Please enable JavaScript to use CodeHS

Standards Mapping

for Delaware 3B

28

Standards in this Framework

18

Standards Mapped

64%

Mapped to Course

Standard Lessons
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 6.1 Project: Classic Cipher Newscast
  6. 6.1 Project: Classic Cipher Newscast
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 5.4 Basic Crypto Systems: Cracking Caesar
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 6.1 Project: Classic Cipher Newscast
  4. 6.1 Project: Classic Cipher Newscast
3B-AP-12
Compare and contrast fundamental data structures and their uses.
  1. 4.5 Arrays and Objects
  2. 4.5 Arrays and Objects
  3. 22.2 Logical Operators
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.3 Comparison Operators
  7. 22.4 If Statements
  8. 22.4 If Statements
  9. 22.5 For Loops in JavaScript
  10. 22.5 For Loops in JavaScript
  11. 22.6 General For Loops
  12. 22.6 General For Loops
  13. 22.7 For Loop Practice
  14. 22.7 For Loop Practice
  15. 22.8 Random Numbers
  16. 22.8 Random Numbers
  17. 22.9 While Loops
  18. 22.9 While Loops
  19. 22.10 Loop and a Half
  20. 22.10 Loop and a Half
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 6.1 Project: Classic Cipher Newscast
  6. 6.1 Project: Classic Cipher Newscast
  7. 21.1 Challenge Problems
  8. 21.1 Challenge Problems
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 21.1 Challenge Problems
  2. 21.1 Challenge Problems
  3. 22.1 Booleans
  4. 22.1 Booleans
  5. 22.2 Logical Operators
  6. 22.2 Logical Operators
  7. 22.3 Comparison Operators
  8. 22.3 Comparison Operators
  9. 22.4 If Statements
  10. 22.4 If Statements
  11. 22.5 For Loops in JavaScript
  12. 22.5 For Loops in JavaScript
  13. 22.6 General For Loops
  14. 22.6 General For Loops
  15. 22.7 For Loop Practice
  16. 22.7 For Loop Practice
  17. 22.8 Random Numbers
  18. 22.8 Random Numbers
  19. 22.9 While Loops
  20. 22.9 While Loops
  21. 22.10 Loop and a Half
  22. 22.10 Loop and a Half
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
  1. 2.7 Hacking Ethics
  2. 2.7 Hacking Ethics
  3. 3.1 Project: Public Service Announcement
  4. 3.1 Project: Public Service Announcement
  5. 5.1 Cryptography, Cryptology, Cryptanalysis
  6. 5.1 Cryptography, Cryptology, Cryptanalysis
  7. 5.2 History of Cryptography
  8. 5.2 History of Cryptography
  9. 6.1 Project: Classic Cipher Newscast
  10. 6.1 Project: Classic Cipher Newscast
  11. 7.6 Application Security
  12. 7.6 Application Security
  13. 7.7 Browser Configuration
  14. 7.8 System Administration
  15. 8.1 Inside Web Apps
  16. 8.1 Inside Web Apps
  17. 8.2 Developer Tools
  18. 8.2 Developer Tools
  19. 8.9 Common Security Problems
  20. 8.9 Common Security Problems
  21. 8.10 SQL Injection Overview
  22. 8.10 SQL Injection Overview
  23. 8.11 Types of SQLi and Prevention
  24. 8.11 Types of SQLi and Prevention
  25. 14.1 Project: Security Assessment Report
  26. 14.1 Project: Security Assessment Report
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.5 Basic Crypto Systems: Vigenere Cipher
  3. 6.1 Project: Classic Cipher Newscast
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 4.1 Programming Concepts
3B-CS-01
Categorize the roles of operating system software.
  1. 7.1 Operating Systems
  2. 7.1 Operating Systems
  3. 7.2 Comparing Operating Systems
  4. 7.2 Comparing Operating Systems
  5. 7.3 Compatibility
  6. 7.3 Compatibility
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 9.2 Notational Systems
  2. 9.4 Internet Hardware and Sending Information
  3. 9.4 Internet Hardware and Sending Information
  4. 9.7 Routing
  5. 9.7 Routing
  6. 10.1 Internal Components
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 8.3 The Value of Data
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 8.7 Basic Querying in SQL
  2. 8.7 Basic Querying in SQL
  3. 8.8 Filtering Queries in SQL
  4. 8.8 Filtering Queries in SQL
  5. 14.1 Project: Security Assessment Report
