems.
H-DA-07
Create computational models that represent the relationships among different elements of data.
H-DA-08
Create interactive data visualizations using software tools to help others better understand real-world phenomena.
H-DA-09
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.*
H-AP-01
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
H-AP-02
Use a development process in creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
H-AP-03
Use functions, data structures or objects to simplify solutions, generalizing computational problems instead of repeated use of simple variables.
  1. 2.4 Calling a Void Method
  2. 2.5 Calling a Void Method with Parameters
  3. 2.6 Calling a Non-void Method
  4. 6.1 Array
  5. 7.1 ArrayList
  6. 8.1 2D Arrays
H-AP-04
Design and iteratively develop event-driven computational artifacts for practical intent, personal expression, or to address a societal issue.
H-AP-05
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 5.4 Accessor Methods
  2. 5.5 Mutator Methods
  3. 5.6 Writing Methods
  4. 5.8 Scope and Access
H-AP-06
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance and explain the benefits and drawbacks of choices made.
  1. 3.2 if Statements and Control Flow
  2. 4.1 Iteration
  3. 4.2 For Loops
  4. 4.4 Nested Iteration
H-AP-07
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
H-AP-08
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 5.4 Accessor Methods
  2. 5.5 Mutator Methods
  3. 5.6 Writing Methods
  4. 9.2 Writing Constructors for Subclasses
H-AP-09
Evaluate and refine computational artifacts to make them more usable and accessible using systematic testing and debugging.
  1. 5.3 Documentation with Comments
  2. 5.8 Scope and Access
H-AP-10
Systematically design and develop programs for broad audiences by incorporating feedback from users.
H-AP-11
Design and develop computational artifacts working in team roles using collaborative tools.*
H-AP-12
Describe how artificial intelligence drives many software and physical systems.*
  1. 18.1 Magpie Lab
H-AP-13
Use and adapt classic algorithms to solve computational problems.*
  1. 7.5 Searching
  2. 7.6 Sorting
  3. 10.2 Recursive Searching
  4. 10.3 Recursive Sorting
H-AP-14
Evaluate algorithms in terms of their efficiency, correctness, and clarity.*
  1. 7.6 Sorting
  2. 10.2 Recursive Searching
  3. 10.3 Recursive Sorting
H-AP-15
Compare and contrast fundamental data structures and their uses.*
  1. 6.1 Array
  2. 7.1 ArrayList
  3. 7.2 ArrayList Methods
  4. 8.1 2D Arrays
H-AP-16
Illustrate the flow of execution of a recursive algorithm.*
  1. 10.1 Recursion
H-AP-17
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.*
  1. 5.4 Accessor Methods
  2. 5.5 Mutator Methods
  3. 5.6 Writing Methods
  4. 9.1 Inheritance
  5. 9.2 Writing Constructors for Subclasses
H-AP-18
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.*
H-AP-19
Select and employ an appropriate component or library to facilitate programming solutions.*
  1. 2.10 Using the Math Class
H-AP-20
Develop programs for multiple computing platforms.*
H-AP-21
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.*
H-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., introducing errors).*
  1. 4.5 Informal Code Analysis
  2. 6.4 Developing Algorithms Using Arrays
  3. 7.4 Developing Algorithms using ArrayLists
  4. 20.1 Introduction
  5. 20.2 Sentiment Value and Star Ratings
  6. 20.3 Autogenerated Review
  7. 20.4 Create a Negative or Positive Review
  8. 20.5 Open Ended Activity!
H-AP-23
Evaluate key qualities (including correctness, usability, readability, and efficiency) of a program.*
  1. 4.5 Informal Code Analysis
  2. 7.6 Sorting
H-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.*
H-IC-01
Reduce bias and equity deficits through the design of accessible computational artifacts.
H-IC-02
Evaluate and assess how computing impacts personal, ethical, social, economic, and cultural practices.
  1. 5.10 Ethical and Social Implications of Computing
H-IC-03
Research how computational innovations that have revolutionized aspects of our culture might have evolved from a need to solve a problem.
  1. 5.10 Ethical and Social Implications of Computing
H-IC-04
Explain the beneficial and harmful effects that laws governing data (intellectual property, privacy etc.) can have on innovation.
H-IC-05
Evaluate and design computational artifacts to maximize their benefit to society.*
  1. 5.10 Ethical and Social Implications of Computing
H-IC-06
Evaluate the impact of the digital divide (i.e. inequity of computing access, education and influence) on the development of local communities and society.
  1. 5.10 Ethical and Social Implications of Computing
H-IC-07
Demonstrate ways computational design (i.e. algorithms, abstractions and analysis) can apply to problems across disciplines.*
H-IC-08
Debate laws and regulations that impact the development and use of software and the protection of privacy.
H-CS-01
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
H-CS-02
Compare levels of abstraction and interactions between application software, system software and hardware layers.
H-CS-03
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 5.3 Documentation with Comments
H-CS-04
Categorize the roles of operating system software.
H-CS-05
Illustrate ways computing systems implement logic, input, and output through hardware components.*