Please enable JavaScript to use CodeHS

Standards Mapping

for Idaho 9-10

44

Standards in this Framework

27

Standards Mapped

61%

Mapped to Course

Standard Lessons
9-10.AP.01
Design and develop a software artifact by leading, initiating, and participating in a team (e.g. pair programming, agile software development).
  1. 1.19 Putting Together Control Structures
  2. 7.5 Prototype
  3. 7.6 Test
  4. 15.1 micro:bit Challenges
  5. 15.4 Final Project
9-10.AP.02
Demonstrate how diverse collaboration, both inside and outside of a team, impacts the design and development of software products (e.g. students show their own artifacts and demonstrate and reflect how diverse collaboration made a product better).
  1. 7.6 Test
9-10.AP.03
Compare a variety of programming languages available to solve problems and develop systems.
9-10.AP.04
Explore security issues that might lead to compromised computer programs (e.g. ambiguous function calls, lack of error checking of the input, buffer overflow, SQL injection attacks, denial of service attacks).
  1. 4.4 Privacy & Security
9-10.AP.05
Classify and define the different types of software licenses in order to understand how to apply each one to a specific software example.
  1. 6.6 Copyright
9-10.AP.06
Understand the notion of hierarchy and abstraction in high-level languages, translation, instruction sets, and logic circuits.
9-10.AP.07
Explore issues surrounding mobile computing by creating a mobile computing application (e.g. App Inventor).
9-10.AP.08
Create software solutions by applying analysis, design, implementation and testing techniques.
  1. 7.3 Define
  2. 7.5 Prototype
  3. 7.6 Test
  4. 15.4 Final Project
9-10.AP.09
Demonstrate code reuse by creating programming solutions using APIs and libraries (e.g. using text to speech in App Inventor, using Twitter API).
  1. 11.8 Super Karel
  2. 14.5 Functions
9-10.AP.10
Illustrate the flow of execution and output of a given program (e.g. flow and control diagrams).
  1. 1.4 For Loops
  2. 1.17 If/ Else Statements
  3. 1.18 While Loops
9-10.AP.11
Illustrate how mathematical and statistical functions, sets, and logic are used in computation.
9-10.AP.12
Design algorithms using sequence, selection, iteration and recursion.
  1. 1.4 For Loops
  2. 1.14 Using i in For Loops
  3. 1.15 Extended Loop Control
  4. 1.16 If Statements
  5. 1.17 If/ Else Statements
  6. 1.18 While Loops
  7. 1.19 Putting Together Control Structures
  8. 11.9 For Loops
  9. 11.11 If/Else Statements
  10. 11.12 While Loops in Karel
  11. 11.13 Control Structures Example
  12. 11.14 More Karel Examples and Testing
  13. 11.16 Karel Challenges
  14. 14.1 For Loops
  15. 14.2 While Loops
  16. 14.4 If/Else Statements
  17. 15.1 micro:bit Challenges
9-10.AP.13
Explain, represent, and understand natural phenomena using modeling and simulation
9-10.AP.14
Describe the concept of parallel processing as a strategy to solve large problems.
9-10.AP.15
Compare and evaluate software development processes used to solve problems (e.g. waterfall, agile).
9-10.AP.16
Decompose a complex problem into simpler parts using predefined functions and parameters, classes, and methods.
  1. 1.8 Functions
  2. 1.10 Top Down Design
  3. 1.13 Parameters
  4. 11.6 Top Down Design and Decomposition in Karel
  5. 14.5 Functions
9-10.AP.17
Demonstrate the value of abstraction to manage problem complexity.
  1. 8.1 Intro to Digital Information
9-10.AP.18
Evaluate and improve program quality using various debugging and testing methods and examine the difference between verification and validation.
9-10.AP.19
Evaluate programs written by others for readability and usability.
  1. 11.7 Commenting Your Code
9-10.CS.01
Identify and evaluate what computing resources are required for a given purpose (e.g. system requirements needed to run a program, hardware, and software needed to run game X).
9-10.CS.02
Explore the unique features of embedded computers in areas such as mobile devices, sensors, and vehicles.
  1. 13.2 What is Cybersecurity?
  2. 15.1 micro:bit Challenges
