Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina 9-12

123

Standards in this Framework

65

Standards Mapped

52%

Mapped to Course

Standard Lessons
HS1.CS.1.1
Analyze the impact that computing devices have in real-world settings (e.g., traffic lights, medical devices, facial recognition).
  1. 9.10 Impact of the Internet
HS2.CS.1.1
Investigate how a problem is systematically solved through the selection and integration of hardware and software components.
HS3.CS.1.1
Recommend modifications for existing computing devices and software to improve functionality for end users.
HS4.CS.1.1
Develop a solution to a given problem using appropriate hardware and software (e.g., sensor devices, Wi-Fi capabilities, specialized displays, runtime modules, operating systems, application programming interfaces (APIs)).
HS1.CS.1.2
Compare and contrast the elements of a computing system by examining hardware elements for their intended use (e.g., input-output (I/O) devices, random access memory (RAM), read only memory (ROM), storage devices, motherboards, and processors including the arithmetic logic unit (ALU), control unit, registers, cache memory, example implementations of some of these components using logic gates) (Virginia, 2017).
  1. 10.1 Internal Components
  2. 10.2 Peripheral Devices
HS2.CS.1.2
Analyze how various hardware and software layers provide simplifying abstractions (e.g., a redundant array of independent disks (RAID) controller hiding details of data storage on multiple disks, an operating system hiding details of virtual memory, the presentation layer of a network hiding details about encryption).
  1. 7.1 Operating Systems
  2. 9.2 Notational Systems
  3. 9.4 Internet Hardware and Sending Information
  4. 9.8 Packets & Protocols
HS3.CS.1.2
Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, specialized devices like global positioning systems (GPSs)).
HS4.CS.1.2
Cite evidence of how selecting appropriate hardware and software components enhances user interfaces to provide better solutions for real-world problems.
HS1.CS.1.3
Compare and contrast the strengths and weaknesses of various popular operating systems, (e.g., Windows, Windows Server, OS-X, Android, iOS, UNIX, Linux).
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
HS2.CS.1.3
Analyze the roles of operating system software components (e.g., memory management, data storage and retrieval, process management, access control) in a specific solution (CSTA, 2017).
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
HS3.CS.1.3
Investigate how the components of an operating system provide simplifying abstractions for a user or developer (e.g., the basic inputoutput system (BIOS), user interface, memory management, process management, file systems, devices, drivers).
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
  4. 7.9 Command Line Interface
HS4.CS.1.3
Defend the choice of an appropriate operating system based on the requirements of a given computer system or project.
  1. 7.2 Comparing Operating Systems
HS1.CS.2.1
Interpret various types of error messages from various sources (e.g., operating systems, applications, application programming interfaces (APIs)) to assist in solving common computer malfunctions.
HS2.CS.2.1
Research credible sources of information that can be used for complex troubleshooting strategies (e.g., modifying system settings, correcting connectivity problems).
  1. 11.1 Methodology
  2. 11.2 Support Practice
HS3.CS.2.1
Solve common computer malfunctions or describe the problem accurately, using technical vocabulary, so that others can solve it.
  1. 11.1 Methodology
  2. 11.2 Support Practice
HS4.CS.2.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors (CSTA, 2017).
  1. 11.1 Methodology
  2. 11.2 Support Practice
HS1.NI.1.1
Describe how hardware, software, and protocols work together for transmitting data across networks.
  1. 9.4 Internet Hardware and Sending Information
  2. 9.7 Routing
  3. 9.8 Packets & Protocols
HS2.NI.1.1
Compare and contrast common network protocols (e.g., Internet Protocol (IP), File Transfer Protocol (FTP), Transmission Control Protocol (TCP), Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol with Secure Sockets Layer (HTTPS), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), Telnet, Secure Shell Protocol (SSH)) (Arkansas, 2016).
  1. 9.8 Packets & Protocols
  2. 10.6 Network Communication
HS3.NI.1.1
Explain each layer of the Open Systems Interconnect (OSI) Model (Arkansas, 2016).
HS4.NI.1.1
Trace data through the Open Systems Interconnect (OSI) Model.
HS1.NI.1.2
Model the relationship between routers, switches, servers, topology, and addressing (CSTA, 2017).
  1. 9.7 Routing
  2. 9.8 Packets & Protocols
  3. 10.3 Network Devices
HS2.NI.1.2
Analyze the tradeoffs and hierarchical structures of various common network topologies (Arkansas, 2016).
  1. 9.4 Internet Hardware and Sending Information
  2. 9.7 Routing
HS3.NI.1.2
