Please enable JavaScript to use CodeHS

Standards Mapping

for IN Computing Foundations for a Digital Age

34

Standards in this Framework

30

Standards Mapped

88%

Mapped to Course

Standard Lessons
4565.D1.1
Students create an understanding of computer science and explore how it impacts their everyday lives.
  1. 4.1 History of Computers
  2. 4.5 Future of Computing
  3. 6.7 The Impact of the Internet
  4. 7.1 Project: The Effects of the Internet
4565.D1.2
Create a definition of computer science and computational thinking and explore growing and emerging careers in the computer science and information technology fields, as well as how changing technology impacts careers in all sectors.
  1. 1.17 Computer Science Careers
4565.D1.3
Demonstrate awareness of the history of computing.
  1. 4.1 History of Computers
4565.D1.4
Investigate trends in computer science and their impact on society.
  1. 4.5 Future of Computing
  2. 6.7 The Impact of the Internet
4565.D1.5
Summarize ethical issues within computer science.
  1. 3.2 Digital Footprint and Reputation
  2. 3.5 Creative Credit & Copyright
  3. 3.6 Hacking Ethics
  4. 14.5 Software Licenses
4565.D2.1
Students analyze computer devices and other technologies to build an understanding of their impact on society and how to use them appropriately.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
  3. 3.4 Information Literacy
4565.D2.2
Demonstrate understanding of the hardware and operating systems of computers and identify and analyze aspects such as functionality, cost, size, speed, accessibility, and aesthetics of hardware and software.
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
  4. 4.6 Cloud Computing
  5. 4.8 Cloud Storage
  6. 14.4 Software and Applications
  7. 15.1 Internal Components
  8. 15.2 Peripheral Devices
4565.D2.3
Discuss the ethical and appropriate use of computer devices and examine device usability through several lenses including accessibility, ergonomics, and learnability.
4565.D2.4
Explore the fundamental principles and components of computer networking.
  1. 6.2 Internet Hardware
  2. 6.3 Internet Addresses
  3. 6.4 DNS
  4. 6.5 Routing
  5. 6.6 Packets and Protocols
  6. 15.3 Network Devices
4565.D2.5
Examine the impact of the Internet on society.
  1. 6.7 The Impact of the Internet
  2. 7.1 Project: The Effects of the Internet
4565.D2.6
Investigate the use of artificial intelligence by individuals and society.
4565.D2.7
Investigate innovations in computing, including robotics and the Industrial Internet of Things (IIoT).
4565.D3.1
Students connect the process of developing a computing artifact (ex. computer application, web application, operating system, artificial intelligence) with the skills needed during the development process to have a better understanding of what it takes to build a computing artifact.
  1. 5.1 Intro to Digital Information
  2. 5.4 Pixel Images
  3. 14.1 Programming Fundamentals
  4. 14.2 Operating Systems
  5. 14.4 Software and Applications
4565.D3.2
Use the design process to iteratively develop a computing artifact.
4565.D3.3
Demonstrate competencies of programming constructs, including use of data types and variables, control structures (sequencing, looping, branching), and modularity (such as a function).
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
  6. 8.2 Hello World
  7. 8.3 Variables
  8. 10.4 If Statements
  9. 10.5 For Loops in JavaScript
  10. 10.9 While Loops
  11. 10.10 Loop and a Half
  12. 12.6 Local Variables and Scope
4565.D3.4
Understand how abstractions hide implementation details when used in everyday objects.
  1. 1.4 Functions in Karel
4565.D3.5
Use abstraction to manage program complexity (such as a function to create recallable code).
  1. 1.4 Functions in Karel
  2. 12.1 Functions and Parameters 1
  3. 12.2 Functions and Parameters 2
