Please enable JavaScript to use CodeHS

Standards Mapping

for ID 9-12

58

Standards in this Framework

42

Standards Mapped

72%

Mapped to Course

Standard Lessons
9-12.CS.1.1
Identify and describe hardware components.
  1. 5.1 Internal Components
  2. 5.2 Storage Options
  3. 5.3 Network Devices
9-12.CS.1.2
Identify and evaluate what computing system resources are required for a specific software program.
  1. 3.1 Operating Systems
  2. 3.3 Software and Accessibility (UPDATE LP)
9-12.CS.1.3
Identify the use of embedded computers in various applications.
  1. 15.2 Embedded Systems (Duplicate)
9-12.CS.1.4
Create or modify a program that uses different forms of input and output.
  1. 7.3 User Input
  2. 15.1 What is File I/O
9-12.CS.1.5
Identify how a high level programming language abstracts machine language in a computer program.
  1. 7.7 Programming Languages
9-12.CS.1.6
Create a model of how embedded systems sense, process, and interact in a given environment.
  1. 15.2 Embedded Systems (Duplicate)
9-12.CS.2.1
Use applicable data collection techniques for various scenarios.
  1. 12.2 Gathering Data
  2. 12.8 Mini-Project: Findings
  3. 13.3 Importing and Filtering Data
9-12.CS.2.2
Apply basic techniques for locating, collecting, and understanding the quality of data sets.
  1. 13.5 Data Cleaning
  2. 13.6 Quality Datasets
9-12.CS.2.3
Analyze data and identify patterns through modeling and simulation.
  1. 12.4 Series and Central Tendency
  2. 12.5 Measures of Spread
  3. 14.2 Data Visualizations
  4. 14.5 Trends and Correlations
  5. 14.6 Linear Regression LONG
9-12.CS.2.4
Use data analysis to show the transformation from data to information to knowledge.
  1. 6.4 How Are AI Models Trained?
  2. 12.4 Series and Central Tendency
  3. 12.5 Measures of Spread
  4. 13.8 Interpret and Present
  5. 14.1 Data Storytelling
9-12.CS.2.5
Use models and simulations to help formulate, refine, and test scientific hypotheses.
9-12.CS.2.6
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, and the government.
  1. 1.3 Cyber Ethics and Laws
  2. 1.6 Common Cyber Attacks and Prevention
  3. 5.6 Data as a Resource
9-12.CS.2.7
Analyze the strengths and weaknesses of security policies based on their usage of encryption and authentication strategies.
  1. 2.2 Symmetric Encryption
  2. 2.3 Asymmetric Encryption
  3. 2.4 Authentication Methods
9-12.CS.2.8
Convert between binary, decimal, octal, and hexadecimal representations of data.
  1. 4.1 Computers Speak Binary
  2. 4.2 Number Bases
9-12.CS.2.9
Describe how real-world phenomena such as numbers, Strings, or images are represented as binary in a computer.
  1. 4.3 Encoding Images in Binary
9-12.CS.2.10
Analyze the trade-offs among various compression algorithms.
9-12.CS.3.1
Demonstrate responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Can All Information Be Trusted?
  3. 1.3 Cyber Ethics and Laws
  4. 6.8 Project: AI on Trial
  5. 6.9 The Ethics of Artificial Intelligence
9-12.CS.3.2
Explain the social and economic implications associated with unethical computing practices.
  1. 1.3 Cyber Ethics and Laws
  2. 1.5 Cybersecurity Essentials
  3. 1.6 Common Cyber Attacks and Prevention
  4. 6.5 AI Models in Industry
  5. 6.6 Bias in Training
  6. 6.7 Effects of Using Biased AI
  7. 6.9 The Ethics of Artificial Intelligence
9-12.CS.3.3
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large-scale analysis of personal information.
  1. 1.4 Personal Data Security
  2. 1.5 Cybersecurity Essentials
  3. 1.6 Common Cyber Attacks and Prevention
  4. 6.9 The Ethics of Artificial Intelligence
  5. 13.2 Big Data and Bias
9-12.CS.3.4
Identify and evaluate the beneficial and harmful effects of computing innovations on behavior and culture.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Cyber Ethics and Laws
  3. 1.4 Personal Data Security
  4. 1.6 Common Cyber Attacks and Prevention
  5. 4.8 Impact of the Internet
  6. 6.5 AI Models in Industry
  7. 6.10 The Impact of Artificial Intelligence
  8. 13.2 Big Data and Bias
9-12.CS.3.5
Debate how the issues of equity, data access, and distribution of computing resources create a digital divide in a global society.
  1. 4.8 Impact of the Internet
  2. 13.2 Big Data and Bias
9-12.CS.3.6
Debate laws and regulations that impact the development, security and use of software.
  1. 3.4 Software Licenses
  2. 6.8 Project: AI on Trial
9-12.CS.3.7
Understand and define artificial intelligence.
  1. 1.5 Cybersecurity Essentials
  2. 6.1 Human & Artificial Intelligence
  3. 14.6 Linear Regression LONG
9-12.CS.3.8
Research and explain the social, moral, ethical, and legal impacts of artificial intelligence systems and respective usage.
  1. 6.6 Bias in Training
  2. 6.8 Project: AI on Trial
  3. 6.9 The Ethics of Artificial Intelligence
  4. 13.2 Big Data and Bias
9-12.CS.3.9
Explain how computer automation continues to transform society and the global economy (e.g. financial markets, transactions, predictions).
