Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina 9-12

123

Standards in this Framework

51

Standards Mapped

41%

Mapped to Course

Standard Lessons
HS1.CS.1.1
Analyze the impact that computing devices have in real-world settings (e.g., traffic lights, medical devices, facial recognition).
  1. 5.7 The Impact of the Internet
HS2.CS.1.1
Investigate how a problem is systematically solved through the selection and integration of hardware and software components.
HS3.CS.1.1
Recommend modifications for existing computing devices and software to improve functionality for end users.
HS4.CS.1.1
Develop a solution to a given problem using appropriate hardware and software (e.g., sensor devices, Wi-Fi capabilities, specialized displays, runtime modules, operating systems, application programming interfaces (APIs)).
HS1.CS.1.2
Compare and contrast the elements of a computing system by examining hardware elements for their intended use (e.g., input-output (I/O) devices, random access memory (RAM), read only memory (ROM), storage devices, motherboards, and processors including the arithmetic logic unit (ALU), control unit, registers, cache memory, example implementations of some of these components using logic gates) (Virginia, 2017).
HS2.CS.1.2
Analyze how various hardware and software layers provide simplifying abstractions (e.g., a redundant array of independent disks (RAID) controller hiding details of data storage on multiple disks, an operating system hiding details of virtual memory, the presentation layer of a network hiding details about encryption).
  1. 5.2 Internet Hardware
  2. 5.6 Packets and Protocols
HS3.CS.1.2
Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, specialized devices like global positioning systems (GPSs)).
HS4.CS.1.2
Cite evidence of how selecting appropriate hardware and software components enhances user interfaces to provide better solutions for real-world problems.
HS1.CS.1.3
Compare and contrast the strengths and weaknesses of various popular operating systems, (e.g., Windows, Windows Server, OS-X, Android, iOS, UNIX, Linux).
HS2.CS.1.3
Analyze the roles of operating system software components (e.g., memory management, data storage and retrieval, process management, access control) in a specific solution (CSTA, 2017).
HS3.CS.1.3
Investigate how the components of an operating system provide simplifying abstractions for a user or developer (e.g., the basic inputoutput system (BIOS), user interface, memory management, process management, file systems, devices, drivers).
HS4.CS.1.3
Defend the choice of an appropriate operating system based on the requirements of a given computer system or project.
HS1.CS.2.1
Interpret various types of error messages from various sources (e.g., operating systems, applications, application programming interfaces (APIs)) to assist in solving common computer malfunctions.
HS2.CS.2.1
Research credible sources of information that can be used for complex troubleshooting strategies (e.g., modifying system settings, correcting connectivity problems).
HS3.CS.2.1
Solve common computer malfunctions or describe the problem accurately, using technical vocabulary, so that others can solve it.
  1. 23.2 Building a Knowledge Base
  2. 23.3 Star in a Video!
HS4.CS.2.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors (CSTA, 2017).
HS1.NI.1.1
Describe how hardware, software, and protocols work together for transmitting data across networks.
  1. 5.5 Routing
  2. 5.6 Packets and Protocols
HS2.NI.1.1
Compare and contrast common network protocols (e.g., Internet Protocol (IP), File Transfer Protocol (FTP), Transmission Control Protocol (TCP), Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol with Secure Sockets Layer (HTTPS), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), Telnet, Secure Shell Protocol (SSH)) (Arkansas, 2016).
  1. 5.6 Packets and Protocols
HS3.NI.1.1
Explain each layer of the Open Systems Interconnect (OSI) Model (Arkansas, 2016).
HS4.NI.1.1
Trace data through the Open Systems Interconnect (OSI) Model.
HS1.NI.1.2
Model the relationship between routers, switches, servers, topology, and addressing (CSTA, 2017).
  1. 5.5 Routing
  2. 5.6 Packets and Protocols
HS2.NI.1.2
Analyze the tradeoffs and hierarchical structures of various common network topologies (Arkansas, 2016).
  1. 5.2 Internet Hardware
  2. 5.5 Routing
HS3.NI.1.2
Design a practical, efficient, and secure network solution (e.g., small office network) (Arkansas, 2016).
HS4.NI.1.2
Evaluate the scalability and reliability of a network (e.g., bandwidth, load, delay, topology) (CSTA, 2017).
HS1.NI.2.1
Reflect on case studies or current events in which governments or organizations experienced data leaks or data loss as a result of cybersecurity attacks (CSTA, 2017).