  4. 12.3 Functions and Parameters 3
  5. 12.4 Functions and Return Values 1
  6. 12.5 Functions and Return Values 2
4565.D3.6
Formulate algorithms using programming structures to decompose a complex problem.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.8 Super Karel
  4. 11.1 Control Structures Challenges
  5. 13.1 Functions Challenges
4565.D3.7
Assess a program by testing to verify correct behavior.
  1. 1.7 Commenting Your Code
  2. 1.16 Debugging Strategies
4565.D3.8
Construct a computing artifact that has a user interface.
  1. 8.4 User Input
  2. 8.6 Using Graphics in JavaScript
  3. 21.3 Random Ghosts
  4. 21.5 Mouse Events: Mouse Clicked
  5. 21.6 Mouse Events: Mouse Moved
  6. 21.7 Drawing Lines
  7. 21.8 Key Events
  8. 21.9 Crazy Ball Game
  9. 23.1 Breakout
  10. 34.1 Tic Tac Toe
4565.D3.9
Produce an artifact that includes rich media (e.g., text, graphics, animations, or video).
  1. 5.3 Encoding Text with Binary
  2. 5.4 Pixel Images
  3. 5.6 Pixel Colors!
  4. 8.6 Using Graphics in JavaScript
  5. 21.3 Random Ghosts
  6. 21.4 Bouncing Ball
  7. 21.7 Drawing Lines
  8. 21.9 Crazy Ball Game
  9. 22.1 Animation Challenges
  10. 23.1 Breakout
  11. 27.1 Fun Snake
4565.D3.10
Illustrate knowledge of good programming practice including the use of conventional standards and comments.
  1. 1.7 Commenting Your Code
  2. 1.15 How to Indent Your Code
  3. 1.16 Debugging Strategies
  4. 9.1 Collaborative Programming
4565.D4.1
Students describe the types of data and how it is created, stored, and used by computers.
  1. 4.8 Cloud Storage
  2. 5.1 Intro to Digital Information
  3. 5.2 Number Systems
  4. 5.3 Encoding Text with Binary
  5. 5.4 Pixel Images
  6. 5.5 Hexadecimal
  7. 5.6 Pixel Colors!
  8. 14.1 Programming Fundamentals
4565.D4.2
Understand how computers represent data, including text, sound, images, and numbers.
  1. 5.1 Intro to Digital Information
  2. 5.2 Number Systems
  3. 5.3 Encoding Text with Binary
  4. 5.4 Pixel Images
  5. 5.5 Hexadecimal
  6. 5.6 Pixel Colors!
4565.D4.3
Create data visualizations, models, and simulations using data collected using computational tools such as surveys.
  1. 16.1 Getting Started with Data
  2. 16.2 Visualizing and Interpreting Data
  3. 16.3 Present a Data-Driven Insight
  4. 29.1 Evolution Simulation
4565.D4.4
Evaluate data to better understand the world.
  1. 16.2 Visualizing and Interpreting Data
  2. 16.3 Present a Data-Driven Insight
4565.D4.5
Explore the relationship between information and data.
  1. 16.1 Getting Started with Data
  2. 16.2 Visualizing and Interpreting Data
  3. 16.3 Present a Data-Driven Insight
  4. 29.1 Evolution Simulation
  5. 32.1 Visualizing Music
4565.D5.1
Examine the dynamic between privacy and security.
  1. 3.1 Intro to Cybersecurity
  2. 3.3 Privacy & Security
4565.D5.2
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
4565.D5.3
Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
  3. 3.4 Information Literacy
  4. 3.7 Identifying Risks
4565.D5.4
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 3.1 Intro to Cybersecurity
  2. 3.8 Assessing Risk
4565.D5.5
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical implications.
  1. 3.7 Identifying Risks
  2. 3.8 Assessing Risk
4565.D5.6
Discuss the laws surrounding intellectual property.
  1. 3.5 Creative Credit & Copyright
  2. 14.5 Software Licenses
4565.D5.7
Examine tradeoffs in computing technologies through current events related to broad ideas including privacy, communication, and automation (i.e. driverless cars can increase convenience and reduce accidents, but they are susceptible to hacking. The emerging industry will reduce the number of taxi and ride-share drivers but will create software engineering and cybersecurity jobs).
  1. 3.6 Hacking Ethics
  2. 4.5 Future of Computing