Please enable JavaScript to use CodeHS

Standards Mapping

for Tennessee High School


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
Systematically design and develop programs for broad audiences by incorporating feedback from users.
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
Use effective communication and accurate computer science terminology to explain problem solving when completing a task.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
  1. 10.1 Getting Started with Data
  2. 10.2 Visualizing and Interpreting Data
  3. 10.3 Data Collection & Limitations
Utilize data to answer a question using a variety of computing and data visualization methods.
  1. 10.1 Getting Started with Data
  2. 10.2 Visualizing and Interpreting Data
  3. 10.3 Data Collection & Limitations
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 10.1 Getting Started with Data
  2. 10.2 Visualizing and Interpreting Data
  3. 10.3 Data Collection & Limitations
Explain the tradeoffs when selecting and implementing cybersecurity recommendations.
  1. 7.9 Cybersecurity
  2. 9.3 The CIA Triad
Identify laws regarding the use of technology and their consequences and implications.
  1. 7.11 Creative Credit & Copyright
Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.
Demonstrate how to apply techniques to mitigate effects of user tracking methods.
Show an understanding of the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts
  1. 7.9 Cybersecurity
  2. 7.10 The Impact of the Internet
  3. 9.4 System Administration
  4. 11.3 Network Management
Demonstrate a fundamental understanding of API (Application Programming Interface).
Choose and apply an appropriate iterative design process to systematically test and refine a program to increase performance.
Develop a plan to manage and assign data values of different types (strings, numeric, character, integer, and date) to a variable
Create and refine programs with Boolean conditionals to demonstrate the use of branches and logical operators.
  1. 1.10 If Statements
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
Design and develop iterative programs that combine control structures, including nested loops and compound conditionals.
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
Create parameters to organize a program to make it easier to follow, test, and debug.
Incorporate existing code, media, and libraries into original programs, and give proper attribution.
Debug (identify and fix) errors in an algorithm or program that includes sequences and simple and complex loops following a two-step debugging process.
  1. 1.9 For Loops
  2. 1.12 While Loops in Karel
Discuss the ethical ramifications of hacking and its impact on society
  1. 9.2 Impact of Cybersecurity
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users (Bots, Chatbots, Spiders or Crawlers, Web Scraping, keyloggers etc.).
  1. 7.9 Cybersecurity
  2. 10.1 Getting Started with Data
Explain the positive and negative consequences that intellectual property laws can have on innovation.
  1. 7.11 Creative Credit & Copyright
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  1. 5.3 Planning Your Site
  2. 5.4 Project: Your First Website
Research the impact of computing technology on possible education and career pathways.
  1. 7.12 Careers and Ethics in the Internet Age
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 2.6 Future of Computing