Please enable JavaScript to use CodeHS

Standards Mapping

for Utah 11-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Identify types of security threats, and then compare and contrast measures that can be used to address, resolve, and/or prevent identified threats.
Compare and contrast cryptographic techniques to model the secure transmission of information (data).
Refine or create computational artifacts to better represent the relationships among different elements of data collected from factual sources or other processes.
Iteratively design and develop computational artifacts for practical, personal, or societal expression that implements an algorithm based on the result of an evaluation or user input.
  1. 1.18 While Loops
  2. 1.19 Putting Together Control Structures
  3. 11.1 Project: Guess the Word
  4. 12.1 Arduino Challenges
  5. 12.2 Explore a New Sensor
  6. 12.4 Final Project
  7. 15.1 Advanced Challenges with Tracy
Systematically design and create programs for broad audiences by incorporating feedback from users.
  1. 12.4 Final Project
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 12.1 Arduino Challenges
  2. 12.4 Final Project
Produce documentation to support the decisions made during the design and creation process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
  1. 12.1 Arduino Challenges
  2. 12.2 Explore a New Sensor
  3. 12.4 Final Project
  4. 15.1 Advanced Challenges with Tracy
Evaluate and discuss the ways computing impacts personal, ethical, social, economic, and cultural practices.
Identify impacts of bias and equity deficits on design and implementation of computational artifacts, while evaluating appropriate processes for identifying issues of bias.
Demonstrate computational thinking using algorithms to problem solving across multiple disciplines.