Please enable JavaScript to use CodeHS

Standards Mapping

for Kentucky 9-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, end devices, topology, and addressing.
  1. 7.2 Internet Hardware
  2. 7.5 Routing
Give examples to illustrate how sensitive data can be affected by viruses, malware and other attacks.
  1. 15.3 Impact of Cybersecurity
Recommend security measures to address various scenarios based on factors such as usability, efficiency, feasibility, and ethical impacts.
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). *
  1. 7.2 Internet Hardware
Compare ways software developers protect devices and information from unauthorized access. *
Evaluate the tradeoffs in how data elements are organized and where data is stored.*
Collect data using appropriate data collection tools and techniques to support a claim or to communicate information.
Understand and design database structures to optimize search and retrieval.*
Explain the privacy concerns related to the collection and generation of data.
  1. 7.7 The Impact of the Internet
  2. 9.4 Privacy & Security
Use data analysis tools (e.g. formulas and other software data / statistical tools) to process and transform the data to make it more useful and reliable.
Use data analysis tools and techniques to identify patterns and analyze data represented in complex systems.
Create computational models that represent the relationships among different elements of data.
Create interactive data visualizations using software tools to help others better understand real-world phenomena.
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.*
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
Use a development process in creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
Use functions, data structures or objects to simplify solutions, generalizing computational problems instead of repeated use of simple variables.
  1. 1.4 Functions in Karel
  2. 13.8 Functions
  3. 13.13 Parameters
Design and iteratively develop event-driven computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 10.1 Project: Public Service Announcement
  2. 13.19 Putting Together Control Structures
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 13.8 Functions
  4. 13.10 Top Down Design
  5. 13.13 Parameters
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance and explain the benefits and drawbacks of choices made.
  1. 1.13 Control Structures Example
  2. 13.4 For Loops
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
  1. 13.19 Putting Together Control Structures
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 13.8 Functions
  2. 13.13 Parameters
Evaluate and refine computational artifacts to make them more usable and accessible using systematic testing and debugging.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.19 Putting Together Control Structures
Systematically design and develop programs for broad audiences by incorporating feedback from users.
Design and develop computational artifacts working in team roles using collaborative tools.*
Describe how artificial intelligence drives many software and physical systems.*
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
Use and adapt classic algorithms to solve computational problems.*
Evaluate algorithms in terms of their efficiency, correctness, and clarity.*
  1. 13.4 For Loops
Compare and contrast fundamental data structures and their uses.*
Illustrate the flow of execution of a recursive algorithm.*
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.*
  1. 1.16 Karel Challenges
  2. 13.8 Functions
  3. 13.13 Parameters
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.*
  1. 13.10 Top Down Design
  2. 13.19 Putting Together Control Structures
Select and employ an appropriate component or library to facilitate programming solutions.*
  1. 1.8 Super Karel
Develop programs for multiple computing platforms.*
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.*
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., introducing errors).*
Evaluate key qualities (including correctness, usability, readability, and efficiency) of a program.*
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.*
Reduce bias and equity deficits through the design of accessible computational artifacts.
Evaluate and assess how computing impacts personal, ethical, social, economic, and cultural practices.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Research how computational innovations that have revolutionized aspects of our culture might have evolved from a need to solve a problem.
  1. 8.1 Project: The Effects of the Internet
Explain the beneficial and harmful effects that laws governing data (intellectual property, privacy etc.) can have on innovation.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
  4. 9.3 Internet Safety
  5. 9.4 Privacy & Security
Evaluate and design computational artifacts to maximize their benefit to society.*
  1. 10.1 Project: Public Service Announcement
Evaluate the impact of the digital divide (i.e. inequity of computing access, education and influence) on the development of local communities and society.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Demonstrate ways computational design (i.e. algorithms, abstractions and analysis) can apply to problems across disciplines.*
Debate laws and regulations that impact the development and use of software and the protection of privacy.
  1. 9.6 Creative Credit & Copyright
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
Compare levels of abstraction and interactions between application software, system software and hardware layers.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 1.7 Commenting Your Code
Categorize the roles of operating system software.
  1. 2.3 Software
Illustrate ways computing systems implement logic, input, and output through hardware components.*
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware