Please enable JavaScript to use CodeHS

Standards Mapping

for Natrona CS in the Virtual World


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Recommend improvements to the design of computing devices based on an analysis of how a variety of users interact with the device.
Model the role of protocols in transmitting data across networks and the internet (e.g., explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered).
  1. 7.3 Internet Addresses
  2. 7.4 DNS
  3. 7.5 Routing
  4. 7.6 Packets and Protocols
Critique physical and digital procedures that could be implemented to protect electronic data/information.
  1. 15.4 The CIA Triad
Apply multiple methods of encryption to model the secure transmission of data.
Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 9.6 Creative Credit & Copyright
  4. 15.2 What is Cybersecurity?
  5. 15.3 Impact of Cybersecurity
Describe impacts associated with computing technologies that affect people's everyday activities and career options.
  1. 2.5 Future of Computing
  2. 8.1 Project: The Effects of the Internet
  3. 9.1 Digital Footprint and Reputation
  4. 15.2 What is Cybersecurity?
Describe issues of bias and accessibility in the design of technologies.
Using grade appropriate content and complexity, collaborate using tools to connect with peers when creating a computational artifact.
  1. 10.1 Project: Public Service Announcement
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 9.1 Digital Footprint and Reputation
  2. 9.2 Cyberbullying
  3. 9.3 Internet Safety
Using computational tools, transform collected data to make it more useful and reliable.
Refine computational models based on generated data.
Using grade appropriate content and complexity, seek and incorporate feedback from team members and users to refine a solution to a problem.
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
  1. 4.5 Images
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.