Please enable JavaScript to use CodeHS

Standards Mapping

for Illinois 9-10


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 15.3 Abstraction
  2. 23.8 Abstraction
Compare levels of abstraction and interactions between application software, system software, and hardware layers.
  1. 2.12 User Input
  2. 3.3 User Input
  3. 15.3 Abstraction
  4. 23.8 Abstraction
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 3.6 Comments
  2. 6.5 Exceptions
  3. 23.7 Commenting Your Code
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
Evaluate the tradeoffs in how data elements are organized and stored.
  1. 8.1 Tuples
  2. 8.2 Lists
  3. 8.3 For Loops and Lists
  4. 8.4 List Methods
  5. 9.1 2d Lists
  6. 9.2 List Comprehensions
  7. 9.3 Packing and Unpacking
  8. 9.4 Dictionaries
  9. 9.5 Equivalence vs. Identity
  10. 21.1 Using Requests
Create interactive data visualizations using software tools to help others better understand real-world phenomena.
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
  1. 13.1 Advanced Challenges with Tracy
  2. 18.1 Let's Build Mastermind
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
  1. 8.2 Lists
  2. 8.3 For Loops and Lists
  3. 8.4 List Methods
  4. 9.1 2d Lists
  5. 9.2 List Comprehensions
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made.
  1. 2.16 If Statements
  2. 2.17 If/ Else Statements
  3. 2.18 While Loops
  4. 2.19 Putting Together Control Structures
  5. 4.2 If Statements
  6. 4.3 Comparison Operators
  7. 4.4 Logical Operators
  8. 15.1 Short Circuit Evaluation
  9. 15.2 De Morgan's Laws
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 13.1 Advanced Challenges with Tracy
  2. 16.1 Project: Who Said It?
  3. 17.6 Graphics Challenges
  4. 18.1 Let's Build Mastermind
  5. 22.6 Graphics Challenges
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects.
  1. 2.8 Functions
  2. 2.10 Top Down Design
  3. 6.1 Functions
  4. 6.2 Functions and Parameters
  5. 6.3 Namespaces in Functions
  6. 6.4 Functions and Return Values
  7. 12.1 Classes and Objects
  8. 12.2 Methods
  9. 12.4 Operator Overloading
  10. 12.5 Class Variables vs. Instance Variables
  11. 12.6 Inheritance
  12. 12.7 Hidden Attributes
  13. 12.9 Modules
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 8.1 Tuples
  2. 8.2 Lists
  3. 8.3 For Loops and Lists
  4. 8.4 List Methods
  5. 9.1 2d Lists
  6. 9.2 List Comprehensions
  7. 9.3 Packing and Unpacking
  8. 9.4 Dictionaries
  9. 10.1 Project: Guess the Word
  10. 18.1 Let's Build Mastermind
Systematically design and develop programs for broad audiences by incorporating feedback from users.
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
Evaluate and refine computational artifacts to make them more usable and accessible.
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 16.1 Project: Who Said It?
  2. 18.1 Let's Build Mastermind
Document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs.
  1. 2.6 Comments
  2. 2.9 Artistic Effects
  3. 3.6 Comments
  4. 10.1 Project: Guess the Word
  5. 16.1 Project: Who Said It?
  6. 17.6 Graphics Challenges
  7. 18.1 Let's Build Mastermind
  8. 22.6 Graphics Challenges
Describe the characteristics and evaluate the impact of human computer interaction.
  1. 2.12 User Input
  2. 3.3 User Input
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
Evaluate the ways digital social interactions impact personal, ethical, social, economic, and cultural practices.
Test and refine computational artifacts to reduce bias and equity deficits.
Demonstrate ways a given algorithm applies to problems across disciplines.
  1. 19.1 Calculating Area
  2. 19.2 Categorizing Triangles with a Static Base Value
  3. 19.3 Categorizing Triangles with a Varied Base Value
  4. 23.18 Karel Challenges
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
Explain that the field of emerging technologies will be evolving and rapidly growing.
Compare existing and emerging technologies, ideas, and concepts.
Describe how emerging technologies are influencing current events at a local and global scale.
Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate.
Create new or original work by applying emerging technologies.
  1. 17.1 Creating the Canvas
  2. 17.2 Shapes and Attributes
  3. 17.3 Creating Graphics Using Variables
  4. 17.4 Using Functions in Graphics
  5. 17.5 Using Loops in Graphics
  6. 17.6 Graphics Challenges
  7. 22.1 Creating Text & Lines
  8. 22.2 Creating Shapes
  9. 22.3 Creating Graphics Using Variables
  10. 22.4 Using Functions in Graphics
  11. 22.5 Using Loops in Graphics
  12. 22.6 Graphics Challenges