Please enable JavaScript to use CodeHS

Standards Mapping

for Louisiana 9-12

46

Standards in this Framework

32

Standards Mapped

69%

Mapped to Course

Standard Lessons
H.CS.1A
Analyze the levels of interactions between application software and system software as well as the hardware layers.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
H.CS.1B
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday things
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
H.CS.2A
Generate guidelines that convey systematic troubleshooting strategies that other users can utilize to identify and fix errors.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
E.NI.1A
Evaluate a network's scalability, reliability, and appropriateness by describing the relationship between routers, switches, devices, topology, and addressing (MAC, IP, Subnet, Gateway).
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 6.5 Network Devices
  4. 6.7 Network Options
  5. 6.10 Network Communication
E.NI.1B
Illustrate how to trace data through a network model, explaining the interactions that occur throughout the process.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 5.8 OSI Model
E.NI.1C
Describe and evaluate the internet as a digital public infrastructure (DPI) from the highest level to the private service provider level.
H.NI.2B
Recommend security measures to address factors that create trade-offs between the usability and security of a computing system.
  1. South Carolina Computer Programming 2 with Python
  2. 8.1 Common Cyber Attacks and Prevention
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
  6. 4.8 Application Security
H.NI.2A
Interpret and analyze mechanisms through which malware and other types of cyber attacks can impact hardware, software, and sensitive data.
  1. South Carolina Computer Programming 2 with Python
  2. 8.1 Common Cyber Attacks and Prevention
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
  6. 4.8 Application Security
H.NI.2C
Compare and contrast how software developers protect computing systems and information from unauthorized user access.
  1. South Carolina Computer Programming 2 with Python
  2. 8.3 Security in Coding
  3. Fundamentals of Cybersecurity
  4. 8.3 Security in Coding
H.DA.1A
Evaluate data representations, propose strategies to reconstruct the data, and visualize data in a variety of ways.
H.DA.1B
Define and describe database structures to optimize the search and retrieval of data.
H.DA.2A
Explain and describe the impacts of uncertainty and the limitations of data collection technology and tools.
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 8.1 Data as a Resource
H.DA.2B
Describe the personal and legal impacts of accumulated data, both collected and derived, for given scenarios. Propose tools and techniques to manage the accumulated data appropriately
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 8.1 Data as a Resource
H.DA.3A
Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity.
H.DA.3B
Explain and utilize the appropriate data structural organization system to collaborate and communicate data within a team or user group in given scenarios.
H.DA.4A
Create interactive data visualizations using software tools that explain complex data to others.
H.DA.4B
Utilize data analysis tools to ingest (extract, transform, and load) and process data into relevant information.
  1. South Carolina Computer Programming 2 with Python
  2. 7.3 Exploring Data Using Python
  3. 7.4 Modules, Packages & Libraries
  4. 7.8 Selecting Columns
  5. 7.9 Using Functions
  6. 7.10 Mini-Project: Findings
H.DA.5A
Create a model utilizing data with the appropriate simulated variables to develop predictions for real-world phenomena.
H.DA.5B
Apply and evaluate data analysis techniques to identify patterns represented in complex systems.
  1. South Carolina Computer Programming 2 with Python
  2. 7.9 Using Functions
  3. 7.10 Mini-Project: Findings
H.DA.5C
Analyze patterns in data visualizations, then select a collection tool to test a hypothesis and communicate the relevant information to others.
H.DA.5D
Evaluate the impacts of the variables and the model on the performance of a simulation to refine a hypothesis.
H.AP.1A
Assess variables, then classify the scope and type of variable.
  1. South Carolina Computer Programming 2 with Python
  2. 1.4 Variables
  3. 3.6 Local Variables and Scope
H.AP.1B
Design algorithms that can be adapted to express an idea or solve a problem.
  1. South Carolina Computer Programming 2 with Python
  2. 3.1 Functions and Parameters 1
  3. 3.2 Functions and Parameters 2
  4. 3.3 Functions and Parameters 3
  5. 3.8 Challenge: Ghosts
  6. 4.4 List Methods
H.AP.1C
Use and adapt classical algorithms to solve computational problems.
  1. South Carolina Computer Programming 2 with Python
  2. 1.3 Hello World
  3. 1.4 Variables
  4. 1.5 User Input
  5. 1.6 Basic Math in Python
  6. 2.1 Booleans
  7. 2.2 Logical Operators
  8. 2.3 Comparison Operators
  9. 2.6 For Loops in Python
  10. 3.1 Functions and Parameters 1
  11. 3.7 Exceptions
