Please enable JavaScript to use CodeHS

Colorado 9-12 Framework

Standards

Standard Description
CS.HS.1.1a Identify and create different types of algorithms (sort, search, etc.). Lessons
CS.HS.1.1b Predict the outcome of different types of algorithms. Lessons
CS.HS.1.1c Create or adapt algorithms to solve problems for multiple purposes (e.g., personal interests, client needs). Lessons
CS.HS.1.1d Use an algorithm that involves mathematical operations and functions to solve problems. Lessons
CS.HS.1.1e Use an iterative approach to utilizing and/or developing an algorithm. Lessons
CS.HS.1.1f Recognize problems that cannot be solved computationally. Lessons
CS.HS.1.1g Identify and describe algorithms that exist within their personal lives. Lessons
CS.HS.1.2a Identify and compare different algorithms that can be used to solve the same problem. Lessons
CS.HS.1.2b Illustrate the flow of execution of an iterative algorithm (e.g., recursion). Lessons
CS.HS.1.2c Explain the value of heuristic algorithms to model ways to solve problems. Lessons
CS.HS.1.2d Adapt algorithms used in one problem to solve a related or different problem. Lessons
CS.HS.1.2e Use multiple methods to represent an algorithm (e.g., diagram, programming language, unplugged). Lessons
CS.HS.1.3a Describe pros and cons of the performance of algorithms for the same task. Lessons
CS.HS.1.3b Use an iterative approach to developing an algorithm. Lessons
CS.HS.1.3c Test and troubleshoot so that algorithms produce reasonable results. Lessons
CS.HS.1.4a Demonstrate how the process of decomposition is iterative and used to solve problems. Lessons
CS.HS.1.4b Formulate possible solutions based on the decomposition of a problem. Lessons
CS.HS.1.5a Describe how abstraction is central to computational thinking. Lessons
CS.HS.1.5b Identify and prioritize the most relevant parts of a problem while filtering out extraneous details. Lessons
CS.HS.1.5c Demonstrate different ways to represent key problem components. Lessons
CS.HS.1.6a Identify different types of data that are exchanged and produced by computers (e.g., protocols). Lessons
CS.HS.1.6b Represent data using multiple encoding schemes (e.g., RGB, Hex, HSB, ASCII, Unicode). Lessons
CS.HS.1.6c Evaluate the trade-offs for how data elements are organized and where data are stored (e.g., PNG/GIF, structured/unstructured). Lessons
CS.HS.1.6d Compare and contrast various data structures/techniques for storing and processing data (e.g., arrays, lists, tables). Lessons
CS.HS.1.7a Analyze computer programs to identify patterns within the program. Lessons
CS.HS.1.7b Provide multiple versions of data visualization in order to deepen problem analysis. Lessons
CS.HS.1.7c Interpret and analyze data to make informed decisions. Lessons
CS.HS.1.8a Analyze computer output in different forms (e.g., plain text, CSV, graphs, images). Lessons
CS.HS.1.8b Design visualizations using the appropriate tool(s) with the end user in mind. Lessons
CS.HS.1.8c Provide multiple versions of data visualization in order to deepen problem analysis. Lessons
CS.HS.2.1a Describe key protocols and underlying processes of internet-based services, (e.g., https) and discuss impact of technology change on communication protocols. Lessons
CS.HS.2.1b Illustrate and describe the basic components and various network types and topologies (e.g., personal, local, metropolitan, and wide). Lessons
CS.HS.2.1c Explain the difference between decimal, hexadecimal, octal and binary number formats and how they are used in computing environments. Lessons
CS.HS.2.2a Explain the difference between memory and disk storage, internal and external storage, Random Access Memory (RAM), flash, cloud. Lessons
CS.HS.2.2b List and explain the common working parts of a computing device. Lessons
CS.HS.2.2c Explain how to maintain safety when working on PCs, e.g., electromagnetic precautions. Lessons
CS.HS.2.2d Describe how computing devices are engineered for fault tolerance and reliability, and identify potential sources of weakness (e.g., redundant power supplies, RAID, SAN/NAS connections). Lessons
CS.HS.2.3a Identify and differentiate between different kinds of software (e.g., operating systems vs. applications) and their purposes. Lessons
CS.HS.2.3b Explain what an operating system is, and why it is important for a computer or computing device (e.g., Linux, Windows, iOS). Lessons
