Please enable JavaScript to use CodeHS

Standards Mapping

for Montana 9-12

57

Standards in this Framework

38

Standards Mapped

66%

Mapped to Course

Standard Lessons
CS.AP.9-12.1
create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests;
  1. 2.4 Functions in Karel
  2. 2.5 The Start Function
  3. 2.11 If Statements
  4. 2.12 If/Else Statements
  5. 2.13 While Loops in Karel
  6. 2.14 Control Structures Example
  7. 2.15 More Karel Examples and Testing
  8. 3.2 Challenge Problems
  9. 5.2 Variables
  10. 5.3 User Input
  11. 5.4 Basic Math in JavaScript
  12. 5.5 Using Graphics in JavaScript
  13. 6.1 Graphics Challenges
  14. 7.1 Booleans
  15. 7.2 Logical Operators
  16. 7.3 Comparison Operators
  17. 7.4 If Statements
  18. 7.5 For Loops in JavaScript
  19. 7.6 General For Loops
  20. 7.7 For Loop Practice
  21. 7.8 Random Numbers
  22. 7.9 While Loops
  23. 7.10 Loop and a Half
  24. 8.1 Control Structures Challenges
CS.AP.9-12.2
describe how artificial intelligence drives many software and physical systems;
CS.AP.9-12.3
implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem;
CS.AP.9-12.4
use and adapt classic algorithms to solve computational problems;
CS.AP.9-12.5
evaluate algorithms in terms of their efficiency, correctness, and clarity;
CS.AP.9-12.6
use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables;
  1. 9.11 Intro to Lists/Arrays
  2. 9.12 Adding/Removing From an Array
  3. 9.13 Array Length and Looping Through Arrays
  4. 9.14 Iterating Over an Array
CS.AP.9-12.7
compare and contrast fundamental data structures and their uses;
  1. 17.4 When Do I Use an Object?
CS.AP.9-12.8
justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made;
  1. 7.4 If Statements
  2. 7.5 For Loops in JavaScript
  3. 7.6 General For Loops
  4. 7.7 For Loop Practice
  5. 7.9 While Loops
  6. 7.10 Loop and a Half
  7. 8.1 Control Structures Challenges
CS.AP.9-12.9
design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions;
  1. 9.10 Mouse Events: Mouse Clicked
  2. 15.1 Mouse Events: Mouse Moved
  3. 15.3 Key Events
  4. 15.4 Crazy Ball Game
CS.AP.9-12.10
decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects;
  1. 2.5 The Start Function
  2. 2.6 Top Down Design and Decomposition in Karel
  3. 3.2 Challenge Problems
  4. 6.1 Graphics Challenges
  5. 7.5 For Loops in JavaScript
  6. 7.7 For Loop Practice
  7. 7.8 Random Numbers
  8. 7.9 While Loops
  9. 7.10 Loop and a Half
  10. 8.1 Control Structures Challenges
  11. 9.1 Functions and Parameters 1
  12. 9.2 Functions and Parameters 2
  13. 9.3 Functions and Parameters 3
  14. 9.4 Functions and Return Values 1
  15. 9.5 Functions and Return Values 2
  16. 9.6 Timers
  17. 9.7 Random Circles
  18. 9.8 Random Ghosts
  19. 9.9 Bouncing Ball
  20. 9.10 Mouse Events: Mouse Clicked
CS.AP.9-12.11
create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs;
  1. 2.4 Functions in Karel
  2. 2.5 The Start Function
  3. 2.6 Top Down Design and Decomposition in Karel
  4. 3.2 Challenge Problems
  5. 5.5 Using Graphics in JavaScript
  6. 6.1 Graphics Challenges
  7. 9.6 Timers
  8. 9.7 Random Circles
  9. 9.8 Random Ghosts
  10. 9.9 Bouncing Ball
  11. 9.10 Mouse Events: Mouse Clicked
  12. 9.12 Adding/Removing From an Array
  13. 9.13 Array Length and Looping Through Arrays
  14. 9.14 Iterating Over an Array
CS.AP.9-12.12
construct solutions to problems using student-created procedures, modules, or objects;
  1. 2.4 Functions in Karel
  2. 3.2 Challenge Problems
  3. 6.1 Graphics Challenges
  4. 8.1 Control Structures Challenges
  5. 9.6 Timers
  6. 9.7 Random Circles
  7. 9.8 Random Ghosts
  8. 9.9 Bouncing Ball
  9. 9.10 Mouse Events: Mouse Clicked
CS.AP.9-12.13
analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution;
  1. 3.2 Challenge Problems
CS.AP.9-12.14
demonstrate code reuse by creating programming solutions using libraries and application programming interfaces;
CS.AP.9-12.15
systematically design and develop programs for broad audiences by incorporating feedback from users;
  1. 10.1 Intro to Design Thinking
  2. 10.2 Prototype
  3. 10.3 Test
CS.AP.9-12.16
evaluate and refine computational artifacts to make them more usable and accessible;
  1. 10.1 Intro to Design Thinking
  2. 10.2 Prototype
  3. 10.3 Test
CS.AP.9-12.17
design and develop computational artifacts working in team roles using collaborative tools;
  1. 3.1 Collaborative Programming
CS.AP.9-12.18
document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs;
  1. 2.7 Commenting Your Code
  2. 10.4 Project Prep and Development
CS.AP.9-12.19
plan and develop programs for broad audiences using a software life cycle process;
CS.AP.9-12.20
explain security issues that might lead to compromised computer programs;
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.6 Privacy & Security
CS.AP.9-12.21
develop programs for multiple computing platforms;
CS.AP.9-12.22
use version control systems, integrated development environments, and collaborative tools and practices in a group software project;
