Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computing Foundations for a Digital Age (OUTDATED)

34

Standards in this Framework

34

Standards Mapped

100%

Mapped to Course

Standard Lessons
4565.D1.1
Students create an understanding of computer science and explore how it impacts their everyday lives.
  1. 3.1 History of Computers
  2. 3.5 Future of Computing
  3. 3.9 The Impact of Artificial Intelligence
  4. 5.7 The Impact of the Internet
4565.D1.2
Create a definition of computer science and computational thinking and explore growing and emerging careers in the computer science and information technology fields, as well as how changing technology impacts careers in all sectors.
  1. 1.17 Computer Science Careers
4565.D1.3
Demonstrate awareness of the history of computing.
  1. 3.1 History of Computers
4565.D1.4
Investigate trends in computer science and their impact on society.
  1. 3.5 Future of Computing
  2. 3.9 The Impact of Artificial Intelligence
  3. 5.7 The Impact of the Internet
4565.D1.5
Summarize ethical issues within computer science.
  1. 2.4 Cyber Ethics and Laws
4565.D2.1
Students analyze computer devices and other technologies to build an understanding of their impact on society and how to use them appropriately.
  1. 2.1 Digital Footprint and Responsibility
  2. 2.2 Personal Data and Collection
  3. 2.3 Can All Information Be Trusted?
  4. 3.6 Cloud Computing
  5. 3.9 The Impact of Artificial Intelligence
4565.D2.2
Demonstrate understanding of the hardware and operating systems of computers and identify and analyze aspects such as functionality, cost, size, speed, accessibility, and aesthetics of hardware and software.
  1. 3.2 Computer Organization
  2. 3.3 Software
  3. 3.4 Hardware
  4. 3.6 Cloud Computing
  5. 3.8 Cloud Storage
4565.D2.3
Discuss the ethical and appropriate use of computer devices and examine device usability through several lenses including accessibility, ergonomics, and learnability.
  1. 2.1 Digital Footprint and Responsibility
  2. 2.2 Personal Data and Collection
  3. 2.4 Cyber Ethics and Laws
  4. 3.9 The Impact of Artificial Intelligence
4565.D2.4
Explore the fundamental principles and components of computer networking.
  1. 5.2 Internet Hardware
  2. 5.3 Internet Addresses
  3. 5.4 DNS
  4. 5.5 Routing
  5. 5.6 Packets and Protocols
4565.D2.5
Examine the impact of the Internet on society.
  1. 2.1 Digital Footprint and Responsibility
  2. 2.3 Can All Information Be Trusted?
  3. 5.7 The Impact of the Internet
4565.D2.6
Investigate the use of artificial intelligence by individuals and society.
  1. 2.3 Can All Information Be Trusted?
  2. 3.9 The Impact of Artificial Intelligence
4565.D2.7
Investigate innovations in computing, including robotics and the Industrial Internet of Things (IIoT).
  1. 2.6 Cybersecurity Essentials
4565.D3.1
Students connect the process of developing a computing artifact (ex. computer application, web application, operating system, artificial intelligence) with the skills needed during the development process to have a better understanding of what it takes to build a computing artifact.
  1. 3.3 Software
  2. 4.1 Intro to Digital Information
  3. 4.4 Pixel Images
4565.D3.2
Use the design process to iteratively develop a computing artifact.
  1. 9.1 Project Prep and Development
4565.D3.3
Demonstrate competencies of programming constructs, including use of data types and variables, control structures (sequencing, looping, branching), and modularity (such as a function).
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
  6. 6.2 Hello World
  7. 6.3 Variables
  8. 7.4 If Statements
  9. 7.5 For Loops in JavaScript
  10. 7.9 While Loops
  11. 7.10 Loop and a Half
4565.D3.4