CS.HS.2.3c Describe how software interacts with hardware to complete tasks. Lessons
CS.HS.2.4a Explain the integration of hardware, software and network communications components to create a networked system. Lessons
CS.HS.2.4b Summarize security approaches using a systems approach perspective Lessons
CS.HS.2.5a Identify client’s problems/needs. Lessons
CS.HS.2.5b Articulate design requirements back to client. Lessons
CS.HS.2.5c Illustrate options for considerations and develop conceptual model. Lessons
CS.HS.2.5d Perform system analysis based on client considerations. Lessons
CS.HS.2.6a Identify different ways that systems might lose data or functionality. Lessons
CS.HS.2.6b Describe elements of an effective backup system. Lessons
CS.HS.2.6c Compare backup systems for computer users, or a network. Lessons
CS.HS.2.6d List the various backup methodologies (e.g., full, differential), and why one would pick one over the other, or use all. Lessons
CS.HS.2.6e Explain the ways an organization would continue to operate in light of a systems failure. Lessons
CS.HS.2.7a Identify examples of threats to systems and data. Lessons
CS.HS.2.7b Describe the process by which intruders gain entry into a production system (e.g., reconnaissance). Lessons
CS.HS.2.7c Describe and compare methods to test/validate how well systems and data are protected. Lessons
CS.HS.2.7d Investigate different career pathways relating to systems security. Lessons
CS.HS.3.1a Analyze and apply a design methodology to identify constraints and requirements of an identified problem. Lessons
CS.HS.3.1b Utilize tools and resources such as pseudocode, flowcharts, wireframes, etc., as part of the design process. Lessons
CS.HS.3.1c Determine and use graphical or text-based languages. Lessons
CS.HS.3.1d Understand and apply core programming concepts. Lessons
CS.HS.3.2a Write code per selected design. Lessons
CS.HS.3.2b Create code comments to communicate to other developers and ensure documentation of code. Lessons
CS.HS.3.2c Use various troubleshooting and debugging techniques to improve code. Lessons
CS.HS.3.2d Create appropriate variables to store and retrieve data. Lessons
CS.HS.3.3a Integrate collaborative strategies to improve programming outputs. Lessons
CS.HS.3.3b Identify and analyze a variety of collaborative tools (e.g., commenting, development repositories) in order to determine the appropriateness for intended use. Lessons
CS.HS.3.3c Identify strategies such as peer reviews to test and refine artifacts in development. Lessons
CS.HS.3.3d Determine when to use standard software tools like APIs, libraries, version control repositories, etc. Lessons
CS.HS.3.4a Understand and apply principles of client-based design. Lessons
CS.HS.3.4b Guide/advise clients on strategies and solutions best suited for their problem (i.e., type of platform). Lessons
CS.HS.3.4c Construct effective methods for gathering feedback from client. Lessons
CS.HS.3.4d Respond to feedback from clients to improve computing solutions. Lessons
CS.HS.3.4e Create and share product support documentation for potential users. Lessons
CS.HS.3.4f Articulate lessons learned as a result of the design and creation process. Lessons
CS.HS.3.5a Investigate and understand privacy, security and protection laws. Lessons
CS.HS.3.5b Articulate the importance of securing personal data information on encrypted storage systems. Lessons
CS.HS.3.5c Identify and analyze current events to ensure the safety, security and wellbeing of all potential clients and end users. Lessons
CS.HS.3.5d Identify influential computing innovations, and identify the beneficial and harmful effects they have had, or could have, on society, economy and culture. Lessons
CS.HS.3.5e Discuss and explain how diversity of design and issues of accessibility impact a wide-range of users. Lessons
CS.HS.3.5f Demonstrate ways to improve the accessibility of computational technologies and artifacts. Lessons
CS.HS.3.6a Describe how software licensing influences program development. Lessons
CS.HS.3.6b Investigate and develop solutions that discourage online software piracy. Lessons
CS.HS.3.6c Explore and integrate security measures such as encryption, authentication and verification strategies to secure developed computer programs. Lessons
CS.HS.3.6d Research and abide by intellectual property laws and patents. Lessons