  1. 3.1 Collaborative Programming
CS.AP.9-12.23
develop and use a series of test cases to verify that a program performs according to its design specifications;
  1. 2.11 If Statements
  2. 2.12 If/Else Statements
  3. 2.13 While Loops in Karel
  4. 2.14 Control Structures Example
  5. 2.15 More Karel Examples and Testing
  6. 3.2 Challenge Problems
CS.AP.9-12.24
modify an existing program to add additional functionality and discuss intended and unintended implications;
CS.AP.9-12.25
evaluate key qualities of a program through a process such as a code review; and
CS.AP.9-12.26
compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
CS.CS.9-12.1
explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects;
  1. 2.8 Abstraction
  2. 2.9 Super Karel
CS.CS.9-12.2
compare levels of abstraction and interactions between application software, system software, and hardware layers;
  1. 2.8 Abstraction
CS.CS.9-12.3
categorize the roles of operating system software;
CS.CS.9-12.4
develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and
  1. 2.17 Debugging Strategies
CS.CS.9-12.5
illustrate ways computing systems implement logic, input, and output through hardware components.
CS.DA.9-12.1
create interactive data visualizations using software tools to help others better understand authentic phenomena;
  1. 1.8 Visualizing and Interpreting Data
CS.DA.9-12.2
use data analysis tools and techniques to identify patterns in data representing complex systems;
CS.DA.9-12.3
select data collection tools and techniques to generate data sets that support a claim or communicate information;
  1. 1.9 Data Collection & Limitations
CS.DA.9-12.4
translate between different bit representations of authentic phenomena, including characters, numbers, and images;
  1. 5.6 Using RGB to Create Colors
CS.DA.9-12.5
evaluate the tradeoffs in how data elements are organized and where data is stored;
  1. 1.6 Privacy & Security
CS.DA.9-12.6
create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
CS.DA.9-12.7
evaluate the ability of models and simulations to test and support the refinement of hypotheses.
CS.IC.9-12.1
evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices;
  1. 1.3 Digital Footprint and Reputation
  2. 1.4 Cyberbullying
  3. 1.10 Creative Credit & Copyright
  4. 1.11 Hacking Ethics
  5. 1.12 Project: Public Service Announcement
  6. 4.1 Intro to the Internet
  7. 4.7 The Impact of the Internet
CS.IC.9-12.2
evaluate the ways computing technologies impact American Indian communities in Montana;
CS.IC.9-12.3
test and refine computational artifacts to reduce bias and equity deficits;
CS.IC.9-12.4
demonstrate ways a given algorithm applies to problems across disciplines;
CS.IC.9-12.5
evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society;
  1. 4.7 The Impact of the Internet
CS.IC.9-12.6
evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities;
  1. 4.7 The Impact of the Internet
CS.IC.9-12.7
predict how computational innovations that have revolutionized aspects of our culture might evolve;
  1. 4.1 Intro to the Internet
  2. 4.7 The Impact of the Internet
CS.IC.9-12.8
use tools and methods to connect and work with others on a project including people in different cultures and career fields;
  1. 3.1 Collaborative Programming
CS.IC.9-12.9
explain the beneficial and harmful effects that intellectual property laws can have on innovation;
  1. 1.7 Information Literacy
  2. 1.10 Creative Credit & Copyright
CS.IC.9-12.10
explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.3 Digital Footprint and Reputation
  4. 1.5 Internet Safety
  5. 1.6 Privacy & Security
CS.IC.9-12.11
evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and
  1. 1.3 Digital Footprint and Reputation
  2. 1.6 Privacy & Security
  3. 1.11 Hacking Ethics
CS.IC.9-12.12
debate laws and regulations that impact the development and use of software.
CS.NI.9-12.1
recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts;
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.3 Digital Footprint and Reputation
  4. 1.5 Internet Safety
  5. 1.6 Privacy & Security
CS.NI.9-12.2
explain tradeoffs when selecting and implementing cybersecurity recommendations;
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.3 Digital Footprint and Reputation
  4. 1.6 Privacy & Security
CS.NI.9-12.3
compare ways software developers protect devices and information from unauthorized access;
CS.NI.9-12.4
evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology;
  1. 4.2 Internet Hardware
  2. 4.3 Internet Addresses
  3. 4.4 DNS
  4. 4.5 Routing
  5. 4.6 Packets and Protocols
CS.NI.9-12.5
give examples to illustrate how sensitive data can be affected by malware and other attacks;
  1. 1.1 What is Cybersecurity?
CS.NI.9-12.6
compare various security measures, considering tradeoffs between the usability and security of a computing system; and
  1. 1.2 The CIA Triad
CS.NI.9-12.7
discuss the issues that impact functionality.
  1. 1.2 The CIA Triad