Please enable JavaScript to use CodeHS

Standards Mapping

for New York 9-12

33

Standards in this Framework

33

Standards Mapped

100%

Mapped to Course

Standard Lessons
9-12.CT.1
Create a simple digital model that makes predictions of outcomes.
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
9-12.CT.10
Collaboratively design and develop a program or computational artifact for a specific audience and create documentation outlining implementation features to inform collaborators and users.
  1. 2.7 Commenting Your Code
9-12.CT.2
Collect and evaluate data from multiple sources for use in a computational artifact.
  1. 1.9 Data Collection & Limitations
9-12.CT.3
Refine and visualize complex data sets showing how to tell different stories with the same data set.
  1. 1.8 Visualizing and Interpreting Data
9-12.CT.4
Implement a program using a combination of student-defined and third-party functions to organize the computation.
  1. 2.4 Functions in Karel
  2. 2.5 The Main Function
  3. 2.8 Super Karel
  4. 5.1 Intro to the Canvas and Graphics
  5. 5.2 More Graphics Objects
  6. 5.3 Positioning Graphics Objects
  7. 14.1 Challenge Problems
  8. 18.1 Graphics Challenges
  9. 22.1 Animation Challenges
9-12.CT.5
Modify a function or procedure in a program to perform its computation in a different way over the same inputs, while preserving the result of the overall program.
  1. 7.1 Parameters
  2. 7.2 Return Values
  3. 7.3 Default Parameter Values
  4. 7.4 Variable Scopes
  5. 8.1 Timers
  6. 8.2 Stopping Timers
  7. 8.3 Collisions
  8. 8.4 Mouse Click Events
  9. 8.5 More Mouse Events
  10. 17.3 Animation Practice
9-12.CT.6
Demonstrate how at least two classic algorithms work and analyze the trade-offs related to two or more algorithms for completing the same task.
  1. 6.6 While Loops
  2. 6.7 The Break Statement
  3. 6.8 While Loops and Graphics
  4. 6.9 For Loops
  5. 6.10 For Loops and Graphics
9-12.CT.7
Design or remix a program that utilizes a data structure to maintain changes to related pieces of data.
  1. 4.2 Variables
  2. 4.3 User Input
  3. 4.4 Basic Math
9-12.CT.8
Develop a program that effectively uses control structures in order to create a computer program for practical intent, personal expression, or to address a societal issue.
  1. 4.6 Random Numbers
  2. 6.2 If/Else Statements
  3. 6.6 While Loops
  4. 9.4 Project Prep and Development
  5. 19.1 Control Structures Challenges
  6. 23.1 Breakout
9-12.CT.9
Systematically test and refine programs using a range of test cases, based on anticipating common errors and user behavior.
  1. 9.4 Project Prep and Development
  2. 14.1 Challenge Problems
  3. 23.1 Breakout
9-12.CY.1
Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.
  1. 1.1 What is Cybersecurity?
  2. 1.6 Privacy & Security
9-12.CY.2
Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.
  1. 1.2 The CIA Triad
  2. 1.6 Privacy & Security
9-12.CY.3
Explain specific trade-offs when selecting and implementing security recommendations.
  1. 1.6 Privacy & Security
9-12.CY.4
Evaluate applications of cryptographic methods.
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.6 Privacy & Security
  4. 1.11 Hacking Ethics
9-12.CY.5
Recommend multiple actions to take prior and in response to various types of digital security breaches.
  1. 3.8 Network Attacks
9-12.DL.1
Type proficiently on a keyboard.
  1. 14.1 Challenge Problems
  2. 19.1 Control Structures Challenges
  3. 21.1 Functions Challenges
  4. 22.1 Animation Challenges
  5. 23.1 Breakout
9-12.DL.2
Communicate and work collaboratively with others using digital tools to support individual learning and contribute to the learning of others.