Design a practical, efficient, and secure network solution (e.g., small office network) (Arkansas, 2016).
  1. 10.5 Network Options
HS4.NI.1.2
Evaluate the scalability and reliability of a network (e.g., bandwidth, load, delay, topology) (CSTA, 2017).
  1. 9.4 Internet Hardware and Sending Information
  2. 10.3 Network Devices
  3. 10.5 Network Options
HS1.NI.2.1
Reflect on case studies or current events in which governments or organizations experienced data leaks or data loss as a result of cybersecurity attacks (CSTA, 2017).
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
HS2.NI.2.1
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-of-service attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017).
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.4 Privacy & Security
  4. 7.6 Application Security
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
HS3.NI.2.1
Research security measures (i.e., hardware, software, and practices that control access to data and systems) to combat a variety of cybersecurity vulnerabilities (CSTA, 2017).
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
  8. 10.6 Network Communication
  9. 10.7 Network Management
HS4.NI.2.1
Recommend security measures (i.e., hardware, software, and practices that control access to data and systems) to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts (CSTA, 2017).
  1. 7.7 Browser Configuration
  2. 7.8 System Administration
  3. 10.6 Network Communication
  4. 10.7 Network Management
  5. 14.1 Project: Security Assessment Report
HS1.NI.2.2
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
  1. 8.10 SQL Injection Overview
  2. 8.11 Types of SQLi and Prevention
HS2.NI.2.2
Compare and contrast ways software developers protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
HS3.NI.2.2
Evaluate various security measures, considering tradeoffs between the usability and security of a computing system. (e.g., a web filter that prevents access to many educational sites but keeps a campus’ network safe) (CSTA, 2017).
  1. 2.4 Privacy & Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 10.6 Network Communication
HS4.NI.2.2
Select and justify cybersecurity recommendations (i.e., hardware, software, and practices that control access to data and systems) appropriate for an intended audience and purpose (CSTA, 2017).
  1. 6.1 Project: Classic Cipher Newscast
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 10.6 Network Communication
HS1.DA.1.1
Describe the various data collection methods, data analysis tools, and data representation tools.
HS2.DA.1.1
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
HS3.DA.1.1
Explain how different collection methods and tools influence the amount and quality of the data that is observed and recorded.
HS4.DA.1.1
Justify the choice of a data collection method, data analysis tool, and data representation tool over alternate options.
HS1.DA.1.2
Describe the various data storage tools and data organization methods.
  1. 8.4 Databases
  2. 10.4 Storage Options
HS2.DA.1.2
Compare and contrast the various data storage tools and data organization methods.
  1. 8.4 Databases
  2. 8.7 Basic Querying in SQL
  3. 8.8 Filtering Queries in SQL
  4. 10.4 Storage Options
HS3.DA.1.2
Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity (e.g., local storage, portable storage, cloud storage).
  1. 8.4 Databases
  2. 8.5 Clients and Servers
  3. 10.4 Storage Options
HS4.DA.1.2
Evaluate the data storage needs of a computing solution (e.g., file compression).
HS1.DA.1.3
Distinguish between various methods of data representation (i.e., analog, digital, binary).
  1. 9.3 Data Representation
HS2.DA.1.3
Translate between various methods of data representation (i.e., analog, digital, ASCII, binary).
  1. 9.2 Notational Systems
  2. 9.3 Data Representation
HS1.DA.2.1
Describe the properties of a data set that could be used to explore a realworld phenomenon or support a claim.
HS2.DA.2.1
Compare and contrast data sets that could be used to explore a real-world phenomenon or support a claim.
HS3.DA.2.1
Create data sets that could be used to explore a realworld phenomenon or support a claim.
HS4.DA.2.1
Evaluate the use of large data sets to explore a realworld phenomenon or support a claim.
HS1.DA.2.2
Identify various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016).
HS2.DA.2.2
Compare and contrast various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016).
HS3.DA.2.2
Evaluate the limitations of a computational model and the accuracy of inferences.
HS4.DA.2.2
Create a computational model using large data sets, make inferences, and address the limitations of the model.
HS1.DA.3.1
Identify a data set that could be used to solve a real-world problem.
HS2.DA.3.1
Evaluate how the same data set can be visualized and reconstructed to support multiple sides of an issue.
HS3.DA.3.1
Construct a data visualization to solve a real-world problem using software tools or programming (e.g., generated scatter, bar, and line charts).
HS4.DA.3.1
