Please enable JavaScript to use CodeHS

Standards Mapping

for Idaho 11-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Analyze the notion of intelligent behavior through programs that learn and adapt, play games, do image recognition, perform text analysis, and control the behavior of robots.
  1. 16.1 Magpie Lab
Create collaborative software projects using version control systems, Integrated Development Environments (IDEs), and collaborative tools.
Demonstrate an understanding of the software life cycle process (e.g. by participating on a software project team).
Modify an existing program to add additional functionality and discus the positive and negative implications (e.g., breaking other functionality).
  1. 15.1 Elevens
  2. 16.1 Magpie Lab
  3. 17.1 Picture Lab
Explain the value of heuristic algorithms to approximate solutions for intractable problems.
  1. 8.6 Advanced: Recursion
Decompose a computational problem through data abstraction and modularity.
  1. 4.13 Inheritance
  2. 4.14 Class Design and Abstract Classes
  3. 4.15 Polymorphism
  4. 4.17 Interfaces
Critically examine algorithms and design an original algorithm (e.g. adapt, remix, improve).
  1. 8.1 What is an Algorithm?
  2. 8.2 Linear Search
  3. 8.3 Binary Search
  4. 8.4 Selection Sort
  5. 8.5 Insertion Sort
  6. 8.6 Advanced: Recursion
Evaluate efficiency, correctness, and clarity of algorithms.
  1. 8.1 What is an Algorithm?
  2. 8.2 Linear Search
  3. 8.3 Binary Search
  4. 8.4 Selection Sort
  5. 8.5 Insertion Sort
  6. 8.6 Advanced: Recursion
  7. 8.7 Mergesort
Compare and contrast simple data structures and their uses (e.g. arrays, lists, stacks, queues, maps, trees, graphs).
  1. 5.1 What are Data Structures?
  2. 5.2 Introduction to Arrays
  3. 5.3 Using Arrays
  4. 5.5 ArrayList Methods
  5. 5.6 Arrays vs ArrayLists
  6. 5.9 2D Arrays (Matrices or Grids)
  7. 5.11 HashMaps
Decompose a problem by creating functions and classes.
  1. 3.1 Java Methods
  2. 3.2 Methods and Parameters
  3. 3.3 Methods and Return Values
  4. 3.5 Strings Methods
  5. 4.1 Introduction to Classes and Objects
  6. 4.2 Classes vs. Objects
  7. 4.4 Writing Classes
  8. 4.6 Getter and Setter Methods
  9. 4.7 Class Methods and Class Variables
Use variable scope and encapsulation to design programs with cohesive and decoupled components.
  1. 4.10 Local Variables and Scope
Classify problems as tractable, intractable, or computationally unsolvable
Understand and explain the use of concurrency (e.g. separate processes into threads and divide data into parallel streams, have students self sort by height).
Evaluate the qualities of a program such as correctness, usability, readability, efficiency, portability and scalability through a process such as a code review.
Identify and describe hardware (e.g. physical layers, logic gates, chips, components).
Create a model of how embedded systems sense, process, and actuate in a given environment (e.g. ocean, atmosphere, and highway)
Use data analysis to enhance understanding and gain knowledge of complex systems to show the transformation from data to information to knowledge (e.g. using existing data sets).
Use various data collection techniques for different types of problems (e.g. mobile device GPS, user surveys, embedded system sensors, open data sets, social media data sets).
Understand and explain security policies by comparing encryption and authentication strategies (e.g. trapdoor functions and man in the middle attacks).
Discuss the variety of interpretations of binary sequences (e.g. instructions, numbers, text, sound, image).
Use models and simulations to help formulate, refine, and test scientific hypotheses.
Analyze data and identify patterns through modeling and simulation.
Understand the ecosystem of open source software development and its impact on global collaboration through an open-source software project (e.g.
Debate laws and regulations that impact the development and use of software. (e.g. compare and contrast licensing versus certification, professional societies, professional code of ethics).
Research, analyze, and present how computational thinking has revolutionized an aspect of our culture (e.g. agriculture, communication, work, healthcare, music, art).
Analyze the role and impact of government regulation on privacy and security.
Debate how the issues of equity, access, and power relate to the distribution of computing resources in a global society.
Identify and evaluate the beneficial and harmful effects of computing innovations
Practice responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
Describe how computer science shares features with creating and designing an artifact such as in music and art.
Explain the impacts of computing on business, manufacturing, commerce, and society.
Summarize how computer automation and control is transforming society and the global economy (e.g. financial markets, transactions, predictions).
Simulate and discuss the issues that impact network functionality (e.g. use ns3 or other free network simulators).
Examine how encryption is essential to ensuring privacy and security over the internet.