Please enable JavaScript to use CodeHS

Standards Mapping

for Massachusetts 9-12

65

Standards in this Framework

42

Standards Mapped

64%

Mapped to Course

Standard Lessons
9-12.CAS.a1
Evaluate and design an ergonomic work environment.
9-12.CAS.a2
Explain safe practices when collaborating online, including how to anticipate potentially dangerous situations.
  1. 11.9 Cybersecurity
9-12.CAS.a3
Construct strategies to combat cyberbullying/harassment.
9-12.CAS.a4
Identify the mental health consequences of cyberbullying/harassment.
9-12.CAS.a5
Explain how peer pressure in social computing settings influences choices.
9-12.CAS.a6
Apply strategies for managing negative peer pressure and encouraging positive peer pressure.
9-12.CAS.b1
Model mastery of the school’s Acceptable Use Policy (AUP).
  1. 11.11 Creative Credit & Copyright
9-12.CAS.b2
Identify computer-related laws and analyze their impact on digital privacy, security, intellectual property, network access, contracts, and consequences of sexting and harassment.
  1. 11.11 Creative Credit & Copyright
9-12.CAS.b3
Discuss the legal and ethical implications associated with malicious hacking and software piracy.
9-12.CAS.b4
Interpret software license agreements and application permissions.
  1. 11.11 Creative Credit & Copyright
9-12.CAS.c1
Explain the impact of the digital divide on access to critical information.
  1. 11.10 The Impact of the Internet
9-12.CAS.c2
Discuss the impact of computing technology on business and commerce (e.g., automated tracking of goods, automated financial transaction, e-commerce, cloud computing).
  1. 11.10 The Impact of the Internet
9-12.CAS.c3
Describe the role that assistive technology can play in people’s lives.
9-12.CAS.c4
Create a digital artifact that is designed to be accessible (e.g., closed captioning for audio, alternative text for images).
  1. 18.1 Intro to Design Thinking
  2. 18.3 Test
  3. 18.4 Project Prep and Development
9-12.CAS.c5
nalyze the beneficial and harmful effects of computing innovations (e.g., social networking, delivery of news and other public media, intercultural communication).
  1. 11.10 The Impact of the Internet
9-12.CAS.c6
Cultivate a positive web presence (e.g., digital resume, portfolio, social media).
9-12.CAS.c7
Identify ways to use technology to support lifelong learning.
9-12.CAS.c8
Analyze the impact of values and points of view that are presented in media messages (e.g., racial, gender, political).
9-12.CAS.c9
Discuss the social and economic implications associated with malicious hacking, software piracy, and cyber terrorism.
9-12.DTC.a1
Use digital tools to design and develop a significant digital artifact (e.g., multipage website, online portfolio, simulation).
  1. 2.1 Practice PT: Pair-Programming Paint!
  2. 6.1 Project: Tell a Story
  3. 7.8 Simulation
  4. 9.1 Practice PT: Steganography
  5. 10.1 Practice PT: Create an Image Filter!
  6. 14.1 Present a Data-Driven Insight
  7. 18.4 Project Prep and Development
9-12.DTC.a2
Select digital tools or resources based on their efficiency and effectiveness to use for a project or assignment and justify the selection.
  1. 14.1 Present a Data-Driven Insight
9-12.DTC.b1
Communicate and publish key ideas and details to a variety of audiences using digital tools and media-rich resources.
  1. 14.1 Present a Data-Driven Insight
9-12.DTC.b2
Collaborate on a substantial project with outside experts or others through online digital tools (e.g., science fair project, community service project, capstone project).
9-12.DTC.c1
Generate, evaluate, and prioritize questions that can be researched through digital resources or tools.
  1. 12.1 The Effects of the Internet
  2. 14.1 Present a Data-Driven Insight
9-12.DTC.c2
Perform advanced searches to locate information and/or design a data-collection approach to gather original data (e.g., qualitative interviews, surveys, prototypes, simulations).