Analyze patterns in a data visualization then select a collection tool to validate a claim or share information with a group of people.
HS1.DA.3.2
Organize collected data to communicate the solution to a real-world phenomenon and support a claim.
HS2.DA.3.2
Compare and contrast data visualizations for exploring real-world phenomenon or supporting a claim.
  1. 8.3 The Value of Data
HS3.DA.3.2
Evaluate possible computational models for data visualizations that aid in solving a variety of problems.
HS4.DA.3.2
Create a computational model for data visualization.
HS1.AP.1.1
Create flowcharts and/or pseudocode to express a problem or idea as an algorithm.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
HS2.AP.1.1
Create algorithms to solve computational problems that have an application in the real world (e.g., local community, church, civic organization, school, home life).
HS3.AP.1.1
Adapt predefined algorithms to solve computational problems.
HS4.AP.1.1
Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017).
  1. 21.1 Challenge Problems
  2. 22.10 Loop and a Half
HS1.AP.2.1
Trace the flow of execution of a program that uses a combination of control structures (e.g., conditionals, loops, event handlers, recursion).
  1. 21.1 Challenge Problems
HS2.AP.2.1
Design and iteratively develop programs that combine control structures (e.g., conditionals, loops, event handlers, recursion).
  1. 21.1 Challenge Problems
HS3.AP.2.1
Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., tradeoffs involving implementation, readability, and program performance).
  1. 21.1 Challenge Problems
HS1.AP.2.2
Trace the flow of execution of a program that uses a variety of programming constructs (e.g., procedures, modules, objects).
  1. 21.1 Challenge Problems
HS2.AP.2.2
Design a solution through systematic analysis using programming constructs (e.g., procedures, modules, objects).
  1. 21.1 Challenge Problems
HS3.AP.2.2
Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution.
  1. 21.1 Challenge Problems
HS1.AP.3.1
Decompose tasks into smaller, reusable parts to facilitate the design, implementation, and review of programs.
  1. 4.3 Looping
HS2.AP.3.1
Develop code to solve the smaller parts of a decomposed task that can be reused to solve similar problems (e.g., procedures, functions, objects).
  1. 4.3 Looping
HS3.AP.3.1
Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries).
  1. 21.1 Challenge Problems
HS4.AP.3.1
Justify the selection of modular parts in the creation of a complex solution.
  1. 21.1 Challenge Problems
HS1.AP.4.1
Plan and develop programs for a variety of audiences using a process that incorporates development, feedback, and revision.
HS2.AP.4.1
Plan and develop a program that addresses potential security issues.
HS3.AP.4.1
Plan and develop a program that is accessible across multiple computing platforms (e.g., iOS, Unix, Windows, web-based).
HS4.AP.4.1
Evaluate a program through a review process (e.g., code review, beta testing, pilot group).
HS1.AP.4.2
Seek and incorporate feedback to refine a solution (e.g., users, team members, code review, teachers).
HS2.AP.4.2
Systematically test programs using a range of test cases to meet design specifications (e.g., specific outcomes, functionality, user interface, error handling) (CSTA, 2017).
  1. 21.1 Challenge Problems
  2. 22.10 Loop and a Half
HS3.AP.4.2
Evaluate and refine programs to make them more usable, functional, and accessible.
  1. 21.1 Challenge Problems
HS4.AP.4.2
Implement version control to track program refinements.
HS1.AP.4.3
Recognize the variety of documentation methods available while developing a program (e.g., inline comments, procedure header, purposeful naming).
  1. 4.6 Organizational Techniques
  2. 19.2 Structure of an HTML Page
HS2.AP.4.3
Document programs in order to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
HS3.AP.4.3
Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator.
HS4.AP.4.3
Justify design decisions by documenting the design process of complex programs (e.g., developer journal, digital portfolio, presentation).
HS1.AP.4.4
Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons).
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
HS2.AP.4.4
Discuss the implications of using licensed resources in a developed solution.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
HS3.AP.4.4
Develop a systematic solution that incorporates licensed resources.
HS4.AP.4.4
Research the process for licensing student-created resources.
HS1.AP.5.1
Justify and use appropriate data types (i.e., primitive and non-primitive) in simple programs.
  1. 22.1 Booleans
HS2.AP.5.1
Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types and incorporate them in programs.
HS3.AP.5.1
Determine when external data structures (e.g., databases, flat files) are appropriate and incorporate them in programs.
HS4.AP.5.1
Justify how data structures and abstraction are used to manage program complexity.
HS1.IC.1.1
