Please enable JavaScript to use CodeHS

Standards Mapping

for California 9-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Design algorithms to solve computational problems using a combination of original and existing algorithms.
  1. 1.9 For Loops
Create more generalized computational solutions using collections instead of repeatedly using simple variables.
  1. 13.13 Parameters
Justify the selection of specific control structures by identifying tradeoffs associated with implementation, readability, and performance.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 13.18 While Loops
  8. 13.19 Putting Together Control Structures
Iteratively design and develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 13.19 Putting Together Control Structures
Decompose problems into smaller subproblems through systematic analysis, using constructs such as procedures, modules, and/or classes.
  1. 13.8 Functions
  2. 13.10 Top Down Design
Create computational artifacts using modular design.
Systematically design programs for broad audiences by incorporating feedback from users.
Explain the limitations of licenses that restrict use of computational artifacts when using resources such as libraries.
  1. 9.6 Creative Credit & Copyright
Iteratively evaluate and refine a computational artifact to enhance its performance, reliability, usability, and accessibility.
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 10.1 Project: Public Service Announcement
  2. 13.19 Putting Together Control Structures
Document decisions made during the design process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
Describe ways in which abstractions hide the underlying implementation details of computing systems to simplify user experiences.
  1. 1.8 Super Karel
  2. 4.13 Viewing Websites
Compare levels of abstraction and interactions between application software, system software, and hardware.
  1. 4.13 Viewing Websites
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
Create data visualizations to help others better understand real-world phenomena.
Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
Translate between different representations of data abstractions of real-world phenomena, such as characters, numbers, and images.
  1. 6.3 Encoding Text with Binary
  2. 6.5 Hexadecimal
Describe ​​tradeoffs​ associated with​ ​how​ ​data elements​ ​are​ ​organized​​ and ​stored.
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Identify impacts of bias and equity deficit on design and implementation of computational artifacts and apply appropriate processes for evaluating issues of bias.
Demonstrate ways a given algorithm applies to problems across disciplines.
Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Use collaboration tools and methods to increase connectivity with people of different cultures and careers.
  1. 10.1 Project: Public Service Announcement
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 9.6 Creative Credit & Copyright
Explain the privacy concerns related to the collection and generation of data through automated processes.
  1. 9.4 Privacy & Security
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 9.3 Internet Safety
Describe issues that impact network functionality.
Describe the design characteristics of the Internet.
  1. 7.2 Internet Hardware
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.6 Packets and Protocols
Compare and contrast security measures to address various security threats.
  1. 9.4 Privacy & Security
Compare and contrast cryptographic techniques to model the secure transmission of information.