  3. 15.2 Explore a New Sensor
  4. 15.3 Follow a Step-by-Step Project
  5. 15.4 Final Project
9-10.CS.03
Create or modify a program that uses different forms of input and output. (e.g. use voice input instead of text input, use text-to-speech for output)
  1. 15.2 Explore a New Sensor
9-10.CS.04
Demonstrate the multiple levels of abstraction that support program execution including programming languages, translations, and low-level systems including the fetch-execute cycle (e.g. model, dance, create a play/presentation).
9-10.DA.01
Illustrate how various types of data are stored in a computer system (e.g. how sound and images are stored).
9-10.DA.02
Differentiate between information access and distribution rights (e.g. write, discuss).
  1. 6.6 Copyright
9-10.DA.03
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, the government (e.g. persuasive essay, presentation, or debate).
  1. 4.4 Privacy & Security
  2. 4.5 Project: Public Service Announcement
  3. 13.2 What is Cybersecurity?
9-10.DA.04
Explain the principles of security by examining encryption, cryptography, and authentication techniques.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
9-10.DA.05
Apply basic techniques for locating, collecting, and understanding the quality of small and large-scale data sets (e.g. public data sets).
  1. 15.2 Explore a New Sensor
9-10.DA.06
Convert between binary, decimal, octal, and hexadecimal representations of data.
  1. 8.3 Encoding Text with Binary
  2. 8.5 Hexadecimal
9-10.DA.07
Analyze the representation and trade-offs among various forms of digital information (e.g. lossy versus lossless compression).
9-10.DA.08
Analyze data and identify patterns through modeling and simulation.
9-10.IC.01
Explain the social and economic implications associated with unethical computing practices (e.g. software piracy, intrusion, malware, current corporate fraud examples).
  1. 4.4 Privacy & Security
9-10.IC.02
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large scale analysis of information about individuals (e.g. social media, online shopping, how grocery/dept stores collect and use personal data).
  1. 4.3 Internet Safety
  2. 4.4 Privacy & Security
9-10.IC.03
Understand and explain the impact of artificial intelligence and robotics.
  1. 15.4 Final Project
9-10.IC.04
Describe how computer science shares features with creating and designing an artifact such as in music and art.
  1. 1.9 Artistic Effects
  2. 7.3 Define
  3. 14.1 For Loops
9-10.IC.05
Demonstrate how computing enhances traditional forms and enables new forms of experience, expression, communication, and collaboration (e.g. virtual reality).
9-10.IC.06
Explain the impact of the digital divide on access to critical information (e.g. education, healthcare, medical records, access to training).
  1. 9.7 The Impact of the Internet
9-10.IC.07
Compare the positive and negative impacts of computing on behavior and culture.
  1. 9.7 The Impact of the Internet
9-10.IC.08
Evaluate a computational artifact for its effectiveness for universal access (e.g. compare sample code with accessibility standards, building in access from initial design).
9-10.IC.09
Practice responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. 4.1 Digital Footprint and Reputation
  2. 6.6 Copyright
9-10.IC.10
Explain how computer science fosters innovation and enhances other careers and disciplines.
9-10.IC.11
Explain the impacts of computing on business, manufacturing, commerce, and society.
  1. 9.7 The Impact of the Internet
9-10.NI.01
Describe the underlying process of Internet-based services. (e.g. illustrate how information flows in a global network, servers and clients, cloud services, secure versus insecure communication).
9-10.NI.02
Illustrate the basic components of computer networks, protocols and routing (e.g. team based activities which may include drawing a diagram of a network including routers, switches, local networks, and end user computing devices, creating models with string and paper, see CS unplugged activities).
  1. 9.5 Routing
  2. 9.6 Packets and Protocols