Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Computer Programming I

36

Standards in this Framework

11

Standards Mapped

30%

Mapped to Course

Standard Lessons
130.309.C.1.a
employ effective reading and writing skills
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
130.309.C.1.b
employ effective verbal and nonverbal communication skills
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
130.309.C.1.c
solve problems and think critically
  1. 8.1 Project: Secure the Company's Network
130.309.C.1.d
demonstrate leadership skills and function effectively as a team member
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
130.309.C.1.e
demonstrate an understanding of legal and ethical responsibilities in relation to the field of IT
  1. 7.8 Impact of the Internet
130.309.C.1.f
demonstrate planning and time-management skills such as project management, including initiating, planning, executing, monitoring and controlling, and closing a project
130.309.C.1.g
identify job opportunities and accompanying job duties and tasks
  1. 2.7 Hacking Ethics
  2. 6.3 Databases
  3. 6.4 Clients and Servers
  4. 6.9 Common Security Problems
  5. 7.10 Securing a Network
130.309.C.2.a
define business ethics
130.309.C.2.b
distinguish between honest and dishonest business practices
130.309.C.2.c
examine copyright and licensing issues in the software industry
  1. 2.6 Creative Credit & Copyright
130.309.C.2.d
analyze the effects of unethical practices on a business
130.309.C.3.a
gather data to identify client and project requirements
  1. 8.1 Project: Secure the Company's Network
130.309.C.3.b
identify input and output requirements
130.309.C.3.c
identify system processing requirements
130.309.C.3.d
develop program requirements and specifications
130.309.C.4.a
define scope of work to meet client-based project needs
130.309.C.4.b
identify software development processes and issues
130.309.C.4.c
explain the software system life cycle approach
130.309.C.5.a
articulate the principles of system design such as procedural, object-oriented, and event-driven processes
130.309.C.5.b
perform a logical design using appropriate software tools
130.309.C.5.c
apply algorithmic and data structure concepts
130.309.C.5.d
identify constraints
130.309.C.5.e
identify modular design concepts
130.309.C.5.f
document the design specification using a defined procedure
130.309.C.6.g
differentiate among the concepts of data such as procedural, object-oriented, and event-driven representation
130.309.C.6.h
identify current programming languages and the environment in which each is used
130.309.C.6.i
produce procedural and object-oriented programs using structured coding with appropriate style and clarity of expression
130.309.C.6.j
demonstrate skill in program testing
130.309.C.6.k
compare computed results with anticipated results to determine the reasonableness of the solutions
130.309.C.6.l
troubleshoot technological problems
130.309.C.6.m
explain the software quality assurance process
130.309.C.6.n
follow established quality assurance procedures for testing, identifying problems, and tracking resolutions
130.309.C.7.a
identify risks to information systems facilities, data communications systems, and applications
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 6.9 Common Security Problems
  4. 6.11 Types of SQLi and Prevention
  5. 6.12 Cross-site Scripting
  6. 7.9 Network Attacks
  7. 7.10 Securing a Network
130.309.C.7.b
comply with federal and state legislation pertaining to computer crime, fraud, and abuse
  1. 2.7 Hacking Ethics
130.309.C.7.c
identify and select controls for information systems facilities, data communications, and applications appropriate to specific risks
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 6.9 Common Security Problems
  4. 6.11 Types of SQLi and Prevention
  5. 6.12 Cross-site Scripting
  6. 7.9 Network Attacks
  7. 7.10 Securing a Network
130.309.C.7.d
apply procedures used to recover from situations such as system failure and computer virus