  1. 4.5 Collaborative Programming
  2. 9.4 Project Prep and Development
9-12.DL.4
Independently select advanced digital tools and resources to create, revise, and publish complex digital artifacts or collection of artifacts.
  1. 9.1 Intro to Design Thinking
  2. 9.2 Prototype
  3. 9.3 Test
  4. 9.4 Project Prep and Development
9-12.DL.5
Transfer knowledge of technology in order to use new and emerging technologies on multiple platforms.
  1. 11.1 Welcome to micro:bit!
  2. 11.2 Setting Up your micro:bit
  3. 11.3 Variables
  4. 11.4 For Loops
  5. 11.5 While Loops
9-12.DL.6
Actively manage digital presence and footprint to reflect an understanding of the permanence and potential consequences of actions in online spaces.
  1. 1.3 Digital Footprint and Reputation
9-12.DL.7
Design and implement strategies that support safety and security of digital information, personal identity, property, and physical and mental health when operating in the digital world.
  1. 1.4 Cyberbullying
  2. 1.5 Internet Safety
  3. 1.6 Privacy & Security
9-12.IC.1
Evaluate the impact of computing technologies on equity, access, and influence in a global society.
  1. 1.10 Creative Credit & Copyright
  2. 1.11 Hacking Ethics
  3. 1.12 Project: Public Service Announcement
  4. 1.13 Digital Citizenship and Cybersecurity Quiz
  5. 3.1 Intro to the Internet
  6. 3.7 The Impact of the Internet
9-12.IC.2
Debate laws and regulations that impact the development and use of computing technologies and digital information.
  1. 1.10 Creative Credit & Copyright
9-12.IC.3
Debate issues of ethics related to real world computing technologies.
  1. 1.3 Digital Footprint and Reputation
  2. 1.10 Creative Credit & Copyright
9-12.IC.4
Assess personal and societal tradeoffs related to computing technologies and data privacy.
  1. 1.6 Privacy & Security
9-12.IC.5
Describe ways that complex computer systems can be designed for inclusivity and to mitigate unintended consequences.
  1. 3.7 The Impact of the Internet
9-12.IC.6
Create accessible computational artifacts that meet standard compliance requirements or otherwise meet the needs of users with disabilities.
  1. 9.1 Intro to Design Thinking
  2. 9.2 Prototype
  3. 9.3 Test
  4. 9.4 Project Prep and Development
9-12.IC.7
Investigate the use of computer science in multiple fields.
  1. 10.1 Computer Science Careers
9-12.NSD.1
Design a solution to a problem that utilizes embedded systems to automatically gather input from the environment.
  1. 11.4 For Loops
  2. 11.5 While Loops
9-12.NSD.2
Explain the levels of interaction existing between the application software, system software, and hardware of a computing system.
  1. 11.1 Welcome to micro:bit!
  2. 11.2 Setting Up your micro:bit
  3. 11.3 Variables
  4. 11.4 For Loops
  5. 11.5 While Loops
9-12.NSD.3
Develop and communicate multi-step troubleshooting strategies others can use to identify and fix problems with computing devices and their components.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.13 How to Indent Your Code
  3. 2.15 More Karel Examples and Testing
9-12.NSD.4
Describe the components and design characteristics that allow data and information to be moved, stored and referenced over the Internet.
  1. 3.1 Intro to the Internet
  2. 3.2 Internet Hardware
  3. 3.3 Internet Addresses
  4. 3.4 DNS
  5. 3.5 Routing
  6. 3.6 Packets and Protocols
  7. 3.7 The Impact of the Internet
9-12.NSD.5
Describe how emerging technologies are impacting networks and how they are used.
  1. 1.1 What is Cybersecurity?
  2. 3.1 Intro to the Internet
  3. 3.2 Internet Hardware
  4. 3.3 Internet Addresses
  5. 3.4 DNS
  6. 3.5 Routing
  7. 3.6 Packets and Protocols
  8. 3.7 The Impact of the Internet