Please enable JavaScript to use CodeHS

Standards Mapping

for Idaho Digital Literacy

Clear selection Print / Download

21

Standards in this Framework

18

Standards Mapped

85%

Mapped to Course

Standard Lessons
9-12.CS.1.4
Create or modify a program that uses different forms of input and output.
  1. Fundamentals of Cybersecurity
  2. 14.4 User Input
  3. Introduction to Python Programming
  4. 3.3 User Input
9-12.CS.1.6
Create a model of how embedded systems sense, process, and interact in a given environment.
9-12.CS.2.6
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, and the government.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
9-12.CS.3.4
Identify and evaluate the beneficial and harmful effects of computing innovations on behavior and culture.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
  3. 5.9 Impact of the Internet
9-12.CS.3.5
Debate how the issues of equity, data access, and distribution of computing resources create a digital divide in a global society.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
9-12.CS.3.8
Research and explain the social, moral, ethical, and legal impacts of artificial intelligence systems and respective usage.
  1. Introduction to AI for High School (1 month)
  2. 1.5 Who Builds AI?
  3. 4.1 Effects of Using Biased AI
  4. 4.4 Project: AI on Trial
9-12.CS.5.2
Design algorithms using sequence, selection, iteration and recursion.  *Recursion will be addressed in an upper computer science course.
  1. Fundamentals of Cybersecurity
  2. 14.6 Branching: If Statements
  3. 14.8 Looping: For Loops
  4. Introduction to Python Programming
  5. 5.2 If Statements
  6. 7.2 For Loops
  7. 28.10 For Loops
9-12.CS.5.1
Diagram the flow and execution and output of a given program.
9-12.CS.3.2
Explain the social and economic implications associated with unethical computing practices. 
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
9-12.CS.3.3
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large-scale analysis of personal information.
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. 8.1 Data as a Resource
9-12.CS.3.7
Understand and define artificial intelligence.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
  3. Introduction to AI for High School (1 month)
  4. 1.1 Human & Artificial Intelligence
9-12.CS.5.23
Critically examine algorithms and design an original algorithm (adapt, remix, improve).
  1. Fundamentals of Cybersecurity
  2. 14.2 Printing in Python
  3. 14.6 Branching: If Statements
  4. Introduction to Python Programming
  5. 3.1 Printing in Python
  6. 3.5 String Operators
  7. 5.1 Booleans
  8. 5.2 If Statements
  9. 7.3 Break and Continue
  10. 28.2 Printing in Python
  11. 28.5 String Operators
9-12.ICT.2.1
Develop and manage their digital identity and understand the permanence of their digital actions including the effect on current and future reputation.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
9-12.ICT.2.3
Demonstrate an understanding of the rights and obligations of using and sharing intellectual property.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
  3. 1.4 Cyber Ethics and Laws
9-12.ICT.2.4
Maintain their digital security and understand data collection technology used to track their online activity.
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. 8.1 Data as a Resource
9-12.CS.3.1
Demonstrate responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
9-12.ICT.2.2
Engage in positive, safe, legal and ethical behavior when using technology.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
ODC.9-10.5
Manage personal data to maintain digital privacy and security and be conscious and aware of data-collection technology used to track and exploit navigation online. 
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. 8.1 Data as a Resource
ODC.11-12.5
Demonstrate the responsible and ethical use of information and communication technologies by distinguishing between kinds of information that should and should not be publicly shared and describing the consequences of a poor decision.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
  3. 1.4 Cyber Ethics and Laws
ODC.9-12.6.
Integrate multiple sources of information presented in diverse digital media, evaluating the credibility and accuracy of each source.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
ODC.9-12.8.
Make strategic use of digital media presentations to enhance understanding of findings, reasoning, and evidence and to add interest.