Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computer Science

12

Standards in this Framework

10

Standards Mapped

83%

Mapped to Course

Standard Lessons
7352.D1.1
Discuss software development methodology that include fundamental design concepts and principles, Structured and Iterative design, UML (Unified Modeling Language).
7352.D1.2
Demonstrate fundamental programming constructs such as understanding of language syntax, semantics and style standards including documentation and commenting, using IDEs to create, execute, test, and debug programs utilizing standard software development design and methodologies.
  1. Indiana Computer Science I
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.7 Commenting Your Code
  4. 1.16 Debugging Strategies
  5. 5.2 Graphics Challenges
  6. 7.1 Control Structures Challenges
  7. 9.1 Functions Challenges
  8. 12.1 Breakout
  9. 13.1 Project Prep and Development
7352.D1.3
Analyze and explain the behavior of simple programs utilizing variables, expressions, assignments, I/O, control structures, functions, parameter passing, preconditions, postconditions, and invariants.
  1. Indiana Computer Science I
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.7 Commenting Your Code
  4. 1.16 Debugging Strategies
  5. 7.1 Control Structures Challenges
  6. 8.1 Functions and Parameters 1
  7. 8.2 Functions and Parameters 2
  8. 8.3 Functions and Parameters 3
7352.D1.4
Utilize fundamental data types including Primitive types (Integers, Real Numbers, Booleans, and Characters), Pointers, Arrays, Records/Structures, Strings, Enumerations
  1. Indiana Computer Science I
  2. 4.2 Variables
  3. 4.4 Basic Math in JavaScript
  4. 6.1 Booleans
  5. 26.2 Indexing Into an Array
  6. 26.3 Adding/Removing From an Array
  7. 26.5 Iterating Over an Array
7352.D1.5
Use the techniques of decomposition to modularize a program.
  1. Indiana Computer Science I
  2. 1.4 Functions in Karel
  3. 1.6 Top Down Design and Decomposition in Karel
  4. 8.1 Functions and Parameters 1
  5. 8.2 Functions and Parameters 2
  6. 8.3 Functions and Parameters 3
  7. 8.4 Functions and Return Values 1
  8. 8.5 Functions and Return Values 2
  9. 8.6 Local Variables and Scope
7352.D1.6
Apply a variety of strategies to the testing and debugging of simple programs including: ● Conduct code reviews (focused on common coding errors and the extent to which the code meets documentation and programming style standards) on program components. ● Differentiate between program validation and verification. ● Ensure programs use defensive programming techniques, including input validation, type checking, and protection against buffer overflow. ● Implement refactoring within given program components.
  1. Indiana Computer Science I
  2. 1.16 Debugging Strategies
  3. 5.1 Collaborative Programming
7352.D2.1
Explain the role of algorithms in problem-solving including: ● Analyze and compare the best, average, and worst-case behaviors and performance of an algorithm for given problems with various input sizes ● Implement a basic numerical algorithm and apply to a given problem. ● Discuss the halting problem and why it has no algorithmic solution. ● Investigate factors other than computational efficiency that influence the choice of algorithms.
  1. Indiana Computer Science I
  2. 1.1 Introduction to Programming With Karel
  3. 1.14 More Karel Examples and Testing
  4. 4.4 Basic Math in JavaScript
7352.D2.2
Analyze machine level representation of data including: ● Bits, bytes, and words ● Numeric data representation (Binary, Hexadecimal, BCD, 1's Complement, 2's Complement, and Floating Point format) ● Non-numeric data (Characters, Images, Sounds, Video) ● Illustrate color models and their use in computer graphics. ● Conversion of numerical data from one format to another ● Effect of fixed-length number representations on accuracy and precision
  1. Indiana Computer Science I
  2. 4.6 Pixel Images
  3. 4.7 Using RGB to Create Colors
  4. Indiana Computer Science III: Cybersecurity
  5. 24.2 Notational Systems
  6. 24.3 Data Representation
7352.D2.3
Describe, compare, and contrast the components of Computer Architecture which include all portions of the Von Neumann machine as well as assembly/machine language. Explore the impact of memory latency on execution time (Von Neumann Bottleneck).
  1. Indiana Computer Science III: Cybersecurity
  2. 7.1 Internal Components
  3. 7.2 Peripheral Devices
7352.D2.4
Examine major objectives, functions, features, and concepts of modern operating systems. ● Discuss the role, purpose of operating systems ● Compare prevailing types of operating systems. ● Discuss potential threats to operating systems and appropriate features used to provide protection and security. ● Diagram the interaction of an Application Programming Interface (API) with an operating system. ● Illustrate how applications use computing resources managed by the operating system and explain the need for concurrency and common methods to implement concurrency. ● Illustrate the principles of memory management including virtual memory, paging, thrashing, and partitioning. ● Diagram the physical hardware devices and the virtual devices maintained by an operating system.
  1. Indiana Computer Science III: Cybersecurity
  2. 6.1 Operating Systems
  3. 6.2 Comparing Operating Systems
  4. 6.3 Compatibility
  5. 7.1 Internal Components
  6. 7.3 Network Devices
  7. 7.4 Storage Options
  8. 7.7 Network Management
7352.D2.5
Investigate principles of secure design. ● Analyze the tradeoffs associated with designing security into a product. ● Implement input validation in applications ● Discuss the security implications of relying on open design vs the secrecy of design. ● Explain the tradeoffs of developing a program in a type-safe language. ● Investigate potential errors detected from both strong-type and weak-type languages. ● Investigate potential vulnerabilities in provided programming code. ● Investigate common coding errors that introduce security vulnerabilities, such as buffer overflows, integer errors, and memory leaks.
  1. Indiana Computer Science III: Cybersecurity
  2. 9.3 The Value of Data
  3. 9.9 Common Security Problems
  4. 9.10 SQL Injection Overview
  5. 9.11 Types of SQLi and Prevention
  6. 10.1 Project: Security Assessment Report
  7. 12.4 Penetration Testing
7352.D2.6
Assess human-computer interaction and design issues that analyze the importance of humancentered software and then implement a simple usability test for an existing software application.