  1. 14.1 Present a Data-Driven Insight
9-12.DTC.c3
Evaluate digital sources needed to solve a given problem (e.g., reliability, point of view, relevancy).
9-12.DTC.c4
Gather, organize, analyze, and synthesize information using a variety of digital tools.
  1. 14.1 Present a Data-Driven Insight
9-12.DTC.c5
Create an artifact that answers a research question, communicates results and conclusions, and cites sources.
  1. 14.1 Present a Data-Driven Insight
9-12.CS.a1
Select computing devices (e.g., probe, sensor, tablet) to accomplish a real-world task (e.g., collecting data in a field experiment) and justify the selection.
9-12.CS.a2
Examine how the components of computing devices are controlled by and react to programmed commands.
9-12.CS.a3
Apply strategies for identifying and solving routine hardware and software problems that occur in everyday life (e.g., update software patches, virus scan, empty trash, run utility software, close all programs, reboot, use help sources).
9-12.CS.a4
Explain and demonstrate how specialized computing devices can be used for problem solving, decision-making and creativity in all subject areas.
9-12.CS.a5
Describe how computing devices manage and allocate shared resources [e.g., memory, Central Processing Unit (CPU)].
  1. 11.8 Sequential, Parallel & Distributed Computing
9-12.CS.a6
Examine the historical rate of change in computing devices (e.g., power/energy, computation capacity, speed, size, ease of use) and discuss the implications for the future.
  1. 11.2 Internet Hardware
  2. 11.6 Routing
9-12.CS.b1
Identify a problem that cannot be solved by humans or machines alone and design a solution for it by decomposing the task into sub-problems suited for a human or machine to accomplish (e.g., a human-computer team playing chess, forecasting weather, piloting airplanes).
  1. 8.10 Cryptography
9-12.CS.c1
Explain how network topologies and protocols enable users, devices, and systems to communicate with each other.
  1. 11.2 Internet Hardware
  2. 11.3 Internet Addresses
  3. 11.5 DNS
  4. 11.6 Routing
  5. 11.7 Packets and Protocols
9-12.CS.c2
Examine common network vulnerabilities (e.g., cyberattacks, identity theft, privacy) and their associated responses.
  1. 11.9 Cybersecurity
9-12.CS.c3
Examine the issues (e.g., latency, bandwidth, firewalls, server capability) that impact network functionality.
  1. 11.2 Internet Hardware
9-12.CS.d1
Compare the value of using an existing service versus building the equivalent functionality (e.g., using a reference search engine versus creating a database of references for a project).
9-12.CS.d2
Explain the concept of quality of service (e.g., security, availability, performance) for services providers (e.g., online storefronts that must supply secure transactions for buyer and seller).
9-12.CT.a1
Discuss and give an example of the value of generalizing and decomposing aspects of a problem in order to solve it more effectively.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 1.9 Abstraction
9-12.CT.b1
Recognize that the design of an algorithm is distinct from its expression in a programming language.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 1.17 Karel Algorithms
9-12.CT.b2
Represent algorithms using structured language, such as pseudocode.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 1.17 Karel Algorithms
9-12.CT.b3
Explain how a recursive solution to a problem repeatedly applies the same solution to smaller instances of the problem.
9-12.CT.b4
Describe that there are ways to characterize how well algorithms perform and that two algorithms can perform differently for the same task.
  1. 1.17 Karel Algorithms
9-12.CT.b5
Explain that there are some problems, which cannot be computationally solved.
  1. 8.10 Cryptography
9-12.CT.c1
Describe how data types, structures, and compression in programs affect data storage and quality (e.g., digital image file sizes are affected by resolution and color depth).
