Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computing Foundations for a Digital Age

36

Standards in this Framework

18

Standards Mapped

50%

Mapped to Course

Standard Lessons
4565.D1.1
Define algorithm and explain what algorithms are used for.
4565.D1.2
Describe the difference between traditional algorithms and artificial intelligence/machine learning (AI/ML) algorithms and, at a high level, describe how AI/ML algorithms work.
4565.D1.3
Explain why/how sequence matters in an algorithm.
4565.D1.4
Interpret and modify algorithms (e.g., to add functionality).
4565.D1.5
Compare (at a high level) the trade-offs (e.g., speed, memory) of different algorithms.
4565.D1.6
Reference documentation and other online tools to assist with programming.
4565.D1.7
Interpret the function of a segment of code and convert an algorithm to code.
4565.D1.8
Formulate algorithms using programming structures to decompose a complex problem.
4565.D1.9
Assess a program by testing to verify correct behavior.
4565.D1.10
Illustrate knowledge of good programming practice including the use of conventional standards and comments.
4565.D2.1
Identify and define data types (e.g., string, numeric, Boolean) and how it is created, stored, and used by computers.
  1. 13.1 The Language of Computers
4565.D2.2
Identify basic data formats (e.g., tables, schemas, JSON) and how computers represent data.
4565.D2.3
Understand the difference between data and metadata.
4565.D2.4
Describe how different types of data (e.g., audio, visual, spatial, environmental) can be collected computationally.
4565.D2.5
Transform and prepare (e.g., normalize, merge, clean) data visualizations, models, and simulations using data collected using computational tools such as surveys.
4565.D2.6
Analyze data using computational thinking principles to make inferences or predictions.
4565.D2.7
Evaluate approaches to cleaning data in a given context.
4565.D2.8
Assess whether and how a given question can be answered using computational methods and data, and what specific data is needed.
4565.D3.1
Demonstrate awareness of the history of computing.
4565.D3.2
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 5.5 IP Addresses
  2. 6.5 Network Devices
  3. 6.7 Network Options
4565.D3.3
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
4565.D3.4
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
  3. 8.7 Risky Business
4565.D3.5
Discuss the ethical and appropriate use of computer devices and examine device usability through several lenses including accessibility, ergonomics, and learnability.
  1. 1.4 Cyber Ethics and Laws
  2. 1.6 Cybersecurity Essentials
4565.D3.6
Examine the impact of the Internet on society.
  1. 5.9 Impact of the Internet
4565.D4.1
Examine the dynamic between privacy and security.
  1. 1.5 Personal Data Security
  2. 1.6 Cybersecurity Essentials
4565.D4.2
Identify various types of hardware (including components) and software (including operating systems) and explore the security practices, functionality, cost, accessibility, and aesthetics of a variety of hardware and software
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
  3. 4.6 Software and Applications
  4. 4.10 System Administration
  5. 6.1 Internal Components
  6. 6.3 Peripheral Devices
4565.D4.3
Explain what networks (including the Internet) are and explore the fundamental principles and components of computer networking.
  1. 5.4 What is the Internet?
  2. 5.6 Routing and Packets
  3. 6.10 Network Communication
  4. 6.11 Network Management
4565.D4.4
Explain how an operating system, other software, and hardware work together.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
  3. 4.4 Compatibility
4565.D4.5
Describe why cybersecurity is important and evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 1.4 Cyber Ethics and Laws
  2. 1.6 Cybersecurity Essentials
4565.D4.6
Optimize operating systems and other software settings to achieve goals.
  1. 4.1 Operating Systems
  2. 4.2 Lab: Configuring a Computer
  3. 4.3 Comparing Operating Systems
4565.D4.7
Use documentation and other resources to guide tasks such as installation and troubleshooting.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
4565.D5.1
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
  3. 8.1 Data as a Resource
4565.D5.2
Discuss the laws surrounding intellectual property.
  1. 1.3 Can All Information Be Trusted?
  2. 1.4 Cyber Ethics and Laws
4565.D5.3
Examine tradeoffs in computing technologies through current events related to broad ideas including privacy, communication, and automation (i.e., driverless cars can increase convenience and reduce accidents, but they are susceptible to hacking. The emerging industry will reduce the number of taxi and ride-share drivers but will create software engineering and cybersecurity jobs).
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
4565.D5.4
Examine how emerging technologies are impacting a variety of practices (e.g., use of facial recognition in policing, AI-generated news products).
  1. 1.3 Can All Information Be Trusted?
  2. 1.6 Cybersecurity Essentials
4565.D5.5
Evaluate the use of emerging technologies (e.g., generative AI) for accuracy and to meet specific needs.
  1. 1.6 Cybersecurity Essentials