Research computing solutions to problems in different countries, considering the personal, ethical, social, economic, and cultural impact (e.g., the use of drones to deliver blood and medical supplies in countries in Africa, the use of Uber in India to address traffic congestion).
  1. 9.10 Impact of the Internet
HS2.IC.1.1
Compare and contrast the efficiency, feasibility, and ethical impacts of deploying the same computing solution in various countries.
  1. 9.10 Impact of the Internet
HS3.IC.1.1
Hypothesize the future impacts of computing across the world (e.g., personal, health, workforce, economy, education, culture, environment).
HS1.IC.1.2
Research traditional and non-traditional computer science careers.
  1. 1.3 Impact of Cybersecurity
  2. 8.4 Databases
  3. 8.9 Common Security Problems
HS2.IC.1.2
Identify a computer science career in a nontraditional computer science industry for each of the five computing disciplines (i.e., computer science, software engineering, information technology, information systems, computer engineering).
HS3.IC.1.2
Research how computing is used in non-traditional computer science careers (e.g., sensors on soldiers’ or firefighters’ uniforms, robots to detect and diffuse explosive devices).
HS1.IC.2.1
Select the most appropriate means of communication for given situations (e.g., personal versus professional communication, communication with teachers and employers).
HS2.IC.2.1
Discuss how social media and computing devices have positively and negatively impacted communication.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 7.4 Software and Applications
  4. 9.10 Impact of the Internet
HS3.IC.2.1
Justify proper and improper use of social media and computing devices (e.g., role-playing and example scenarios).
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
HS4.IC.2.1
Create rules of etiquette for proper use of social media and computing devices.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
HS1.IC.2.2
Discuss issues related to personal security (e.g., personal, financial, professional).
  1. 2.4 Privacy & Security
HS2.IC.2.2
Define and visually display students’ digital footprint.
  1. 2.1 Digital Footprint and Reputation
HS3.IC.2.2
Analyze the relationship between students’ digital footprint and personal security.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
HS4.IC.2.2
Recommend methods to protect digital information in different situations (e.g., traveling to other countries, two-factor authentication, encryption).
  1. 2.4 Privacy & Security
HS1.IC.2.3
Explain the implications of proper and improper use of social media (e.g., college admissions, employment, cyberbullying laws).
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
HS2.IC.2.3
Identify ethical and legal computing practices.
  1. 2.7 Hacking Ethics
HS3.IC.2.3
Distinguish among ethical, unethical, legal, and illegal computing practices (e.g., fair-use, illegal music/video downloads, sharing copyrighted pictures/videos, black-hat hacking, white-hat hacking).
  1. 2.6 Creative Credit & Copyright
  2. 2.7 Hacking Ethics
  3. 7.5 Software Licenses
HS4.IC.2.3
Investigate how computer use and digital privacy are governed across the globe (e.g., government regulations for computer use in the United State, Canada, China, North Korea, and Russia).
  1. 1.4 The CIA Triad
HS1.IC.3.1
Identify factors (e.g., net neutrality, government regulations, infrastructure, funding) that impact equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
  1. 9.9 Viewing a Webpage
  2. 9.10 Impact of the Internet
HS2.IC.3.1
Research current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
  1. 9.1 Introduction to the Internet
HS3.IC.3.1
Evaluate the effectiveness of current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
HS4.IC.3.1
Design a solution to improve equitable access to computing resources for underrepresented groups (e.g. classroom, school, neighborhood).
HS1.IC.3.2
Identify computer scientists from underrepresented groups and their specific contributions (e.g., African-American, Latino, women, disabled).
HS1.IC 3.3
Identify the advantages and disadvantages of diverse perspectives and backgrounds when solving computational problems.
HS2.IC 3.3
Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age).
HS3.IC 3.3
Recommend modifications to make a current computing solution more inclusive for all users.
HS1.IC.4.1
Discuss how Moore’s Law has impacted computing.
HS2.IC.4.1
Discuss the advantages and disadvantages of advancing and emerging technologies over time (e.g., the impacts of artificial intelligence, virtual reality, and biometrics on productivity, job loss, inventions, quality of life, and globalization).
  1. 9.10 Impact of the Internet
HS3.IC.4.1
Hypothesize problems that the next generation of computing will solve.
HS1.IC.4.2
Define and provide examples of big data (e.g., information collected from social media or smartphone use).
HS2.IC.4.2
Research how big data is used to solve computing problems.