  1. 8.4 Pixel Images
  2. 8.7 Image Manipulation
  3. 8.8 Data Compression
  4. 8.9 Lossy Compression
9-12.CT.c2
Create an appropriate multidimensional data structure that can be filtered, sorted, and searched (e.g., array, list, record).
  1. 7.1 Intro to Lists/Arrays
  2. 7.2 Indexing Into an Array
  3. 7.3 Adding/Removing From an Array
  4. 7.4 Array Length and Looping Through Arrays
  5. 7.5 Iterating Over an Array
  6. 7.6 Finding an Element in a List
  7. 7.7 Removing an Element From an Array
9-12.CT.c3
Create, evaluate, and revise data visualization for communication and knowledge.
  1. 13.1 Getting Started with Data
  2. 13.2 Visualizing and Interpreting Data
  3. 13.3 Data Collection & Limitations
  4. 14.1 Present a Data-Driven Insight
9-12.CT.c4
Analyze a complex data set to answer a question or test a hypothesis (e.g., analyze a large set of weather or financial data to predict future patterns).
  1. 14.1 Present a Data-Driven Insight
9-12.CT.c5
Identify different problems (e.g., large or multipart problems, problems that need specific expertise, problems that affect many constituents) that can benefit from collaboration when processing and analyzing data to develop new insights and knowledge.
  1. 14.1 Present a Data-Driven Insight
9-12.CT.d1
Use a development process in creating a computational artifact that leads to a minimum viable product and includes reflection, analysis, and iteration (e.g., a data-set analysis program for a science and engineering fair, capstone project that includes a program, term research project based on program data).
  1. 14.1 Present a Data-Driven Insight
  2. 18.1 Intro to Design Thinking
  3. 18.2 Prototype
  4. 18.3 Test
  5. 18.4 Project Prep and Development
9-12.CT.d2
Decompose a problem by defining functions, which accept parameters and produce return values.
  1. 5.1 Functions and Parameters 1
  2. 5.2 Functions and Parameters 2
  3. 5.3 Functions and Parameters 3
  4. 5.4 Functions and Return Values 1
  5. 5.5 Functions and Return Values 2
9-12.CT.d3
Select the appropriate data structure to represent information for a given problem (e.g., records, arrays, lists).
  1. 7.1 Intro to Lists/Arrays
9-12.CT.d4
Analyze trade-offs among multiple approaches to solve a given problem (e.g., space/time performance, maintainability, correctness, elegance).
9-12.CT.d5
Use appropriate looping structures in programs (e.g., FOR, WHILE, RECURSION).
  1. 1.11 For Loops
  2. 1.14 While Loops in Karel
  3. 4.6 For Loops in JavaScript
  4. 4.7 General For Loops
  5. 4.8 For Loop Practice
  6. 4.10 While Loops
  7. 4.11 Loop and a Half
9-12.CT.d6
Use appropriate conditional structures in programs (e.g., IF-THEN, IF-THEN-ELSE, SWITCH).
  1. 1.12 If Statements
  2. 1.13 If/Else Statements
  3. 4.4 If Statements
9-12.CT.d7
Use a programming language or tool feature correctly to enforce operator precedence.
  1. 3.6 Basic Math in JavaScript
9-12.CT.d8
Use global and local scope appropriately in program design (e.g., for variables).
  1. 5.6 Local Variables and Scope
9-12.CT.d9
Select and employ an appropriate component or library to facilitate programming solutions [e.g., turtle, Global Positioning System (GPS), statistics library].
9-12.CT.d10
Use an iterative design process, including learning from making mistakes, to gain a better understanding of the problem domain.
  1. 1.7 Top Down Design and Decomposition in Karel
9-12.CT.d11
Engage in systematic testing and debugging methods to ensure program correctness.
  1. 1.16 Debugging Strategies
9-12.CT.d12
Demonstrate how to document a program so that others can understand its design and implementation.
  1. 1.8 Commenting Your Code
9-12.CT.e1
Create models and simulations to help formulate, test, and refine hypotheses.
  1. 7.8 Simulation
9-12.CT.e2
Form a model from a hypothesis generated from research and run a simulation to collect and analyze data to test that hypothesis.