H.AP.1D
Explain what computer memory is and how variables are stored and retrieved.
H.AP.1E
Identify and explain how a derived data type can be utilized in a real-world scenario.
  1. South Carolina Computer Programming 2 with Python
  2. 4.4 List Methods
  3. 6.1 Classes and Objects
H.AP.2A
Justify the selection of control structures to balance implementation complexity, maintainability, and program performance.
  1. South Carolina Computer Programming 2 with Python
  2. 5.4 Project Prep and Development
H.AP.2B
Design and iteratively develop computational artifacts using events to initiate instructions.
  1. South Carolina Computer Programming 2 with Python
  2. 5.1 Intro to Design Thinking
  3. 5.2 Prototype
  4. 5.3 Test
  5. 5.4 Project Prep and Development
H.AP.3A
Decompose problems into smaller components using constructs such as procedures, modules, and/or objects.
  1. South Carolina Computer Programming 2 with Python
  2. 3.1 Functions and Parameters 1
  3. 3.2 Functions and Parameters 2
  4. 3.3 Functions and Parameters 3
  5. 6.1 Classes and Objects
  6. 6.2 Methods
  7. 6.9 Modules
H.AP.3B
Create computational artifacts using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. South Carolina Computer Programming 2 with Python
  2. 5.4 Project Prep and Development
  3. 6.1 Classes and Objects
H.AP.4A
Utilize the Software Development Life Cycle (SDLC) to create software that is a minimum viable product.
H.AP.4B
Develop and utilize test cases to verify that a program performs according to the program’s design specifications.
  1. South Carolina Computer Programming 2 with Python
  2. 5.4 Project Prep and Development
H.AP.4C
Design and develop programs by working in team roles using version control systems, integrated development environments (IDEs), and collaborative tools and practices.
  1. South Carolina Computer Programming 2 with Python
  2. 5.4 Project Prep and Development
H.AP.4D
Evaluate licenses that limit or restrict the use of computational artifacts when utilizing resources such as libraries.
  1. South Carolina Computer Programming 2 with Python
  2. 8.6 Responsibly Using Someone Else's Code
H.IC.1A
Analyze the key milestones of computer science, historical events influenced by computer science, and the people connected to these achievements.
  1. Fundamentals of Cybersecurity
  2. 2.1 Cryptography: Then, Now, and Future
  3. 6.5 Network Devices
H.IC.1B
Explain how innovations in computer science and technology enable advancements in other fields of study.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
  3. 6.5 Network Devices
H.IC.2A
Evaluate the adoption and adaptation of social norms from the physical world to the cyber world.
  1. South Carolina Computer Programming 2 with Python
  2. 8.7 Digital Footprint and Responsibility
  3. Fundamentals of Cybersecurity
  4. 1.1 Digital Footprint and Responsibility
  5. 5.9 Impact of the Internet
H.IC.2B
Describe how cyberspace is becoming a universal medium for connecting humans, the economy, business, and computing.
  1. South Carolina Computer Programming 2 with Python
  2. 8.7 Digital Footprint and Responsibility
  3. Fundamentals of Cybersecurity
  4. 1.1 Digital Footprint and Responsibility
  5. 5.9 Impact of the Internet
H.IC.2C
Describe and critique how algorithmic feedback loops can shape perceptions, reinforce a limited data set, and limit the sources of information that may inform the individual user.
H.IC.3A
Debate laws and industry regulations that impact the development and use of computational artifacts.
  1. South Carolina Computer Programming 2 with Python
  2. 8.5 Ethics and Legal Considerations
  3. Fundamentals of Cybersecurity
  4. 1.4 Cyber Ethics and Laws
H.IC.3B
Describe and analyze the motives of online threat actors to a user’s personal safety, privacy, and well-being.
  1. South Carolina Computer Programming 2 with Python
  2. 8.1 Common Cyber Attacks and Prevention
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
H.IC.3C
Compare and contrast the varied approaches to govern data, intellectual property, control information access, and various ways for users to be aware of guidance.
  1. South Carolina Computer Programming 2 with Python
  2. 8.4 Creative Credit & Copyright
  3. Fundamentals of Cybersecurity
  4. 1.2 Personal Data and Collection
  5. 1.5 Personal Data Security
H.IC.3D
Explain how the interconnectedness of cyberspace can lead to physical and digital vulnerabilities.
  1. South Carolina Computer Programming 2 with Python
  2. 8.1 Common Cyber Attacks and Prevention
  3. Fundamentals of Cybersecurity
  4. 1.2 Personal Data and Collection
  5. 1.7 Common Cyber Attacks and Prevention
H.IC.3E
Debate the ethical considerations of creating and publishing computational artifacts.
  1. South Carolina Computer Programming 2 with Python
  2. 8.5 Ethics and Legal Considerations
H.IC.3F
Analyze the data provenance of computational artifacts.
H.IC.3G
Explain how individuals and organizations can exert influence on personal and societal perceptions and practices through computing technologies.