Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 9-12 Foundational

34

Standards in this Framework

14

Standards Mapped

41%

Mapped to Course

Standard Lessons
CS.D.9-12.F.a
Identify different multifunctional computing devices and connection technologies, both virtual and physical, to describe their purpose.
  1. 3.1 Advanced Devices
  2. 3.4 Private Networks
CS.D.9-12.F.b
Develop and apply criteria to evaluate computing systems for a given purpose.
CS.D.9-12.F.c
Create an artifact to demonstrate the roles and interactions of computing systems embedded in everyday objects.
CS.HS.9-12.F.a
Compare and contrast interactions between application software, system software and hardware.
  1. 3.1 Advanced Devices
CS.T.9-12.F.a
Apply a systemic process to identify problems and take steps to correct them within an integrated computing system.
CS.T.9-12.F.b
Analyze an IT device to determine either what repairs are needed or how to build it.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
NI.N.9-12.F.a
Evaluate and select networking devices to establish scalable communications.
  1. 3.1 Advanced Devices
  2. 3.4 Private Networks
NI.N.9-12.F.b
Evaluate and select networking protocols to establish network communication.
  1. 3.3 Protocols and Standards
NI.N.9-12.F.c
Understand scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together.
  1. 3.1 Advanced Devices
NI.C.9-12.F.a
Examine and employ principles of cybersecurity.
  1. 1.6 Asymmetric Encryption
  2. 1.7 Digital Certificates
  3. 5.2 Malware Types and Prevention
  4. 5.5 Cross-site Scripting
  5. 5.6 Internal Threats
NI.C.9-12.F.b
Identify physical, social and digital security risks to address possible attacks.
  1. 3.2 Environmental Controls
  2. 5.2 Malware Types and Prevention
  3. 5.5 Cross-site Scripting
  4. 5.6 Internal Threats
  5. 8.2 Assessing Risks
DA.DCS.9-12.F.a
Analyze patterns in a real-world data store through hypothesis, testing and use of data tools to gain insight and knowledge.
DA.DCS.9-12.F.b
Investigate data storage systems to compare and contrast how data is stored and accessed.
  1. 7.4 Level 4: Data and Licenses
DA.VC.9-12.F.a
Analyze the benefits and limitations of data visualization or multisensory artifacts and tools to communicate which is most appropriate to solve a real-world problem.
DA.IM.9-12.F.a
Evaluate a model by creating a hypothesis, testing it and refining it to discover connections and trends in the data.
ATP.A.9-12.F.a
Define and use appropriate problem solving strategies and visual artifacts to create and refine a solution to a realworld problem.
  1. 4.2 Building a Knowledge Base
  2. 4.3 Star in a Video!
ATP.A.9-12.F.b
Define and implement an algorithm by decomposing problem requirements from a problem statement to solve a problem.
ATP.VDR.9-12.F.a
Identify types of variables and data and utilize them to create a computer program that stores data in appropriate ways.
ATP.CS.9-12.F.a
Define control structures and Boolean logic and use them to solve real-world scenarios.
ATP.CS.9-12.F.b
Use appropriate syntax to create and use a method.
ATP.CS.9-12.F.c
Use data scoping to isolate data.
ATP.M.9-12.F.a
Break down a solution into procedures using systematic analysis and design.
ATP.M.9-12.F.b
Create computational artifacts by systematically organizing, manipulating and/or processing data
ATP.PD.9-12.F.a
Investigate software development methodologies to select the appropriate one for a project to complete as a team.
ATP.PD.9-12.F.b
Compare test methodologies to evaluate why each is used and to determine their benefits and costs.
ATP.PD.9-12.F.c
Correctly use consistent naming conventions, version control and comments to demonstrate why these are important for future use, maintenance and reuse of code.
IC.Cu.9-12.F.a
Analyze new technology to predict realistic impacts on society.
IC.Cu.9-12.F.b
Explore other professions to understand how computing has and will impact them positively and negatively.
IC.SI.9-12.F.a
Evaluate tools to increase connectivity of people in different cultures and career fields.
IC.SI.9-12.F.b
Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users.
  1. 7.4 Level 4: Data and Licenses
IC.SLE.9-12.F.a
Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact.
  1. 8.2 Assessing Risks
  2. 8.3 Risk Response
IC.SLE.9-12.F.b
Analyze the concepts of usability and security to explain typical tradeoffs between them.
  1. 8.3 Risk Response
IC.SLE.9-12.F.c
Analyze the collection and generation of data through automated processes to explain the legal concerns that are not always evident to users.
  1. 7.4 Level 4: Data and Licenses
IC.SLE.9-12.F.d
Explain the beneficial and harmful effects of intellectual property laws to determine the impacts on innovation.