Please enable JavaScript to use CodeHS

Illinois 9-10 Framework


Standard Description
9-10.CS.01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects. Lessons
9-10.CS.02 Compare levels of abstraction and interactions between application software, system software, and hardware layers. Lessons
9-10.CS.03 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors. Lessons
9-10.NI.04 Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing. Lessons
9-10.NI.05 Give examples to illustrate how sensitive data can be affected by malware and other attacks. Lessons
9-10.NI.06 Compare various security measures, considering tradeoffs between the usability and security of a computing system. Lessons
9-10.NI.07 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. Lessons
9-10.NI.08 Explain tradeoffs when selecting and implementing cybersecurity recommendations. Lessons
9-10.DA.09 Translate between different bit representations of real-world phenomena, such as characters, numbers, and images. Lessons
9-10.DA.10 Evaluate the tradeoffs in how data elements are organized and stored. Lessons
9-10.DA.11 Create interactive data visualizations using software tools to help others better understand real-world phenomena. Lessons
9-10.DA.12 Create computational models that represent the relationships among different elements of data collected from a phenomenon or process. Lessons
9-10.AP.13 Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests. Lessons
9-10.AP.14 Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables. Lessons
9-10.AP.15 Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made. Lessons
9-10.AP.16 Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions. Lessons
9-10.AP.17 Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects. Lessons
9-10.AP.18 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs. Lessons
9-10.AP.19 Systematically design and develop programs for broad audiences by incorporating feedback from users. Lessons
9-10.AP.20 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. Lessons
9-10.AP.21 Evaluate and refine computational artifacts to make them more usable and accessible. Lessons
9-10.AP.22 Design and develop computational artifacts working in team roles using collaborative tools. Lessons
9-10.AP.23 Document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs. Lessons
9-10.AP.24 Describe the characteristics and evaluate the impact of human computer interaction. Lessons
9-10.IC.25 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices. Lessons
9-10.IC.25b Evaluate the ways digital social interactions impact personal, ethical, social, economic, and cultural practices. Lessons
9-10.IC.26 Test and refine computational artifacts to reduce bias and equity deficits. Lessons
9-10.IC.27 Demonstrate ways a given algorithm applies to problems across disciplines. Lessons
9-10.IC.28 Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields. Lessons
9-10.IC.29 Explain the beneficial and harmful effects that intellectual property laws can have on innovation. Lessons
9-10.IC.30 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. Lessons
9-10.IC.31 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. Lessons
9-10.ET.A Explain that the field of emerging technologies will be evolving and rapidly growing. Lessons
9-10.ET.B Compare existing and emerging technologies, ideas, and concepts. Lessons
9-10.ET.C Describe how emerging technologies are influencing current events at a local and global scale. Lessons
9-10.ET.D Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate. Lessons
9-10.ET.E Create new or original work by applying emerging technologies. Lessons