Please enable JavaScript to use CodeHS

Standards Mapping

for Idaho 9-10


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Design and develop a software artifact by leading, initiating, and participating in a team (e.g. pair programming, agile software development).
  1. 13.19 Putting Together Control Structures
Demonstrate how diverse collaboration, both inside and outside of a team, impacts the design and development of software products (e.g. students show their own artifacts and demonstrate and reflect how diverse collaboration made a product better).
Compare a variety of programming languages available to solve problems and develop systems.
Explore security issues that might lead to compromised computer programs (e.g. ambiguous function calls, lack of error checking of the input, buffer overflow, SQL injection attacks, denial of service attacks).
  1. 9.4 Privacy & Security
Classify and define the different types of software licenses in order to understand how to apply each one to a specific software example.
Understand the notion of hierarchy and abstraction in high-level languages, translation, instruction sets, and logic circuits.
Explore issues surrounding mobile computing by creating a mobile computing application (e.g. App Inventor).
Create software solutions by applying analysis, design, implementation and testing techniques.
Demonstrate code reuse by creating programming solutions using APIs and libraries (e.g. using text to speech in App Inventor, using Twitter API).
  1. 1.8 Super Karel
Illustrate the flow of execution and output of a given program (e.g. flow and control diagrams).
  1. 13.4 For Loops
  2. 13.17 If/ Else Statements
  3. 13.18 While Loops
Illustrate how mathematical and statistical functions, sets, and logic are used in computation.
Design algorithms using sequence, selection, iteration and recursion.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 13.4 For Loops
  8. 13.14 Using i in For Loops
  9. 13.15 Extended Loop Control
  10. 13.16 If Statements
  11. 13.17 If/ Else Statements
  12. 13.18 While Loops
  13. 13.19 Putting Together Control Structures
Explain, represent, and understand natural phenomena using modeling and simulation
Describe the concept of parallel processing as a strategy to solve large problems.
Compare and evaluate software development processes used to solve problems (e.g. waterfall, agile).
Decompose a complex problem into simpler parts using predefined functions and parameters, classes, and methods.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.8 Functions
  3. 13.10 Top Down Design
  4. 13.13 Parameters
Demonstrate the value of abstraction to manage problem complexity.
  1. 6.1 Intro to Digital Information
Evaluate and improve program quality using various debugging and testing methods and examine the difference between verification and validation.
Evaluate programs written by others for readability and usability.
  1. 1.7 Commenting Your Code
Identify and evaluate what computing resources are required for a given purpose (e.g. system requirements needed to run a program, hardware, and software needed to run game X).
Explore the unique features of embedded computers in areas such as mobile devices, sensors, and vehicles.
  1. 15.2 What is Cybersecurity?
Create or modify a program that uses different forms of input and output. (e.g. use voice input instead of text input, use text-to-speech for output)
Demonstrate the multiple levels of abstraction that support program execution including programming languages, translations, and low-level systems including the fetch-execute cycle (e.g. model, dance, create a play/presentation).
Illustrate how various types of data are stored in a computer system (e.g. how sound and images are stored).
Differentiate between information access and distribution rights (e.g. write, discuss).
  1. 9.6 Creative Credit & Copyright
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, the government (e.g. persuasive essay, presentation, or debate).
  1. 9.4 Privacy & Security
  2. 10.1 Project: Public Service Announcement
  3. 15.2 What is Cybersecurity?
Explain the principles of security by examining encryption, cryptography, and authentication techniques.
Apply basic techniques for locating, collecting, and understanding the quality of small and large-scale data sets (e.g. public data sets).
Convert between binary, decimal, octal, and hexadecimal representations of data.
  1. 6.3 Encoding Text with Binary
  2. 6.5 Hexadecimal
Analyze the representation and trade-offs among various forms of digital information (e.g. lossy versus lossless compression).
Analyze data and identify patterns through modeling and simulation.
Explain the social and economic implications associated with unethical computing practices (e.g. software piracy, intrusion, malware, current corporate fraud examples).
  1. 9.4 Privacy & Security
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large scale analysis of information about individuals (e.g. social media, online shopping, how grocery/dept stores collect and use personal data).
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
Understand and explain the impact of artificial intelligence and robotics.
Describe how computer science shares features with creating and designing an artifact such as in music and art.
  1. 13.9 Artistic Effects
Demonstrate how computing enhances traditional forms and enables new forms of experience, expression, communication, and collaboration (e.g. virtual reality).
Explain the impact of the digital divide on access to critical information (e.g. education, healthcare, medical records, access to training).
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Compare the positive and negative impacts of computing on behavior and culture.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Evaluate a computational artifact for its effectiveness for universal access (e.g. compare sample code with accessibility standards, building in access from initial design).
Practice responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. 9.1 Digital Footprint and Reputation
  2. 9.6 Creative Credit & Copyright
Explain how computer science fosters innovation and enhances other careers and disciplines.
Explain the impacts of computing on business, manufacturing, commerce, and society.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Describe the underlying process of Internet-based services. (e.g. illustrate how information flows in a global network, servers and clients, cloud services, secure versus insecure communication).
Illustrate the basic components of computer networks, protocols and routing (e.g. team based activities which may include drawing a diagram of a network including routers, switches, local networks, and end user computing devices, creating models with string and paper, see CS unplugged activities).
  1. 7.5 Routing
  2. 7.6 Packets and Protocols