Please enable JavaScript to use CodeHS

Standards Mapping

for Alaska 9-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 2.2 Computer Organization
  2. 6.4 Pixel Images
Explain the interactions between application software, system software, and hardware.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
Identify the interactions of an operating system between software and hardware.
  1. 2.3 Software
  2. 2.4 Hardware
Develop and apply criteria for systematic discovery of errors and strategies for correction in computing systems.
  1. 2.2 Computer Organization
Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks and network protocols (e.g., routers, switches, servers, IP, DNS).
  1. 7.2 Internet Hardware
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 7.2 Internet Hardware
Compare various security measures by evaluating tradeoffs between the usability and security of a computing system.
  1. 9.4 Privacy & Security
Illustrate how sensitive data can be affected by attacks.
  1. 9.4 Privacy & Security
Recommend security measures to address various scenarios based on the principles of information security
  1. 9.4 Privacy & Security
Explain tradeoffs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government.
Compare and refine ways in which software developers protect devices and information from unauthorized access.
Learn detection and prevention methods to respond to attacks on sensitive data. Develop a response plan that enables recovery from such attacks.
Translate and compare different bit representations of real-world phenomena, such as characters, numbers, and images.
  1. 6.2 Number Systems
  2. 6.3 Encoding Text with Binary
  3. 6.4 Pixel Images
  4. 6.5 Hexadecimal
  5. 6.6 Pixel Colors!
  6. 6.7 Image Manipulation
Review different database types.
Evaluate and explain the various types of databases, with their specific benefits and limitation.
Use tools and techniques to locate, collect and create visualizations of small and large-scale data sets (e.g., paper surveys, online data sets, etc.).
Use data analysis tools and techniques to identify patterns from complex real- world phenomena.
Generate data sets that support a claim or communicates information using a variety of data collection tools and analysis techniques
Use computational models such as data analysis, pattern recognition, and/or simulations to show the relationships between collected data elements.
Use models and simulations to help formulate, refine, and test scientific hypotheses.
Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 13.4 For Loops
  6. 13.16 If Statements
  7. 13.17 If/ Else Statements
  8. 13.18 While Loops
Describe how artificial intelligence drives many software and physical systems (e.g., autonomous robots, computer vision, pattern recognition, text analysis).
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Develop an artificial intelligence algorithm to play a game against a human opponent or solve a common problem.
Critically examine and adapt classic algorithms (e.g. selection sort, insertion sort, etc.).
Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency, correctness, and clarity.
Demonstrate the use of lists to simplify solutions and to generalize computation problems instead of repeatedly using simple variables.
Compare and contrast simple data structures and their uses (e.g., arrays, lists, stacks, queues, maps, trees, graphs, and databases).
Justify the selection of specific control structures when trade-offs involve implementation, readability, and program performance
  1. 1.13 Control Structures Example
Develop an event-based program that will solve a practical problem, or allow self-expression
Trace the execution of recursive algorithms, illustrating output and changes in values of named variables.
Using systematic analysis and design, break down a solution into basic elements such as procedures, functions, or methods.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
Create computational artifacts by using common structures to organize, manipulate and/or process data.
Construct solutions to problems using student-created components, such as functions, procedures, modules, and/or objects
  1. 1.4 Functions in Karel
  2. 1.16 Karel Challenges
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution
  1. 1.16 Karel Challenges
Create programming solutions using code reuse and applied technique with appropriate attribution (e.g., libraries, APIs, collaboration software, and versioning software).
  1. 1.8 Super Karel
Create software by analyzing a problem and/or process, developing a solution, testing outcomes, debug, documenting, and adapting the program for a variety of users.
Classify and define a variety of software licensing schemes and discuss the advantages and disadvantages of the different schemes in software development (e.g. open source, freeware, commercial).
  1. 2.3 Software
Evaluate and refine computational artifacts to make them more user- friendly, efficient and/or accessible.
Design and develop a computational artifact while working in a team
  1. 10.1 Project: Public Service Announcement
Using visual aids and documentation, illustrate the design elements and data flow of the development of a complex program (e.g. flowcharts, pseudocode, etc.).
  1. 1.7 Commenting Your Code
Compare multiple programming languages and discuss features that make them useful for solving problems and developing systems.
Using the software life cycle process, create software that will provide solutions for a variety of users.
Design software in a project team environment using Agile Development methods (e.g., versioning and collaboration systems).
Explain security issues that might lead to compromised computer programs.
  1. 9.4 Privacy & Security
Develop programs for multiple computing platforms.
Develop and use a series of test cases to verify that a program performs according to its design specifications.
Through peer review systematically check code for correctness, usability, readability, efficiency, portability, and scalability (e.g. code review).
Modify an existing program to add additional functionality and discuss intended and unintended implications with appropriate attribution.
Test and refine computational artifacts to reduce bias and equity deficits
Demonstrate how a given algorithm applies to problems across disciplines.
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Based on research, evaluate how computing has revolutionized an aspect of our culture and predict how it might evolve (e.g., education, healthcare, art/entertainment, and energy).
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Demonstrate how computing increases connectivity to people in various cultures
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Explain the beneficial and harmful effects that intellectual property laws can have on innovation
  1. 9.6 Creative Credit & Copyright
Explain the privacy concerns related to the collection and large scale analysis of information about individuals that may not be evident to users (e.g., how businesses, social media, and the government collects and uses data).
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
Evaluate the social and economics implications as related to privacy, data, property, information, and identity in the context of safety, law, or ethics.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Describe the beneficial and intrusive aspects of advancing and emerging technologies (e.g., artificial intelligent agents, IoT, robotics).
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Discuss diverse careers that are influenced by computer science and its availability to all regardless of background.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Debate laws and regulations that impact the development and use of software.
  1. 9.6 Creative Credit & Copyright
Identify the ethical and moral implications encountered in managing and curating knowledge (e.g., harvesting; information overload; knowledge management; reposting; sharing; summarizing).
  1. 9.5 Information Literacy
  2. 9.6 Creative Credit & Copyright
Explain how cutting-edge technology may affect the way business is conducted in the future (e.g., eCommerce, entrepreneurship, payment methods, business responsibilities).
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet