Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computing Foundations for a Digital Age

36

Standards in this Framework

33

Standards Mapped

91%

Mapped to Course

Standard Lessons
4565.D1.1
Define algorithm and explain what algorithms are used for.
  1. 5.1 How to Think Like a Programmer
4565.D1.2
Describe the difference between traditional algorithms and artificial intelligence/machine learning (AI/ML) algorithms and, at a high level, describe how AI/ML algorithms work.
  1. 5.13 Artificial Intelligence
4565.D1.3
Explain why/how sequence matters in an algorithm.
  1. 5.10 Functions and Return Values
4565.D1.4
Interpret and modify algorithms (e.g., to add functionality).
  1. 5.11 Lists
4565.D1.5
Compare (at a high level) the trade-offs (e.g., speed, memory) of different algorithms.
  1. 5.12 Algorithm Analysis
4565.D1.6
Reference documentation and other online tools to assist with programming.
  1. 5.2 Printing in Python
  2. 5.3 Variables and Types
  3. 5.4 User Input
  4. 5.5 Mathematical Operators
  5. 5.6 String Operators
  6. 5.7 Comments
4565.D1.7
Interpret the function of a segment of code and convert an algorithm to code.
  1. 1.5 Top Down Design and Decomposition in Karel
  2. 1.15 Algorithms
4565.D1.8
Formulate algorithms using programming structures to decompose a complex problem.
  1. 1.5 Top Down Design and Decomposition in Karel
  2. 1.15 Algorithms
4565.D1.9
Assess a program by testing to verify correct behavior.
  1. 5.11 Lists
4565.D1.10
Illustrate knowledge of good programming practice including the use of conventional standards and comments.
  1. 1.5 Top Down Design and Decomposition in Karel
  2. 1.6 Commenting Your Code
  3. 5.2 Printing in Python
  4. 5.7 Comments
4565.D2.1
Identify and define data types (e.g., string, numeric, Boolean) and how it is created, stored, and used by computers.
  1. 3.2 The Language of Computers
  2. 5.3 Variables and Types
  3. 5.6 String Operators
4565.D2.2
Identify basic data formats (e.g., tables, schemas, JSON) and how computers represent data.
4565.D2.3
Understand the difference between data and metadata.
4565.D2.4
Describe how different types of data (e.g., audio, visual, spatial, environmental) can be collected computationally.
4565.D2.5
Transform and prepare (e.g., normalize, merge, clean) data visualizations, models, and simulations using data collected using computational tools such as surveys.
  1. 12.5 Data Cleaning
  2. 12.6 Sort and Filter
  3. 12.7 Data Visualizations
  4. 12.8 Pivot Tables
4565.D2.6
Analyze data using computational thinking principles to make inferences or predictions.
  1. 12.8 Pivot Tables
  2. 12.9 Statistical Measures
4565.D2.7
Evaluate approaches to cleaning data in a given context.
  1. 12.5 Data Cleaning
4565.D2.8
Assess whether and how a given question can be answered using computational methods and data, and what specific data is needed.
  1. 12.1 What is Data Science?
  2. 12.3 The Data Science Life Cycle
  3. 13.1 What is Data Science?
4565.D3.1
Demonstrate awareness of the history of computing.
  1. 3.1 History of Computers
4565.D3.2
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 9.5 IP Addresses
  2. 10.5 Network Devices
  3. 10.7 Network Options
4565.D3.3
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
  1. 2.6 Cybersecurity Essentials
  2. 2.7 Common Cyber Attacks and Prevention
4565.D3.4
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
  1. 2.6 Cybersecurity Essentials
  2. 2.7 Common Cyber Attacks and Prevention
4565.D3.5
Discuss the ethical and appropriate use of computer devices and examine device usability through several lenses including accessibility, ergonomics, and learnability.
  1. 2.4 Cyber Ethics and Laws
  2. 2.6 Cybersecurity Essentials
4565.D3.6
Examine the impact of the Internet on society.
  1. 9.9 Impact of the Internet
4565.D4.1
Examine the dynamic between privacy and security.
  1. 2.5 Personal Data Security
  2. 2.6 Cybersecurity Essentials
4565.D4.2
Identify various types of hardware (including components) and software (including operating systems) and explore the security practices, functionality, cost, accessibility, and aesthetics of a variety of hardware and software
  1. 8.1 Operating Systems
  2. 8.3 Comparing Operating Systems
  3. 8.6 Software and Applications
  4. 8.10 System Administration
  5. 10.1 Internal Components
  6. 10.3 Peripheral Devices
4565.D4.3
Explain what networks (including the Internet) are and explore the fundamental principles and components of computer networking.
  1. 9.4 What is the Internet?
  2. 9.6 Routing and Packets
  3. 10.10 Network Communication
  4. 10.11 Network Management
4565.D4.4
Explain how an operating system, other software, and hardware work together.
  1. 8.1 Operating Systems
  2. 8.3 Comparing Operating Systems
  3. 8.4 Compatibility
4565.D4.5
Describe why cybersecurity is important and evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 2.4 Cyber Ethics and Laws
  2. 2.6 Cybersecurity Essentials
4565.D4.6
Optimize operating systems and other software settings to achieve goals.
  1. 8.1 Operating Systems
  2. 8.2 Lab: Configuring a Computer
  3. 8.3 Comparing Operating Systems
4565.D4.7
Use documentation and other resources to guide tasks such as installation and troubleshooting.
  1. 11.1 Communication is Key!
  2. 11.2 Troubleshooting Methodology
  3. 11.3 Building a Knowledge Base
4565.D5.1
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 2.2 Personal Data and Collection
  2. 2.5 Personal Data Security
  3. 6.2 Data as a Resource
4565.D5.2
Discuss the laws surrounding intellectual property.
  1. 2.3 Can All Information Be Trusted?
  2. 2.4 Cyber Ethics and Laws
4565.D5.3
Examine tradeoffs in computing technologies through current events related to broad ideas including privacy, communication, and automation (i.e., driverless cars can increase convenience and reduce accidents, but they are susceptible to hacking. The emerging industry will reduce the number of taxi and ride-share drivers but will create software engineering and cybersecurity jobs).
  1. 2.6 Cybersecurity Essentials
  2. 2.7 Common Cyber Attacks and Prevention
4565.D5.4
Examine how emerging technologies are impacting a variety of practices (e.g., use of facial recognition in policing, AI-generated news products).
  1. 2.3 Can All Information Be Trusted?
  2. 2.6 Cybersecurity Essentials
4565.D5.5
Evaluate the use of emerging technologies (e.g., generative AI) for accuracy and to meet specific needs.
  1. 2.6 Cybersecurity Essentials