Understand how abstractions hide implementation details when used in everyday objects.
  1. 1.4 Functions in Karel
  2. 4.1 Intro to Digital Information
4565.D3.5
Use abstraction to manage program complexity (such as a function to create recallable code).
  1. 1.4 Functions in Karel
  2. 1.5 The Start Function
  3. 1.6 Top Down Design and Decomposition in Karel
  4. 9.1 Project Prep and Development
4565.D3.6
Formulate algorithms using programming structures to decompose a complex problem.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.8 Super Karel
  4. 9.1 Project Prep and Development
4565.D3.7
Assess a program by testing to verify correct behavior.
  1. 1.7 Commenting Your Code
  2. 1.16 Debugging Strategies
4565.D3.8
Construct a computing artifact that has a user interface.
  1. 6.4 User Input
  2. 6.6 Using Graphics in JavaScript
4565.D3.9
Produce an artifact that includes rich media (e.g., text, graphics, animations, or video).
  1. 4.3 Encoding Text with Binary
  2. 4.4 Pixel Images
  3. 4.6 Pixel Colors!
  4. 6.6 Using Graphics in JavaScript
4565.D3.10
Illustrate knowledge of good programming practice including the use of conventional standards and comments.
  1. 1.7 Commenting Your Code
  2. 1.15 How to Indent Your Code
  3. 1.16 Debugging Strategies
4565.D4.1
Students describe the types of data and how it is created, stored, and used by computers.
  1. 3.8 Cloud Storage
  2. 4.1 Intro to Digital Information
  3. 4.2 Number Systems
  4. 4.3 Encoding Text with Binary
  5. 4.4 Pixel Images
  6. 4.5 Hexadecimal
  7. 4.6 Pixel Colors!
4565.D4.2
Understand how computers represent data, including text, sound, images, and numbers.
  1. 4.1 Intro to Digital Information
  2. 4.2 Number Systems
  3. 4.3 Encoding Text with Binary
  4. 4.4 Pixel Images
  5. 4.5 Hexadecimal
  6. 4.6 Pixel Colors!
4565.D4.3
Create data visualizations, models, and simulations using data collected using computational tools such as surveys.
  1. 8.1 Getting Started with Data
  2. 8.2 Visualizing and Interpreting Data
  3. 8.3 Present a Data-Driven Insight
4565.D4.4
Evaluate data to better understand the world.
  1. 8.2 Visualizing and Interpreting Data
  2. 8.3 Present a Data-Driven Insight
4565.D4.5
Explore the relationship between information and data.
  1. 8.1 Getting Started with Data
  2. 8.2 Visualizing and Interpreting Data
  3. 8.3 Present a Data-Driven Insight
4565.D5.1
Examine the dynamic between privacy and security.
  1. 2.2 Personal Data and Collection
  2. 2.5 Personal Data Security
  3. 2.6 Cybersecurity Essentials
4565.D5.2
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 2.1 Digital Footprint and Responsibility
  2. 2.2 Personal Data and Collection
  3. 2.5 Personal Data Security
4565.D5.3
Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 2.2 Personal Data and Collection
  2. 2.3 Can All Information Be Trusted?
  3. 2.4 Cyber Ethics and Laws
4565.D5.4
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 2.6 Cybersecurity Essentials
  2. 2.7 Common Cyber Attacks and Prevention
4565.D5.5
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical implications.
  1. 2.5 Personal Data Security
  2. 2.6 Cybersecurity Essentials
  3. 2.7 Common Cyber Attacks and Prevention
4565.D5.6
Discuss the laws surrounding intellectual property.
  1. 2.4 Cyber Ethics and Laws
4565.D5.7
Examine tradeoffs in computing technologies through current events related to broad ideas including privacy, communication, and automation (i.e. driverless cars can increase convenience and reduce accidents, but they are susceptible to hacking. The emerging industry will reduce the number of taxi and ride-share drivers but will create software engineering and cybersecurity jobs).
  1. 3.5 Future of Computing
  2. 3.9 The Impact of Artificial Intelligence