  1. 1.2 What is Cybersecurity?
HS2.NI.2.1
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-of-service attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017).
  1. 1.2 What is Cybersecurity?
  2. 1.7 Privacy & Security
HS3.NI.2.1
Research security measures (i.e., hardware, software, and practices that control access to data and systems) to combat a variety of cybersecurity vulnerabilities (CSTA, 2017).
  1. 1.7 Privacy & Security
HS4.NI.2.1
Recommend security measures (i.e., hardware, software, and practices that control access to data and systems) to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts (CSTA, 2017).
HS1.NI.2.2
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
HS2.NI.2.2
Compare and contrast ways software developers protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
HS3.NI.2.2
Evaluate various security measures, considering tradeoffs between the usability and security of a computing system. (e.g., a web filter that prevents access to many educational sites but keeps a campus’ network safe) (CSTA, 2017).
  1. 1.7 Privacy & Security
HS4.NI.2.2
Select and justify cybersecurity recommendations (i.e., hardware, software, and practices that control access to data and systems) appropriate for an intended audience and purpose (CSTA, 2017).
HS1.DA.1.1
Describe the various data collection methods, data analysis tools, and data representation tools.
HS2.DA.1.1
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
HS3.DA.1.1
Explain how different collection methods and tools influence the amount and quality of the data that is observed and recorded.
HS4.DA.1.1
Justify the choice of a data collection method, data analysis tool, and data representation tool over alternate options.
HS1.DA.1.2
Describe the various data storage tools and data organization methods.
HS2.DA.1.2
Compare and contrast the various data storage tools and data organization methods.
HS3.DA.1.2
Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity (e.g., local storage, portable storage, cloud storage).
HS4.DA.1.2
Evaluate the data storage needs of a computing solution (e.g., file compression).
HS1.DA.1.3
Distinguish between various methods of data representation (i.e., analog, digital, binary).
HS2.DA.1.3
Translate between various methods of data representation (i.e., analog, digital, ASCII, binary).
HS1.DA.2.1
Describe the properties of a data set that could be used to explore a realworld phenomenon or support a claim.
HS2.DA.2.1
Compare and contrast data sets that could be used to explore a real-world phenomenon or support a claim.
HS3.DA.2.1
Create data sets that could be used to explore a realworld phenomenon or support a claim.
HS4.DA.2.1
Evaluate the use of large data sets to explore a realworld phenomenon or support a claim.
HS1.DA.2.2
Identify various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016).
HS2.DA.2.2
Compare and contrast various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016).
HS3.DA.2.2
Evaluate the limitations of a computational model and the accuracy of inferences.
HS4.DA.2.2
Create a computational model using large data sets, make inferences, and address the limitations of the model.
HS1.DA.3.1
Identify a data set that could be used to solve a real-world problem.
HS2.DA.3.1
Evaluate how the same data set can be visualized and reconstructed to support multiple sides of an issue.
HS3.DA.3.1
Construct a data visualization to solve a real-world problem using software tools or programming (e.g., generated scatter, bar, and line charts).
HS4.DA.3.1
Analyze patterns in a data visualization then select a collection tool to validate a claim or share information with a group of people.
HS1.DA.3.2
Organize collected data to communicate the solution to a real-world phenomenon and support a claim.
HS2.DA.3.2
Compare and contrast data visualizations for exploring real-world phenomenon or supporting a claim.
HS3.DA.3.2
Evaluate possible computational models for data visualizations that aid in solving a variety of problems.
HS4.DA.3.2
Create a computational model for data visualization.
HS1.AP.1.1
Create flowcharts and/or pseudocode to express a problem or idea as an algorithm.
  1. 3.6 Top Down Design and Decomposition in Karel
HS2.AP.1.1
Create algorithms to solve computational problems that have an application in the real world (e.g., local community, church, civic organization, school, home life).
HS3.AP.1.1
Adapt predefined algorithms to solve computational problems.
HS4.AP.1.1
Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017).
  1. 4.2 Challenge Problems
  2. 10.10 Loop and a Half
  3. 12.1 Functions and Parameters 1
  4. 12.2 Functions and Parameters 2
  5. 12.3 Functions and Parameters 3
HS1.AP.2.1
