Please enable JavaScript to use CodeHS

Standards Mapping

for Tennessee High School


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
  1. 7.11 Intro to Lists/Arrays
  2. 7.12 Adding/Removing From an Array
  3. 7.13 Array Length and Looping Through Arrays
  4. 7.14 Iterating Over an Array
Systematically design and develop programs for broad audiences by incorporating feedback from users.
  1. 8.3 Test
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
  1. 8.2 Prototype
Use effective communication and accurate computer science terminology to explain problem solving when completing a task.
  1. 4.6 Top Down Design and Decomposition in Karel
  2. 4.7 Commenting Your Code
  3. 7.1 Functions and Parameters 1
  4. 7.2 Functions and Parameters 2
  5. 8.4 Project Prep and Development
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
  1. 3.1 What is Data Science?
  2. 3.3 Gathering Data
  3. 3.4 Visualizing and Interpreting Data
  4. 3.5 Data Collection & Limitations
Utilize data to answer a question using a variety of computing and data visualization methods.
  1. 3.4 Visualizing and Interpreting Data
  2. 3.5 Data Collection & Limitations
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 3.4 Visualizing and Interpreting Data
  2. 3.5 Data Collection & Limitations
Explain the tradeoffs when selecting and implementing cybersecurity recommendations.
  1. 2.2 The CIA Triad
Identify laws regarding the use of technology and their consequences and implications.
  1. 1.4 Creative Credit & Copyright
Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.
  1. 1.1 Digital Footprint and Reputation
Demonstrate how to apply techniques to mitigate effects of user tracking methods.
  1. 2.5 Web Tracking
Show an understanding of the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.
  1. 1.6 Terms of Service and Privacy Policies
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts
  1. 2.3 Security
Demonstrate a fundamental understanding of API (Application Programming Interface).
  1. 7.15 JavaScript vs Karel
Choose and apply an appropriate iterative design process to systematically test and refine a program to increase performance.
  1. 8.1 Intro to Design Thinking
  2. 8.2 Prototype
  3. 8.3 Test
  4. 8.4 Project Prep and Development
Develop a plan to manage and assign data values of different types (strings, numeric, character, integer, and date) to a variable
  1. 5.2 Variables
  2. 5.3 User Input
  3. 6.1 Booleans
Create and refine programs with Boolean conditionals to demonstrate the use of branches and logical operators.
  1. 4.11 If Statements
  2. 4.12 If/Else Statements
  3. 4.13 While Loops in Karel
  4. 4.14 Control Structures Example
  5. 6.1 Booleans
  6. 6.2 Logical Operators
  7. 6.3 Comparison Operators
  8. 6.4 If Statements
  9. 6.9 While Loops
  10. 6.10 Loop and a Half
Design and develop iterative programs that combine control structures, including nested loops and compound conditionals.
  1. 4.10 For Loops
  2. 4.11 If Statements
  3. 4.12 If/Else Statements
  4. 4.13 While Loops in Karel
  5. 4.14 Control Structures Example
  6. 6.4 If Statements
  7. 6.5 For Loops in JavaScript
  8. 6.9 While Loops
  9. 6.10 Loop and a Half
Create parameters to organize a program to make it easier to follow, test, and debug.
  1. 7.1 Functions and Parameters 1
  2. 7.2 Functions and Parameters 2
  3. 7.3 Functions and Parameters 3
  4. 7.4 Functions and Return Values 1
  5. 7.7 Random Circles
  6. 7.8 Random Ghosts
Incorporate existing code, media, and libraries into original programs, and give proper attribution.
  1. 5.5 Using Graphics in JavaScript
Debug (identify and fix) errors in an algorithm or program that includes sequences and simple and complex loops following a two-step debugging process.
  1. 4.10 For Loops
  2. 4.13 While Loops in Karel
  3. 4.17 Debugging Strategies
  4. 6.5 For Loops in JavaScript
  5. 6.9 While Loops
  6. 6.10 Loop and a Half
Discuss the ethical ramifications of hacking and its impact on society
  1. 2.4 Hacking Ethics
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users (Bots, Chatbots, Spiders or Crawlers, Web Scraping, keyloggers etc.).
  1. 1.6 Terms of Service and Privacy Policies
Explain the positive and negative consequences that intellectual property laws can have on innovation.
  1. 1.4 Creative Credit & Copyright
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  1. 8.4 Project Prep and Development
Research the impact of computing technology on possible education and career pathways.
  1. 1.7 Computer Science Careers
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 1.8 Future of Computing