  6. 14.1 Project: Security Assessment Report
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 1.3 Impact of Cybersecurity
  2. 1.3 Impact of Cybersecurity
  3. 2.3 Internet Safety
  4. 2.3 Internet Safety
  5. 2.4 Privacy & Security
  6. 2.4 Privacy & Security
  7. 2.5 Information Literacy
  8. 2.5 Information Literacy
  9. 2.6 Creative Credit & Copyright
  10. 2.6 Creative Credit & Copyright
  11. 2.7 Hacking Ethics
  12. 2.7 Hacking Ethics
  13. 3.1 Project: Public Service Announcement
  14. 3.1 Project: Public Service Announcement
  15. 5.2 History of Cryptography
  16. 5.2 History of Cryptography
  17. 6.1 Project: Classic Cipher Newscast
  18. 6.1 Project: Classic Cipher Newscast
  19. 9.10 Impact of the Internet
  20. 9.10 Impact of the Internet
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 1.3 Impact of Cybersecurity
  2. 1.3 Impact of Cybersecurity
  3. 1.4 The CIA Triad
  4. 1.4 The CIA Triad
  5. 2.3 Internet Safety
  6. 2.3 Internet Safety
  7. 3.1 Project: Public Service Announcement
  8. 3.1 Project: Public Service Announcement
  9. 9.1 Introduction to the Internet
  10. 9.10 Impact of the Internet
  11. 9.10 Impact of the Internet
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 1.2 What is Cybersecurity?
  2. 1.2 What is Cybersecurity?
  3. 1.3 Impact of Cybersecurity
  4. 1.3 Impact of Cybersecurity
  5. 1.4 The CIA Triad
  6. 1.4 The CIA Triad
  7. 2.3 Internet Safety
  8. 2.3 Internet Safety
  9. 2.4 Privacy & Security
  10. 2.4 Privacy & Security
  11. 2.5 Information Literacy
  12. 2.5 Information Literacy
  13. 2.6 Creative Credit & Copyright
  14. 2.6 Creative Credit & Copyright
  15. 3.1 Project: Public Service Announcement
  16. 3.1 Project: Public Service Announcement
  17. 5.1 Cryptography, Cryptology, Cryptanalysis
  18. 5.1 Cryptography, Cryptology, Cryptanalysis
  19. 5.2 History of Cryptography
  20. 5.2 History of Cryptography
  21. 6.1 Project: Classic Cipher Newscast
  22. 6.1 Project: Classic Cipher Newscast
  23. 9.1 Introduction to the Internet
  24. 9.1 Introduction to the Internet
  25. 9.10 Impact of the Internet
  26. 9.10 Impact of the Internet
3B-IC-28
Debate laws and regulations that impact the development and use of software.
  1. 2.2 Cyberbullying
  2. 2.2 Cyberbullying
  3. 2.4 Privacy & Security
  4. 2.4 Privacy & Security
  5. 2.6 Creative Credit & Copyright
  6. 2.6 Creative Credit & Copyright
  7. 2.7 Hacking Ethics
  8. 2.7 Hacking Ethics
  9. 3.1 Project: Public Service Announcement
  10. 3.1 Project: Public Service Announcement
  11. 7.5 Software Licenses
  12. 9.9 Viewing a Webpage
  13. 9.9 Viewing a Webpage
  14. 9.10 Impact of the Internet
  15. 9.10 Impact of the Internet
  16. 14.1 Project: Security Assessment Report
  17. 14.1 Project: Security Assessment Report
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 9.4 Internet Hardware and Sending Information
  2. 9.4 Internet Hardware and Sending Information
  3. 10.3 Network Devices
  4. 10.5 Network Options
  5. 10.5 Network Options
  6. 10.6 Network Communication
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.
  1. 1.4 The CIA Triad
  2. 1.4 The CIA Triad
  3. 2.1 Digital Footprint and Reputation
  4. 2.1 Digital Footprint and Reputation
  5. 2.4 Privacy & Security
  6. 2.4 Privacy & Security
  7. 2.7 Hacking Ethics
  8. 2.7 Hacking Ethics
  9. 3.1 Project: Public Service Announcement
  10. 3.1 Project: Public Service Announcement
  11. 5.2 History of Cryptography
  12. 5.2 History of Cryptography
  13. 6.1 Project: Classic Cipher Newscast
  14. 6.1 Project: Classic Cipher Newscast
  15. 7.5 Software Licenses
  16. 8.1 Inside Web Apps
  17. 8.1 Inside Web Apps
  18. 8.2 Developer Tools
  19. 8.2 Developer Tools
  20. 8.9 Common Security Problems
  21. 8.9 Common Security Problems
  22. 8.11 Types of SQLi and Prevention
  23. 8.11 Types of SQLi and Prevention
  24. 9.8 Packets & Protocols
  25. 9.8 Packets & Protocols
  26. 14.1 Project: Security Assessment Report
  27. 14.1 Project: Security Assessment Report