Trace the flow of execution of a program that uses a combination of control structures (e.g., conditionals, loops, event handlers, recursion).
  1. 4.2 Challenge Problems
HS2.AP.2.1
Design and iteratively develop programs that combine control structures (e.g., conditionals, loops, event handlers, recursion).
  1. 4.2 Challenge Problems
HS3.AP.2.1
Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., tradeoffs involving implementation, readability, and program performance).
  1. 4.2 Challenge Problems
HS1.AP.2.2
Trace the flow of execution of a program that uses a variety of programming constructs (e.g., procedures, modules, objects).
  1. 4.2 Challenge Problems
  2. 12.1 Functions and Parameters 1
  3. 12.2 Functions and Parameters 2
  4. 12.3 Functions and Parameters 3
HS2.AP.2.2
Design a solution through systematic analysis using programming constructs (e.g., procedures, modules, objects).
  1. 4.2 Challenge Problems
HS3.AP.2.2
Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution.
  1. 4.2 Challenge Problems
HS1.AP.3.1
Decompose tasks into smaller, reusable parts to facilitate the design, implementation, and review of programs.
  1. 3.6 Top Down Design and Decomposition in Karel
HS2.AP.3.1
Develop code to solve the smaller parts of a decomposed task that can be reused to solve similar problems (e.g., procedures, functions, objects).
  1. 3.6 Top Down Design and Decomposition in Karel
HS3.AP.3.1
Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries).
  1. 4.2 Challenge Problems
HS4.AP.3.1
Justify the selection of modular parts in the creation of a complex solution.
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 4.2 Challenge Problems
HS1.AP.4.1
Plan and develop programs for a variety of audiences using a process that incorporates development, feedback, and revision.
HS2.AP.4.1
Plan and develop a program that addresses potential security issues.
HS3.AP.4.1
Plan and develop a program that is accessible across multiple computing platforms (e.g., iOS, Unix, Windows, web-based).
HS4.AP.4.1
Evaluate a program through a review process (e.g., code review, beta testing, pilot group).
HS1.AP.4.2
Seek and incorporate feedback to refine a solution (e.g., users, team members, code review, teachers).
HS2.AP.4.2
Systematically test programs using a range of test cases to meet design specifications (e.g., specific outcomes, functionality, user interface, error handling) (CSTA, 2017).
  1. 4.2 Challenge Problems
  2. 10.10 Loop and a Half
  3. 17.4 Crazy Ball Game
HS3.AP.4.2
Evaluate and refine programs to make them more usable, functional, and accessible.
  1. 4.2 Challenge Problems
HS4.AP.4.2
Implement version control to track program refinements.
HS1.AP.4.3
Recognize the variety of documentation methods available while developing a program (e.g., inline comments, procedure header, purposeful naming).
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.7 Commenting Your Code
  3. 6.2 Variables
  4. 8.2 Structure of an HTML Page
HS2.AP.4.3
Document programs in order to make them easier to follow, test, and debug.
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.7 Commenting Your Code
  3. 6.2 Variables
HS3.AP.4.3
Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator.
HS4.AP.4.3
Justify design decisions by documenting the design process of complex programs (e.g., developer journal, digital portfolio, presentation).
  1. 3.6 Top Down Design and Decomposition in Karel
HS1.AP.4.4
Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons).
  1. 1.11 Creative Credit & Copyright
HS2.AP.4.4
Discuss the implications of using licensed resources in a developed solution.
  1. 1.11 Creative Credit & Copyright
HS3.AP.4.4
Develop a systematic solution that incorporates licensed resources.
HS4.AP.4.4
Research the process for licensing student-created resources.
HS1.AP.5.1
Justify and use appropriate data types (i.e., primitive and non-primitive) in simple programs.
  1. 6.2 Variables
  2. 6.3 User Input
  3. 10.1 Booleans
HS2.AP.5.1
Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types and incorporate them in programs.
  1. 12.11 Intro to Lists/Arrays
  2. 19.9 Data Structures Challenges
HS3.AP.5.1
Determine when external data structures (e.g., databases, flat files) are appropriate and incorporate them in programs.
HS4.AP.5.1
Justify how data structures and abstraction are used to manage program complexity.
  1. 12.11 Intro to Lists/Arrays
  2. 19.6 Intro to Grids
  3. 19.9 Data Structures Challenges
HS1.IC.1.1
Research computing solutions to problems in different countries, considering the personal, ethical, social, economic, and cultural impact (e.g., the use of drones to deliver blood and medical supplies in countries in Africa, the use of Uber in India to address traffic congestion).
