Please enable JavaScript to use CodeHS

Standards Mapping

for Connecticut 3B


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Describe how artificial intelligence drives many software and physical systems.
  1. 10.5 Future of Computing
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
Use and adapt classic algorithms to solve computational problems.
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
Compare and contrast fundamental data structures and their uses.
  1. 4.1 Extra Karel Practice
  2. 5.1 Extra Karel Puzzles
  3. 6.13 Parameters
  4. 6.14 Using i in For Loops
  5. 6.16 If Statements
  6. 6.17 If/ Else Statements
  7. 6.18 While Loops
Illustrate the flow of execution of a recursive algorithm.
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 2.3 Karel Can't Turn Right
  2. 2.4 Functions in Karel
  3. 2.5 The Start Function
  4. 2.6 Top Down Design and Decomposition in Karel
  5. 2.7 Commenting Your Code
  6. 2.8 Super Karel
  7. 2.9 For Loops
  8. 2.10 If Statements
  9. 2.11 If/Else Statements
  10. 2.12 While Loops in Karel
  11. 2.13 Control Structures Example
  12. 2.14 More Karel Examples and Testing
  13. 2.15 How to Indent Your Code
  14. 2.16 Karel Challenges
  15. 4.1 Extra Karel Practice
  16. 5.1 Extra Karel Puzzles
  17. 6.10 Top Down Design
  18. 11.7 Image Manipulation
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 6.1 Intro to Python with Tracy the Turtle
  2. 6.2 Tracy's Grid World
  3. 6.3 Turning Tracy
  4. 6.4 For Loops
  5. 6.5 Turning Tracy Using Angles
  6. 6.8 Functions
  7. 6.9 Artistic Effects
  8. 6.15 Extended Loop Control
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 2.1 Introduction to Programming With Karel
  2. 2.2 More Basic Karel
  3. 2.3 Karel Can't Turn Right
  4. 2.4 Functions in Karel
  5. 2.5 The Start Function
  6. 2.6 Top Down Design and Decomposition in Karel
  7. 2.7 Commenting Your Code
  8. 2.8 Super Karel
  9. 2.9 For Loops
  10. 2.10 If Statements
  11. 2.11 If/Else Statements
  12. 2.12 While Loops in Karel
  13. 2.13 Control Structures Example
  14. 2.14 More Karel Examples and Testing
  15. 2.15 How to Indent Your Code
  16. 3.1 Hello World
  17. 3.2 Variables
  18. 3.3 User Input
  19. 3.4 Basic Math in JavaScript
  20. 3.5 Using Graphics in JavaScript
  21. 4.1 Extra Karel Practice
  22. 5.1 Extra Karel Puzzles
Plan and develop programs for broad audiences using a software life cycle process.
Explain security issues that might lead to compromised computer programs.
  1. 13.7 Network Attacks
Develop programs for multiple computing platforms.
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
Develop and use a series of test cases to verify that a program performs according to its design specifications.
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
Evaluate key qualities of a program through a process such as a code review.
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
Categorize the roles of operating system software.
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 13.2 Internet Hardware and Sending Information
  2. 13.5 Routing
Use data analysis tools and techniques to identify patterns in data representing complex systems.
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 13.9 Impact of Cybersecurity
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 13.8 The CIA Triad
  2. 13.9 Impact of Cybersecurity
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 10.5 Future of Computing
  2. 10.6 Computer Model
  3. 13.1 What is Cybersecurity?
  4. 13.8 The CIA Triad
  5. 13.9 Impact of Cybersecurity
Debate laws and regulations that impact the development and use of software.
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 13.2 Internet Hardware and Sending Information
  2. 13.7 Network Attacks
Compare ways software developers protect devices and information from unauthorized access.
  1. 13.6 Packets & Protocols
  2. 13.8 The CIA Triad