Please enable JavaScript to use CodeHS

Standards Framework

for Louisiana 9-12

46

Standards in this Framework

Standard Description
H.CS.1A Analyze the levels of interactions between application software and system software as well as the hardware layers.
H.CS.1B Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday things
H.CS.2A Generate guidelines that convey systematic troubleshooting strategies that other users can utilize to identify and fix errors.
E.NI.1A Evaluate a network's scalability, reliability, and appropriateness by describing the relationship between routers, switches, devices, topology, and addressing (MAC, IP, Subnet, Gateway).
E.NI.1B Illustrate how to trace data through a network model, explaining the interactions that occur throughout the process.
E.NI.1C Describe and evaluate the internet as a digital public infrastructure (DPI) from the highest level to the private service provider level.
H.NI.2B Recommend security measures to address factors that create trade-offs between the usability and security of a computing system.
H.NI.2A Interpret and analyze mechanisms through which malware and other types of cyber attacks can impact hardware, software, and sensitive data.
H.NI.2C Compare and contrast how software developers protect computing systems and information from unauthorized user access.
H.DA.1A Evaluate data representations, propose strategies to reconstruct the data, and visualize data in a variety of ways.
H.DA.1B Define and describe database structures to optimize the search and retrieval of data.
H.DA.2A Explain and describe the impacts of uncertainty and the limitations of data collection technology and tools.
H.DA.2B Describe the personal and legal impacts of accumulated data, both collected and derived, for given scenarios. Propose tools and techniques to manage the accumulated data appropriately
H.DA.3A Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity.
H.DA.3B Explain and utilize the appropriate data structural organization system to collaborate and communicate data within a team or user group in given scenarios.
H.DA.4A Create interactive data visualizations using software tools that explain complex data to others.
H.DA.4B Utilize data analysis tools to ingest (extract, transform, and load) and process data into relevant information.
H.DA.5A Create a model utilizing data with the appropriate simulated variables to develop predictions for real-world phenomena.
H.DA.5B Apply and evaluate data analysis techniques to identify patterns represented in complex systems.
H.DA.5C Analyze patterns in data visualizations, then select a collection tool to test a hypothesis and communicate the relevant information to others.
H.DA.5D Evaluate the impacts of the variables and the model on the performance of a simulation to refine a hypothesis.
H.AP.1A Assess variables, then classify the scope and type of variable.
H.AP.1B Design algorithms that can be adapted to express an idea or solve a problem.
H.AP.1C Use and adapt classical algorithms to solve computational problems.
H.AP.1D Explain what computer memory is and how variables are stored and retrieved.
H.AP.1E Identify and explain how a derived data type can be utilized in a real-world scenario.
H.AP.2A Justify the selection of control structures to balance implementation complexity, maintainability, and program performance.
H.AP.2B Design and iteratively develop computational artifacts using events to initiate instructions.
H.AP.3A Decompose problems into smaller components using constructs such as procedures, modules, and/or objects.
H.AP.3B Create computational artifacts using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
H.AP.4A Utilize the Software Development Life Cycle (SDLC) to create software that is a minimum viable product.
H.AP.4B Develop and utilize test cases to verify that a program performs according to the program’s design specifications.
H.AP.4C Design and develop programs by working in team roles using version control systems, integrated development environments (IDEs), and collaborative tools and practices.
H.AP.4D Evaluate licenses that limit or restrict the use of computational artifacts when utilizing resources such as libraries.
H.IC.1A Analyze the key milestones of computer science, historical events influenced by computer science, and the people connected to these achievements.
H.IC.1B Explain how innovations in computer science and technology enable advancements in other fields of study.
H.IC.2A Evaluate the adoption and adaptation of social norms from the physical world to the cyber world.
H.IC.2B Describe how cyberspace is becoming a universal medium for connecting humans, the economy, business, and computing.
H.IC.2C Describe and critique how algorithmic feedback loops can shape perceptions, reinforce a limited data set, and limit the sources of information that may inform the individual user.
H.IC.3A Debate laws and industry regulations that impact the development and use of computational artifacts.
H.IC.3B Describe and analyze the motives of online threat actors to a user’s personal safety, privacy, and well-being.
H.IC.3C Compare and contrast the varied approaches to govern data, intellectual property, control information access, and various ways for users to be aware of guidance.
H.IC.3D Explain how the interconnectedness of cyberspace can lead to physical and digital vulnerabilities.
H.IC.3E Debate the ethical considerations of creating and publishing computational artifacts.
H.IC.3F Analyze the data provenance of computational artifacts.
H.IC.3G Explain how individuals and organizations can exert influence on personal and societal perceptions and practices through computing technologies.