Please enable JavaScript to use CodeHS

Standards Mapping

for Alaska 9-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
Explain the interactions between application software, system software, and hardware.
Identify the interactions of an operating system between software and hardware.
Develop and apply criteria for systematic discovery of errors and strategies for correction in computing systems.
  1. 2.17 Debugging Strategies
Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks and network protocols (e.g., routers, switches, servers, IP, DNS).
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Compare various security measures by evaluating tradeoffs between the usability and security of a computing system.
  1. 1.6 Privacy & Security
Illustrate how sensitive data can be affected by attacks.
  1. 1.6 Privacy & Security
Recommend security measures to address various scenarios based on the principles of information security
  1. 1.6 Privacy & Security
Explain tradeoffs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government.
Compare and refine ways in which software developers protect devices and information from unauthorized access.
Learn detection and prevention methods to respond to attacks on sensitive data. Develop a response plan that enables recovery from such attacks.
Translate and compare different bit representations of real-world phenomena, such as characters, numbers, and images.
Review different database types.
Evaluate and explain the various types of databases, with their specific benefits and limitation.
Use tools and techniques to locate, collect and create visualizations of small and large-scale data sets (e.g., paper surveys, online data sets, etc.).
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
Use data analysis tools and techniques to identify patterns from complex real- world phenomena.
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
Generate data sets that support a claim or communicates information using a variety of data collection tools and analysis techniques
  1. 1.9 Data Collection & Limitations
Use computational models such as data analysis, pattern recognition, and/or simulations to show the relationships between collected data elements.
Use models and simulations to help formulate, refine, and test scientific hypotheses.
Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem.
  1. 7.5 For Loops in JavaScript
  2. 7.6 General For Loops
  3. 7.7 For Loop Practice
  4. 7.9 While Loops
Describe how artificial intelligence drives many software and physical systems (e.g., autonomous robots, computer vision, pattern recognition, text analysis).
Develop an artificial intelligence algorithm to play a game against a human opponent or solve a common problem.
  1. 8.1 Control Structures Challenges
Critically examine and adapt classic algorithms (e.g. selection sort, insertion sort, etc.).
  1. 16.2 Finding an Element in a List
Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency, correctness, and clarity.
  1. 16.2 Finding an Element in a List
Demonstrate the use of lists to simplify solutions and to generalize computation problems instead of repeatedly using simple variables.
  1. 9.11 Intro to Lists/Arrays
  2. 9.14 Iterating Over an Array
  3. 16.2 Finding an Element in a List
Compare and contrast simple data structures and their uses (e.g., arrays, lists, stacks, queues, maps, trees, graphs, and databases).
  1. 9.11 Intro to Lists/Arrays
  2. 17.1 Intro to Objects/Maps
  3. 17.5 Intro to Sets
  4. 17.6 Intro to Grids
Justify the selection of specific control structures when trade-offs involve implementation, readability, and program performance
  1. 2.14 Control Structures Example
Develop an event-based program that will solve a practical problem, or allow self-expression
  1. 9.10 Mouse Events: Mouse Clicked
  2. 15.1 Mouse Events: Mouse Moved
  3. 15.3 Key Events
Trace the execution of recursive algorithms, illustrating output and changes in values of named variables.
Using systematic analysis and design, break down a solution into basic elements such as procedures, functions, or methods.
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
  3. 9.3 Functions and Parameters 3
  4. 9.4 Functions and Return Values 1
  5. 9.5 Functions and Return Values 2
Create computational artifacts by using common structures to organize, manipulate and/or process data.
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
Construct solutions to problems using student-created components, such as functions, procedures, modules, and/or objects
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
  3. 9.3 Functions and Parameters 3
  4. 9.4 Functions and Return Values 1
  5. 9.5 Functions and Return Values 2
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution
Create programming solutions using code reuse and applied technique with appropriate attribution (e.g., libraries, APIs, collaboration software, and versioning software).
  1. 2.9 Super Karel
  2. 5.4 Basic Math in JavaScript
Create software by analyzing a problem and/or process, developing a solution, testing outcomes, debug, documenting, and adapting the program for a variety of users.
Classify and define a variety of software licensing schemes and discuss the advantages and disadvantages of the different schemes in software development (e.g. open source, freeware, commercial).
Evaluate and refine computational artifacts to make them more user- friendly, efficient and/or accessible.
Design and develop a computational artifact while working in a team
  1. 1.12 Project: Public Service Announcement
  2. 3.1 Collaborative Programming
Using visual aids and documentation, illustrate the design elements and data flow of the development of a complex program (e.g. flowcharts, pseudocode, etc.).
  1. 2.7 Commenting Your Code
Compare multiple programming languages and discuss features that make them useful for solving problems and developing systems.
Using the software life cycle process, create software that will provide solutions for a variety of users.
Design software in a project team environment using Agile Development methods (e.g., versioning and collaboration systems).
Explain security issues that might lead to compromised computer programs.
  1. 1.6 Privacy & Security
Develop programs for multiple computing platforms.
Develop and use a series of test cases to verify that a program performs according to its design specifications.
Through peer review systematically check code for correctness, usability, readability, efficiency, portability, and scalability (e.g. code review).
Modify an existing program to add additional functionality and discuss intended and unintended implications with appropriate attribution.
Test and refine computational artifacts to reduce bias and equity deficits
Demonstrate how a given algorithm applies to problems across disciplines.
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
Based on research, evaluate how computing has revolutionized an aspect of our culture and predict how it might evolve (e.g., education, healthcare, art/entertainment, and energy).
Demonstrate how computing increases connectivity to people in various cultures
Explain the beneficial and harmful effects that intellectual property laws can have on innovation
  1. 1.10 Creative Credit & Copyright
Explain the privacy concerns related to the collection and large scale analysis of information about individuals that may not be evident to users (e.g., how businesses, social media, and the government collects and uses data).
Evaluate the social and economics implications as related to privacy, data, property, information, and identity in the context of safety, law, or ethics.
Describe the beneficial and intrusive aspects of advancing and emerging technologies (e.g., artificial intelligent agents, IoT, robotics).
Discuss diverse careers that are influenced by computer science and its availability to all regardless of background.
  1. 1.11 Hacking Ethics
Debate laws and regulations that impact the development and use of software.
  1. 1.10 Creative Credit & Copyright
Identify the ethical and moral implications encountered in managing and curating knowledge (e.g., harvesting; information overload; knowledge management; reposting; sharing; summarizing).
  1. 1.7 Information Literacy
  2. 1.10 Creative Credit & Copyright
Explain how cutting-edge technology may affect the way business is conducted in the future (e.g., eCommerce, entrepreneurship, payment methods, business responsibilities).