  1. 5.7 The Impact of the Internet
HS2.IC.1.1
Compare and contrast the efficiency, feasibility, and ethical impacts of deploying the same computing solution in various countries.
  1. 5.7 The Impact of the Internet
HS3.IC.1.1
Hypothesize the future impacts of computing across the world (e.g., personal, health, workforce, economy, education, culture, environment).
HS1.IC.1.2
Research traditional and non-traditional computer science careers.
  1. 23.1 Communication is Key!
HS2.IC.1.2
Identify a computer science career in a nontraditional computer science industry for each of the five computing disciplines (i.e., computer science, software engineering, information technology, information systems, computer engineering).
  1. 23.1 Communication is Key!
HS3.IC.1.2
Research how computing is used in non-traditional computer science careers (e.g., sensors on soldiers’ or firefighters’ uniforms, robots to detect and diffuse explosive devices).
  1. 23.1 Communication is Key!
HS1.IC.2.1
Select the most appropriate means of communication for given situations (e.g., personal versus professional communication, communication with teachers and employers).
HS2.IC.2.1
Discuss how social media and computing devices have positively and negatively impacted communication.
  1. 1.4 Digital Footprint and Reputation
  2. 1.5 Cyberbullying
  3. 5.7 The Impact of the Internet
HS3.IC.2.1
Justify proper and improper use of social media and computing devices (e.g., role-playing and example scenarios).
  1. 1.4 Digital Footprint and Reputation
  2. 1.5 Cyberbullying
  3. 1.6 Internet Safety
HS4.IC.2.1
Create rules of etiquette for proper use of social media and computing devices.
  1. 1.4 Digital Footprint and Reputation
  2. 1.5 Cyberbullying
  3. 1.6 Internet Safety
HS1.IC.2.2
Discuss issues related to personal security (e.g., personal, financial, professional).
  1. 1.7 Privacy & Security
HS2.IC.2.2
Define and visually display students’ digital footprint.
  1. 1.4 Digital Footprint and Reputation
HS3.IC.2.2
Analyze the relationship between students’ digital footprint and personal security.
  1. 1.4 Digital Footprint and Reputation
  2. 1.6 Internet Safety
HS4.IC.2.2
Recommend methods to protect digital information in different situations (e.g., traveling to other countries, two-factor authentication, encryption).
  1. 1.7 Privacy & Security
HS1.IC.2.3
Explain the implications of proper and improper use of social media (e.g., college admissions, employment, cyberbullying laws).
  1. 1.4 Digital Footprint and Reputation
  2. 1.5 Cyberbullying
HS2.IC.2.3
Identify ethical and legal computing practices.
  1. 1.12 Hacking Ethics
HS3.IC.2.3
Distinguish among ethical, unethical, legal, and illegal computing practices (e.g., fair-use, illegal music/video downloads, sharing copyrighted pictures/videos, black-hat hacking, white-hat hacking).
  1. 1.11 Creative Credit & Copyright
  2. 1.12 Hacking Ethics
HS4.IC.2.3
Investigate how computer use and digital privacy are governed across the globe (e.g., government regulations for computer use in the United State, Canada, China, North Korea, and Russia).
  1. 1.3 The CIA Triad
HS1.IC.3.1
Identify factors (e.g., net neutrality, government regulations, infrastructure, funding) that impact equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
  1. 5.7 The Impact of the Internet
HS2.IC.3.1
Research current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
HS3.IC.3.1
Evaluate the effectiveness of current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
HS4.IC.3.1
Design a solution to improve equitable access to computing resources for underrepresented groups (e.g. classroom, school, neighborhood).
HS1.IC.3.2
Identify computer scientists from underrepresented groups and their specific contributions (e.g., African-American, Latino, women, disabled).
HS1.IC 3.3
Identify the advantages and disadvantages of diverse perspectives and backgrounds when solving computational problems.
HS2.IC 3.3
Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age).
HS3.IC 3.3
Recommend modifications to make a current computing solution more inclusive for all users.
HS1.IC.4.1
Discuss how Moore’s Law has impacted computing.
HS2.IC.4.1
Discuss the advantages and disadvantages of advancing and emerging technologies over time (e.g., the impacts of artificial intelligence, virtual reality, and biometrics on productivity, job loss, inventions, quality of life, and globalization).
  1. 5.7 The Impact of the Internet
HS3.IC.4.1
Hypothesize problems that the next generation of computing will solve.
HS1.IC.4.2
Define and provide examples of big data (e.g., information collected from social media or smartphone use).
HS2.IC.4.2
Research how big data is used to solve computing problems.