Please enable JavaScript to use CodeHS

Standards Mapping

for New York 9-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Create a simple digital model that makes predictions of outcomes.
  1. 4.5 Informal Code Analysis
  2. 5.8 Scope and Access
Collaboratively design and develop a program or computational artifact for a specific audience and create documentation outlining implementation features to inform collaborators and users.
Collect and evaluate data from multiple sources for use in a computational artifact.
  1. 20.2 Sentiment Value and Star Ratings
  2. 20.4 Create a Negative or Positive Review
  3. 22.4 Activity 4: Hiding and Revealing a Text Message
Refine and visualize complex data sets showing how to tell different stories with the same data set.
Implement a program using a combination of student-defined and third-party functions to organize the computation.
  1. 8.2 Traversing 2D Arrays
  2. 9.3 Overriding Methods
  3. 9.4 super Keyword
  4. 21.3 Activity 3: Putting it All Together
Modify a function or procedure in a program to perform its computation in a different way over the same inputs, while preserving the result of the overall program.
  1. 2.5 Calling a Void Method with Parameters
  2. 2.6 Calling a Non-void Method
  3. 4.5 Informal Code Analysis
  4. 9.3 Overriding Methods
Demonstrate how at least two classic algorithms work and analyze the trade-offs related to two or more algorithms for completing the same task.
  1. 7.5 Searching
  2. 7.6 Sorting
  3. 10.2 Recursive Searching
  4. 10.3 Recursive Sorting
Design or remix a program that utilizes a data structure to maintain changes to related pieces of data.
  1. 6.4 Developing Algorithms Using Arrays
  2. 7.4 Developing Algorithms using ArrayLists
  3. 8.1 2D Arrays
  4. 8.2 Traversing 2D Arrays
Develop a program that effectively uses control structures in order to create a computer program for practical intent, personal expression, or to address a societal issue.
  1. 3.2 if Statements and Control Flow
  2. 3.3 if-else Statements
  3. 3.4 else if Statements
Systematically test and refine programs using a range of test cases, based on anticipating common errors and user behavior.
  1. 1.5 User Input
  2. 5.8 Scope and Access
Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.
  1. 5.10 Ethical and Social Implications of Computing
  2. 7.7 Ethical Issues Around Data Collection
Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.
  1. 7.7 Ethical Issues Around Data Collection
Explain specific trade-offs when selecting and implementing security recommendations.
Evaluate applications of cryptographic methods.
Recommend multiple actions to take prior and in response to various types of digital security breaches.
Type proficiently on a keyboard.
  1. 1.1 Why Programming? Why Java?
Communicate and work collaboratively with others using digital tools to support individual learning and contribute to the learning of others.
Independently select advanced digital tools and resources to create, revise, and publish complex digital artifacts or collection of artifacts.
Transfer knowledge of technology in order to use new and emerging technologies on multiple platforms.
Actively manage digital presence and footprint to reflect an understanding of the permanence and potential consequences of actions in online spaces.
Design and implement strategies that support safety and security of digital information, personal identity, property, and physical and mental health when operating in the digital world.
Evaluate the impact of computing technologies on equity, access, and influence in a global society.
  1. 5.10 Ethical and Social Implications of Computing
Debate laws and regulations that impact the development and use of computing technologies and digital information.
  1. 5.10 Ethical and Social Implications of Computing
Debate issues of ethics related to real world computing technologies.
  1. 5.10 Ethical and Social Implications of Computing
Assess personal and societal tradeoffs related to computing technologies and data privacy.
  1. 7.7 Ethical Issues Around Data Collection
Describe ways that complex computer systems can be designed for inclusivity and to mitigate unintended consequences.
Create accessible computational artifacts that meet standard compliance requirements or otherwise meet the needs of users with disabilities.
Investigate the use of computer science in multiple fields.
Design a solution to a problem that utilizes embedded systems to automatically gather input from the environment.
Explain the levels of interaction existing between the application software, system software, and hardware of a computing system.
Develop and communicate multi-step troubleshooting strategies others can use to identify and fix problems with computing devices and their components.
Describe the components and design characteristics that allow data and information to be moved, stored and referenced over the Internet.
Describe how emerging technologies are impacting networks and how they are used.