Please enable JavaScript to use CodeHS

Standards Mapping

for Maryland 9-10

34

Standards in this Framework

34

Standards Mapped

100%

Mapped to Course

Standard Lessons
10.CS.D.01
Explain how abstractions hide the underlying implementation of computing systems embedded in everyday objects.
  1. 2.8 Abstraction
  2. 4.4 DNS
10.CS.HS.01
Explain and compare levels of abstraction between application software, system software, and hardware layers.
  1. 4.2 Internet Hardware
10.CS.T.01
Develop and evaluate guidelines and criteria that convey systematic troubleshooting strategies that can be used to identify/fix errors.
  1. 2.7 Commenting Your Code
  2. 2.16 How to Indent Your Code
10.NI.NCO.01
Evaluate the scalability and reliability of networks by identifying and describing the relationship between routers, switches, servers, topology, and addresses.
  1. 4.2 Internet Hardware
  2. 4.3 Internet Addresses
  3. 4.4 DNS
  4. 4.5 Routing
  5. 4.6 Packets and Protocols
10.NI.NCO.02
Describe the issues that impact network functionality (e.g. Bandwidth, load, delay, topology, TCP/IP and OSI Models).
  1. 4.6 Packets and Protocols
10.NI.C.01
Illustrate how sensitive data and critical infrastructure can be affected by malware and other attacks and recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  1. 1.1 What is Cybersecurity?
  2. 1.6 Privacy & Security
10.NI.C.02
Explain tradeoffs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government.
  1. 1.6 Privacy & Security
10.NI.C.03
Understand and identify the relationship between Confidentiality, Integrity, Availability (CIA) Triad and the security measures that address the balance between them as it pertains to data.
  1. 1.2 The CIA Triad
10.NI.C.04
Identify ethical concerns about individual privacy, intellectual property, entering systems without permission, and destroying data and demonstrate the ability to exercise proper judgement and best practices in a variety of different scenarios.
  1. 1.5 Internet Safety
  2. 1.6 Privacy & Security
  3. 1.10 Creative Credit & Copyright
  4. 1.11 Hacking Ethics
  5. 1.13 Digital Citizenship and Cybersecurity Quiz
10.NI.C.05
Recognize and prevent social engineering attacks. Differentiate between legitimate and fraudulent information.
  1. 1.6 Privacy & Security
10.DA.S.01
Translate, compare, and evaluate different bit representations of real-world phenomena (large data sets), such as characters, numbers, and images and how they are organized and stored.
  1. 5.6 Using RGB to Create Colors
10.DA.CVT.01
Use software tools to develop interactive d
  1. 7.8 Random Numbers
10.DA.IM.01
Design computational models that identify and represent the relationships among different elements of data collected from a phenomenon or process.
  1. 7.8 Random Numbers
10.AP.A.01
Develop prototypes that use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to solve computational problems by leveraging prior student knowledge and personal interest.
  1. 3.2 Challenge Problems
10.AP.A.02
Design and implement an algorithm to play a game against a human opponent or solve a problem.
  1. 3.2 Challenge Problems
  2. 6.1 Graphics Challenges
  3. 8.1 Control Structures Challenges
  4. 10.4 Project Prep and Development
10.AP.V.01
Identify common features in multiple lines of code and substitute a single segment that uses lists (arrays) to account for differences.
  1. 9.11 Intro to Lists/Arrays
  2. 9.12 Adding/Removing From an Array
  3. 9.13 Array Length and Looping Through Arrays
  4. 9.14 Iterating Over an Array
  5. 16.1 Indexing Into an Array
  6. 16.2 Finding an Element in a List
  7. 16.3 Removing an Element From an Array
10.AP.V.02
Utilize lists to simplify solutions, generalizing computational problems, instead of repeatedly utilizing simple variables.
  1. 9.11 Intro to Lists/Arrays
  2. 9.12 Adding/Removing From an Array
  3. 9.13 Array Length and Looping Through Arrays
  4. 9.14 Iterating Over an Array
  5. 16.1 Indexing Into an Array
  6. 16.2 Finding an Element in a List
  7. 16.3 Removing an Element From an Array
10.AP.C.01
Justify and explain the rationale behind the selection of specific control structures when tradeoffs involve implementation, readability, and program performance.
  1. 2.10 For Loops
  2. 2.11 If Statements
  3. 2.12 If/Else Statements
  4. 2.13 While Loops in Karel
  5. 2.14 Control Structures Example
  6. 3.2 Challenge Problems
  7. 7.4 If Statements
  8. 7.5 For Loops in JavaScript
  9. 7.6 General For Loops
  10. 7.7 For Loop Practice
  11. 7.9 While Loops
  12. 7.10 Loop and a Half
10.AP.C.02
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 9.6 Timers
  2. 9.8 Random Ghosts
  3. 9.9 Bouncing Ball
  4. 9.10 Mouse Events: Mouse Clicked
  5. 15.1 Mouse Events: Mouse Moved
  6. 15.2 Drawing Lines
  7. 15.3 Key Events
  8. 15.4 Crazy Ball Game
10.AP.M.01
Systematically analyze problems, using top down design, in order to break them down into smaller components, using procedures, modules, and/or objects to implement abstractions.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 3.2 Challenge Problems
10.AP.M.02
Create computational artifacts by using common structures to organize, manipulate, and process data.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 17.1 Intro to Objects/Maps
  3. 17.5 Intro to Sets
  4. 17.6 Intro to Grids
10.AP.PD.01
Systematically design and implement programs for broad audiences, solicit user feedback, and refine programs based on user feedback.
  1. 10.3 Test
  2. 10.4 Project Prep and Development
10.AP.PD.02
Identify and evaluate licenses that limit or restrict use of computational artifacts and consider implications on original work, especially when incorporating libraries and other resources.
  1. 1.10 Creative Credit & Copyright
10.AP.PD.03
Evaluate and refine computational artifacts to improve usability, accessibility, and efficiency.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 3.2 Challenge Problems
10.AP.PD.04
Design and develop computational artifacts while working collaboratively.
  1. 3.1 Collaborative Programming
  2. 10.4 Project Prep and Development
10.AP.PD.05
Represent the design elements and data flow (e.g., flowcharts, pseudocode, etc.) of the development of a complex program through the use of various visual aids and documentation techniques.
  1. 2.7 Commenting Your Code
10.IC.C.01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 1.3 Digital Footprint and Reputation
  2. 4.7 The Impact of the Internet
10.IC.C.02
Evaluate and refine computational artifacts to reduce bias and equity deficits.
  1. 10.3 Test
  2. 10.4 Project Prep and Development
  3. 11.1 Computer Science Careers
10.IC.C.03
Demonstrate and explain how an existing algorithm/computational Innovation applies to problems across disciplines.
  1. 4.7 The Impact of the Internet
10.IC.C.04
Demonstrate and explain how an existing algorithm applies to problems in society.
  1. 4.7 The Impact of the Internet
10.IC.SI.01
Demonstrate and explain how various methods of collaboration can increase diverse ideas and solutions.
  1. 3.1 Collaborative Programming
  2. 10.3 Test
  3. 10.4 Project Prep and Development
10.IC.SLE.01
Explain the positive and negative consequences that intellectual property laws can have on innovation.
  1. 1.10 Creative Credit & Copyright
10.IC.SLE.02
Explain the privacy concerns related to the collection, generation, and analysis of large-scaled data that may not be evident to users.
  1. 1.6 Privacy & Security
  2. 4.7 The Impact of the Internet
10.IC.SLE.03
Evaluate the social and economic implications of privacy in the context of safety, law, and ethics.
  1. 1.6 Privacy & Security