Please enable JavaScript to use CodeHS

Standards Mapping

for Louisiana 9-12

46

Standards in this Framework

14

Standards Mapped

30%

Mapped to Course

Standard Lessons
H.CS.1A
Analyze the levels of interactions between application software and system software as well as the hardware layers.
H.CS.1B
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday things
H.CS.2A
Generate guidelines that convey systematic troubleshooting strategies that other users can utilize to identify and fix errors.
E.NI.1A
Evaluate a network's scalability, reliability, and appropriateness by describing the relationship between routers, switches, devices, topology, and addressing (MAC, IP, Subnet, Gateway).
E.NI.1B
Illustrate how to trace data through a network model, explaining the interactions that occur throughout the process.
E.NI.1C
Describe and evaluate the internet as a digital public infrastructure (DPI) from the highest level to the private service provider level.
H.NI.2B
Recommend security measures to address factors that create trade-offs between the usability and security of a computing system.
H.NI.2A
Interpret and analyze mechanisms through which malware and other types of cyber attacks can impact hardware, software, and sensitive data.
H.NI.2C
Compare and contrast how software developers protect computing systems and information from unauthorized user access.
H.DA.1A
Evaluate data representations, propose strategies to reconstruct the data, and visualize data in a variety of ways.
H.DA.1B
Define and describe database structures to optimize the search and retrieval of data.
H.DA.2A
Explain and describe the impacts of uncertainty and the limitations of data collection technology and tools.
H.DA.2B
Describe the personal and legal impacts of accumulated data, both collected and derived, for given scenarios. Propose tools and techniques to manage the accumulated data appropriately
H.DA.3A
Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity.
H.DA.3B
Explain and utilize the appropriate data structural organization system to collaborate and communicate data within a team or user group in given scenarios.
H.DA.4A
Create interactive data visualizations using software tools that explain complex data to others.
  1. 14.1 Present a Data-Driven Insight
H.DA.4B
Utilize data analysis tools to ingest (extract, transform, and load) and process data into relevant information.
  1. 13.2 Visualizing and Interpreting Data
H.DA.5A
Create a model utilizing data with the appropriate simulated variables to develop predictions for real-world phenomena.
H.DA.5B
Apply and evaluate data analysis techniques to identify patterns represented in complex systems.
H.DA.5C
Analyze patterns in data visualizations, then select a collection tool to test a hypothesis and communicate the relevant information to others.
H.DA.5D
Evaluate the impacts of the variables and the model on the performance of a simulation to refine a hypothesis.
H.AP.1A
Assess variables, then classify the scope and type of variable.
  1. 3.4 Variables
  2. 5.6 Local Variables and Scope
H.AP.1B
Design algorithms that can be adapted to express an idea or solve a problem.
  1. 5.1 Functions and Parameters 1
  2. 5.2 Functions and Parameters 2
  3. 5.3 Functions and Parameters 3
  4. 5.9 Basic Python and Graphics Challenges
  5. 6.1 Practice PT: Tell a Story
  6. 7.4 List Methods
  7. 7.5 Simulation
H.AP.1C
Use and adapt classical algorithms to solve computational problems.
  1. 3.3 Hello World
  2. 3.4 Variables
  3. 3.5 User Input
  4. 3.6 Basic Math in Python
  5. 4.1 Booleans
  6. 4.2 Logical Operators
  7. 4.3 Comparison Operators
  8. 4.6 For Loops in Python
  9. 5.1 Functions and Parameters 1
  10. 5.7 Exceptions
  11. 5.9 Basic Python and Graphics Challenges
H.AP.1D
Explain what computer memory is and how variables are stored and retrieved.
H.AP.1E
Identify and explain how a derived data type can be utilized in a real-world scenario.
  1. 7.4 List Methods
  2. 27.1 Classes and Objects
H.AP.2A
Justify the selection of control structures to balance implementation complexity, maintainability, and program performance.
  1. 18.4 Project Prep and Development
H.AP.2B
Design and iteratively develop computational artifacts using events to initiate instructions.
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
H.AP.3A
Decompose problems into smaller components using constructs such as procedures, modules, and/or objects.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 5.1 Functions and Parameters 1
  3. 5.2 Functions and Parameters 2
  4. 5.3 Functions and Parameters 3
  5. 27.1 Classes and Objects
  6. 27.2 Methods
  7. 27.9 Modules
H.AP.3B
Create computational artifacts using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 18.4 Project Prep and Development
  2. 27.1 Classes and Objects
H.AP.4A
Utilize the Software Development Life Cycle (SDLC) to create software that is a minimum viable product.
H.AP.4B
Develop and utilize test cases to verify that a program performs according to the program’s design specifications.
  1. 18.4 Project Prep and Development
H.AP.4C
Design and develop programs by working in team roles using version control systems, integrated development environments (IDEs), and collaborative tools and practices.
  1. 18.4 Project Prep and Development
H.AP.4D
Evaluate licenses that limit or restrict the use of computational artifacts when utilizing resources such as libraries.
H.IC.1A
Analyze the key milestones of computer science, historical events influenced by computer science, and the people connected to these achievements.
H.IC.1B
Explain how innovations in computer science and technology enable advancements in other fields of study.
H.IC.2A
Evaluate the adoption and adaptation of social norms from the physical world to the cyber world.
H.IC.2B
Describe how cyberspace is becoming a universal medium for connecting humans, the economy, business, and computing.
H.IC.2C
Describe and critique how algorithmic feedback loops can shape perceptions, reinforce a limited data set, and limit the sources of information that may inform the individual user.
H.IC.3A
Debate laws and industry regulations that impact the development and use of computational artifacts.
H.IC.3B
Describe and analyze the motives of online threat actors to a user’s personal safety, privacy, and well-being.
H.IC.3C
Compare and contrast the varied approaches to govern data, intellectual property, control information access, and various ways for users to be aware of guidance.
  1. 11.11 Creative Credit & Copyright
H.IC.3D
Explain how the interconnectedness of cyberspace can lead to physical and digital vulnerabilities.
H.IC.3E
Debate the ethical considerations of creating and publishing computational artifacts.
  1. 15.1 The Impacts of Computing
H.IC.3F
Analyze the data provenance of computational artifacts.
H.IC.3G
Explain how individuals and organizations can exert influence on personal and societal perceptions and practices through computing technologies.