Please enable JavaScript to use CodeHS

Standards Mapping

for North Dakota 9-12

73

Standards in this Framework

58

Standards Mapped

79%

Mapped to Course

Standard Lessons
9.NI.1
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 10.1 Introduction to the Internet
  2. 11.3 Network Devices
  3. 11.5 Network Options
  4. 11.6 Network Communication
10.NI.1
Identify and define different network connection types (e.g., wifi, mobile data, ethernet).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
  3. 11.6 Network Communication
11.NI.1
Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
12.NI.1
Choose an appropriate network connection given a scenario or situation.
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
  3. 11.6 Network Communication
9.NI.2
Understand the implications of accessing publicly available Internet connections.
  1. 10.11 Impact of the Internet
  2. 11.5 Network Options
10.NI.2
Identify networkable devices.
  1. 11.3 Network Devices
11.NI.2
Understand the global impact of networkable devices.
  1. 10.11 Impact of the Internet
12.NI.2
Compare and contrast the benefits and security risks of networkable devices.
  1. 11.7 Network Management
9.HS.1
Compare and contrast appropriate device/hardware/software to complete a task.
  1. 7.4 Software and Applications
  2. 11.2 Peripheral Devices
9.HS.2
Define software and security patches/update.
  1. 7.4 Software and Applications
  2. 7.6 Application Security
10.HS.2
Recognize the importance of and effectively perform software and security patches/updates.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
11.HS.2
Identify and choose hardware and software to help protect a system.
  1. 7.4 Software and Applications
  2. 7.7 Browser Configuration
  3. 11.3 Network Devices
9.HS.3
Explain why a backup is necessary.
  1. 7.6 Application Security
  2. 11.4 Storage Options
10.HS.3
Identify important data or systems that need redundancy.
11.HS.3
Identify different options for redundancy (e.g., cloud storage, external, duplicate devices).
  1. 11.4 Storage Options
12.HS.3
Implement redundancy.
9.T.1
Describe basic hardware and software problems using appropriate and accurate terminology.
  1. 12.1 Methodology
  2. 12.2 Support Practice
10.T.1
Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
12.T.1
Implement systematic troubleshooting strategies to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
9.PSA.1
Identify, recognize, and use an algorithm to solve a complex problem across disciplines.
  1. 4.3 Looping
  2. 4.4 Branching
10.PSA.1
Create and test an algorithm to solve a complex problem across disciplines.
  1. 4.3 Looping
  2. 4.4 Branching
11.PSA.1
Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made.
12.PSA.1
Use and adapt common algorithms to solve computational problems.
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
9.DCA.1
Collect and analyze complex data.
10.DCA.1
Represent complex data in more than one way to support a claim.
11.DCA.1
Represent complex data in multiple ways to defend a student-generated claim.
12.DCA.1
Represent complex data using interactive data visualizations or computational models.
9.A.1
Plan and employ effective research strategies to locate information.
  1. 2.5 Information Literacy
10.A.1
Curate relevant information from digital resources using a variety of tools and methods.
  1. 2.5 Information Literacy
11.A.1
Devise new search strategies based on information gaps and new understanding.
12.A.1
Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions.
9.E.1
Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources.
  1. 2.5 Information Literacy
10.E.1
Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
  1. 2.5 Information Literacy
11.E.1
Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
  1. 2.5 Information Literacy
12.E.1
Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources.
  1. 2.5 Information Literacy
9.C.1
Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
10.C.1
Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication.
  1. 7.4 Software and Applications
11.C.1
Publish or present content that customizes the message and medium for their intended audiences to communicate their idea.
  1. 3.1 Project: Public Service Announcement
12.C.1
Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process.
  1. 9.1 Project: Security Assessment Report
  2. 12.1 Methodology
  3. 12.2 Support Practice
9.IP.1
Properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
10.IP.1
Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
11.IP.1
Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
12.IP.1
Debate laws and regulations that impact the development and use of software.
  1. 7.5 Software Licenses
9.IP.2
Cite sources in a standard format to ethically reference the intellectual property of others.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
9.IP.3
Engage in positive, safe, legal and ethical behavior when using technology.
  1. 2.7 Hacking Ethics
11.IP.3
Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
9.IC.1
Evaluate how technology has impacted the workforce positively and negatively.
  1. 10.11 Impact of the Internet
10.IC.1
Evaluate the social, personal, and economic implications technology has on society and the economy.
  1. 10.11 Impact of the Internet
11.IC.1
Explain how computing may change cultural aspects of society.
  1. 10.11 Impact of the Internet
12.IC.1
Predict how computing may impact the workplace and personal lives.
  1. 10.11 Impact of the Internet
9.SI.1
Identify how technology has affected our means of communication.
  1. 7.4 Software and Applications
  2. 10.11 Impact of the Internet
10.SI.1
Evaluate the impacts of technology on social interactions.
  1. 10.11 Impact of the Internet
11.SI.1
Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society
  1. 10.11 Impact of the Internet
12.SI.1
Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society.
  1. 10.11 Impact of the Internet
9.SE.1
Recognize the effects sharing information online can have on others' privacy.
  1. 2.4 Privacy & Security
10.SE.1
Implement best practices to secure personal information.
  1. 2.4 Privacy & Security
11.SE.1
Understand encryption and how it is used to protect data.
9.SE.2
Know how to modify account settings to protect privacy and security.
  1. 2.4 Privacy & Security
  2. 7.8 System Administration
10.SE.2
Recognize the importance of monitoring your private data.
  1. 2.1 Digital Footprint and Reputation
11.SE.2
Explain the privacy concerns related to the collection and generation of data through automated processes.
12.SE.2
Illustrate how sensitive data can be affected by malware and other attacks.
9.SE.3
Recognize that datacollection technology can be used to track navigation online.
  1. 2.1 Digital Footprint and Reputation
10.SE.3
Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors.
  1. 2.1 Digital Footprint and Reputation
9.SE.4
Describe ways to prevent identity theft.
10.SE.4
Identify if their private data has been altered and can react appropriately.
11.SE.4
Develop a plan to recover from an incident that was tied to unauthorized access.
9.RU.1
Apply cyberbullying prevention strategies.
  1. 2.2 Cyberbullying
9.RU.2
Apply safe and ethical behaviors to personal electronic communication and interaction.
  1. 2.1 Digital Footprint and Reputation
9.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
10.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
11.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
12.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
9.DI.1
Manage a digital identity and be aware of the permanence of actions in the digital world.
  1. 2.1 Digital Footprint and Reputation