Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Introduction to Computer Science

42

Standards in this Framework

28

Standards Mapped

66%

Mapped to Course

Standard Lessons
4803.D1.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
4803.D1.2
Explain the benefits and responsibilities of being a member of a CTSO.
4803.D1.3
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
4803.D1.4
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
4803.D2.1
Use supporting evidence from multiple sources such as job postings and workforce data, to examine and describe careers in the career cluster and identify the roles and responsibilities of each.
  1. 1.17 Computer Science Careers
4803.D2.2
Evaluate resources that keep workers current in career-related knowledge and technology for careers within the career cluster.
4803.D2.3
Identify employers’ expectations, appropriate work habits, ethical conduct, legal responsibilities, and good citizenship skills.
  1. 3.2 Digital Footprint and Reputation
4803.D2.4
Demonstrate the qualities, attributes, and skills necessary to succeed in, or further prepare for a chosen career while effectively contributing to society.
  1. 1.17 Computer Science Careers
4803.D2.5
Complete one or more career cluster aptitude/interest surveys, analyze the results, and examine how personal career aptitudes align with careers in a field or pathway of interest.
4803.D2.6
Distinguish differences among careers within the career cluster and identify trends related to at least five careers/pathways.
4803.D2.7
Explain opportunities, benefits, and risks of entrepreneurial career pathways in the career cluster.
4803.D2.8
Explore the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
  3. 3.4 Information Literacy
  4. 3.5 Creative Credit & Copyright
  5. 3.6 Hacking Ethics
  6. 14.5 Software Licenses
4803.D2.9
Describe ethical and legal practices safeguarding the confidentiality of business-and personalrelated information.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
  3. 3.5 Creative Credit & Copyright
4803.D3.1
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise).
  1. 14.1 Programming Fundamentals
4803.D3.2
Define algorithm (a set of clearly defined logical steps to solve a problem).
  1. 1.1 Introduction to Programming With Karel
  2. 1.2 More Basic Karel
  3. 14.1 Programming Fundamentals
4803.D3.3
Demonstrate an understanding of algorithms and their practical applications.
  1. 14.1 Programming Fundamentals
4803.D3.4
Create, evaluate, and adjust algorithms to solve a variety of problems.
  1. 1.1 Introduction to Programming With Karel
  2. 1.2 More Basic Karel
  3. 1.3 Karel Can't Turn Right
  4. 1.4 Functions in Karel
  5. 1.14 More Karel Examples and Testing
4803.D3.5
Use an iterative problem-solving process to design and refine solutions to a variety of problems.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.16 Debugging Strategies
  3. 17.1 Project Prep and Development
4803.D4.1
Explain the importance of Acceptable Use Policies and data and physical security.
  1. 3.3 Privacy & Security
4803.D4.2
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.
  1. 3.3 Privacy & Security
  2. 3.7 Identifying Risks
4803.D4.3
Evaluate methods of keeping information secret from those whom the information should be kept secret.
  1. 3.3 Privacy & Security
  2. 3.7 Identifying Risks
  3. 3.8 Assessing Risk
4803.D4.4
Evaluate methods of protecting information and information systems from disruption and destruction.
  1. 3.7 Identifying Risks
  2. 3.8 Assessing Risk
4803.D4.5
Explain the importance of encapsulating resources, i.e., creating well-defined interfaces around resources to set rules for how the resources should interact.
4803.D4.6
Analyze how the connected nature of the Internet allows an adversary to reach a large number of devices.
  1. 3.1 Intro to Cybersecurity
  2. 6.5 Routing
4803.D4.7
Identify and predict the outcomes of security vulnerabilities at the physical/link layer, the network layer, the transport layer, and the application layer.
4803.D4.8
Identify and distinguish between the purposes of network security devices and technologies.
4803.D4.9
Compare and contrast data protection legislation, policies, and procedures that have been or are being introduced all over the world to protect personal data.
  1. 3.3 Privacy & Security
4803.D4.10
Students will identify how hardware and software work together in complex ways to achieve and overall objective.
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
4803.D5.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
4803.D5.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. 3.2 Digital Footprint and Reputation
4803.D5.3
Evaluate various solutions to common hardware and software problems.
4803.D5.4
Describe how software and hardware interact.
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
  4. 4.6 Cloud Computing
4803.D5.5
Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compresses/uncompressed files).
4803.D6.1
Define key computing terms (e.g., hardware, software, data, etc.).
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
  4. 4.6 Cloud Computing
  5. 4.8 Cloud Storage
  6. 4.9 The Impact of Artificial Intelligence
4803.D6.2
Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.).
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
  4. 14.2 Operating Systems
  5. 14.3 Comparing Operating Systems
  6. 14.4 Software and Applications
  7. 15.1 Internal Components
  8. 15.2 Peripheral Devices
4803.D6.3
Define the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.).
  1. 5.1 Intro to Digital Information
  2. 5.2 Number Systems
  3. 5.3 Encoding Text with Binary
4803.D7.1
Express the design of a program using representations such as flowcharts and pseudocode.
  1. 1.6 Top Down Design and Decomposition in Karel
4803.D7.2
Analyze and explain how a particular program functions.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.7 Commenting Your Code
  4. 1.16 Debugging Strategies
4803.D7.3
Solve problems of increasing complexity using visual block-based programming individually and collaboratively.
  1. 1.1 Introduction to Programming With Karel
  2. 1.2 More Basic Karel
  3. 1.3 Karel Can't Turn Right
  4. 1.4 Functions in Karel
  5. 1.5 The Start Function
  6. 1.8 Super Karel
  7. 1.9 For Loops
  8. 1.10 If Statements
  9. 1.11 If/Else Statements
  10. 1.12 While Loops in Karel
  11. 9.1 Collaborative Programming
4803.D7.4
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for).
  1. 1.4 Functions in Karel
  2. 1.9 For Loops
  3. 1.10 If Statements
  4. 1.11 If/Else Statements
  5. 1.12 While Loops in Karel
  6. 8.3 Variables
  7. 8.5 Basic Math in JavaScript
  8. 10.1 Booleans
  9. 10.2 Logical Operators
  10. 10.3 Comparison Operators
  11. 10.4 If Statements
  12. 10.5 For Loops in JavaScript
  13. 10.8 Random Numbers
  14. 10.9 While Loops
4803.D7.5
Differentiate between text and numerical data.
  1. 5.3 Encoding Text with Binary
  2. 8.3 Variables
  3. 8.4 User Input
4803.D7.6
Edit, compile/run, test, and debug a program.
  1. 1.16 Debugging Strategies
  2. 2.1 Challenge Problems
  3. 9.2 Graphics Challenges
  4. 11.1 Control Structures Challenges
  5. 13.1 Functions Challenges
  6. 17.1 Project Prep and Development