  1. 6.5 AI Models in Industry
  2. 6.10 The Impact of Artificial Intelligence
9-12.CS.3.10
Research, analyze, and present how computational thinking has enabled computing to revolutionize business, manufacturing, commerce and society.
9-12.CS.3.11
Evaluate the accessibility of a computational artifact.
9-12.CS.3.12
Describe how computer science shares features with creating and designing an artifact such as in music and art.
9-12.CS.3.13
Understand the ecosystem of open-source software development and its impact on global collaboration.
  1. 3.4 Software Licenses
9-12.CS.3.14
Explain how computer science fosters innovation and enhances other career and disciplines.
  1. 4.8 Impact of the Internet
9-12.CS.4.1
Illustrate the basic components of computer networks and protocols.
  1. 4.5 Routing and Packets (Duplicate)
  2. 4.6 How Do Websites Work?
  3. 4.7 OSI Model
  4. 5.4 Network Options
9-12.CS.4.2
Analyze the issues that impact network functionality.
  1. 4.5 Routing and Packets (Duplicate)
  2. 5.4 Network Options
  3. 5.5 Network Communication
9-12.CS.4.3
Describe the data flow that occurs when using Internet-based services.
  1. 4.5 Routing and Packets (Duplicate)
  2. 4.6 How Do Websites Work?
  3. 4.7 OSI Model
9-12.CS.4.4
Examine how encryption is essential to ensuring privacy and security over the internet.
  1. 2.2 Symmetric Encryption
  2. 2.3 Asymmetric Encryption
  3. 2.4 Authentication Methods
9-12.CS.5.1
Diagram the flow of execution and output of a given program.
9-12.CS.5.2
Design algorithms using sequence, selection, iteration and recursion.
  1. 7.3 User Input
  2. 7.4 Mathematical Operators
  3. 8.2 If Statements
  4. 8.6 For Loops
  5. 9.5 Recursion
9-12.CS.5.3
Use variable scope and encapsulation to design programs with cohesive and modular components.
  1. 11.5 Class Variables vs. Instance Variables
  2. 12.3 Modules, Packages & Libraries
  3. 12.7 Using Functions
9-12.CS.5.4
Decompose a complex problem using abstraction through methods and/or classes.
  1. 11.1 Classes and Objects
  2. 11.2 Methods
  3. 12.1 What is Data Science?
  4. 12.7 Using Functions
9-12.CS.5.5
Demonstrate the value of abstraction to manage problem complexity.
  1. 12.6 Pandas DataFrames
  2. 12.7 Using Functions
9-12.CS.5.6
Demonstrate code reuse by creating programming solutions using APIs and libraries.
  1. 12.3 Modules, Packages & Libraries
  2. 12.6 Pandas DataFrames
9-12.CS.5.7
Evaluate the qualities of a program such as correctness, usability, readability, efficiency, portability and scalability through processes such as debugging and code review.
  1. 12.8 Mini-Project: Findings
  2. 13.8 Interpret and Present
9-12.CS.5.8
Compare and contrast simple data structures and their uses.
  1. 10.2 Tuples
  2. 10.3 Lists
  3. 10.5 Dictionaries
  4. 12.4 Series and Central Tendency
  5. 12.6 Pandas DataFrames
9-12.CS.5.9
Compare software development processes.
9-12.CS.5.10
Demonstrate an understanding of the software life cycle process.
9-12.CS.5.11
Design and develop a software artifact by leading, initiating, and participating in a team.
9-12.CS.5.12
Create collaborative software projects using Integrated Development Environments, or other collaborative tools.
9-12.CS.5.13
Understand the positive and negative implications that arise when you add functionality to an existing program.
9-12.CS.5.14
Demonstrate how diverse team collaboration improves the design and development of software products.
9-12.CS.5.15
Compare a variety of programming languages available to solve problems and develop systems.
  1. 7.7 Programming Languages
9-12.CS.5.16
Analyze security issues that might lead to compromised computer programs.
  1. 5.8 Security in Coding
9-12.CS.5.17
Classify and define the different types of software licenses in order to understand how to apply each one to a specific software example.
  1. 3.4 Software Licenses
9-12.CS.5.18
Analyze the notion of intelligent behavior through the programs that learn and adapt, play games, do image recognition, perform text analysis, and control the behavior of robots.
  1. 6.2 Large Language Models
  2. 6.3 Reinforcement Learning
9-12.CS.5.19
Illustrate how mathematical and statistical functions, sets, and logic are used in computation.
  1. 7.4 Mathematical Operators
  2. 8.4 Logical Operators
  3. 12.4 Series and Central Tendency
  4. 12.5 Measures of Spread
  5. 14.6 Linear Regression LONG
9-12.CS.5.20
Describe the concept of parallel processing.
9-12.CS.5.21
Explore issues surrounding mobile computing.
  1. 3.2 Laptops and Tablets
9-12.CS.5.22
Explain the value of heuristic algorithms to approximate solutions for interactable problems.
9-12.CS.5.23
Critically examine algorithms and design an original algorithm (e.g. adapt, remix, improve).
9-12.CS.5.24
Classify problems as tractable, interactable, or computationally unsolvable.