Please enable JavaScript to use CodeHS

Oklahoma 9-10 Standards Mapping

to

AP Computer Science Principles: Cybersecurity

29 Standards in this Framework 20 Standards Mapped 68% Mapped to Course


Standard Lessons
L1.CS.D.01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 1.9 Abstraction
  2. 8.1 Intro to Digital Information
L1.CS.HS.01 Explain the interactions between application software, system software, and hardware.
L1.CS.T.01 Develop and apply criteria for systematic discovery of errors and systematic strategies for correction of errors in computing systems.
  1. 1.16 Debugging Strategies
L1.NI.NCO.01 Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers, etc.) and network protocols (e.g., IP, DNS, etc.).
  1. 13.5 DNS and Routing
  2. 13.6 Routing
L1.NI.C.01 Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.
L1.NI.C.02 Illustrate how sensitive data can be affected by attacks.
L1.NI.C.03 Recommend security measures to address various scenarios based on information security principles.
L1.NI.C.04 Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government.
L1.DA.S.01 Translate and compare different bit representations of data types, such as characters, numbers, and images.
  1. 8.1 Intro to Digital Information
  2. 8.2 Number Systems
  3. 8.3 Encoding Text with Binary
L1.DA.S.02 Evaluate the trade-offs in how data is organized and stored digitally.
L1.DA.CVT.01 Use tools and techniques to locate, collect, and create visualizations of small- and largescale data sets (e.g., paper surveys and online data sets).
  1. 8.8 Data Compression
  2. 8.9 Lossy Compression
L1.DA.IM.01 Show the relationships between collected data elements using computational models.
  1. 7.9 Simulation
  2. 16.2 Visualizing and Interpreting Data
  3. 16.3 Data Collection & Limitations
L1.AP.A.01 Create a prototype that uses algorithms (e. g., searching, sorting, finding shortest distance) to provide a possible solution for a real-world problem.
L1.AP.V.01 Demonstrate the use of lists (e.g., arrays) to simplify solutions, generalizing computational problems instead of repeatedly using primitive variables.
  1. 7.1 Intro to Lists/Arrays
  2. 7.5 Iterating Over an Array
L1.AP.C.01 Justify the selection of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance, and memory usage.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 1.15 Control Structures Example
  3. 1.20 Karel Challenges
L1.AP.M.01 Break down a solution into procedures using systematic analysis and design.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 1.15 Control Structures Example
  3. 1.20 Karel Challenges
L1.AP.M.02 Create computational artifacts by systematically organizing, manipulating and/or processing data.
  1. 17.1 Present a Data-Driven Insight
L1.AP.PD.01 Create software by analyzing a problem and/or process, developing and documenting a solution, testing outcomes, and adapting the program for a variety of users.
  1. 21.1 Intro to Design Thinking
  2. 21.2 Prototype
  3. 21.3 Test
  4. 21.4 Project Prep and Development
L1.AP.PD.02 Define and classify a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development.
  1. 13.10 Creative Credit & Copyright
L1.AP.PD.03 While working in a team, develop, test, and refine event-based programs that solve practical problems or allow self expression.
  1. 2.1 Practice PT: Pair-Programming Paint!
  2. 6.1 Project: Tell a Story
L1.AP.PD.04 Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a complex program.
  1. 2.1 Practice PT: Pair-Programming Paint!
L1.AP.PD.05 Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible.
  1. 21.2 Prototype
  2. 21.3 Test
L1.IC.C.01 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 13.9 The Impact of the Internet
  2. 32.1 The Effects of the Internet
L1.IC.C.02 Test and refine computational artifacts to reduce bias and equity deficits.
  1. 13.9 The Impact of the Internet
  2. 21.3 Test
  3. 32.1 The Effects of the Internet
L1.IC.C.03 Demonstrate how a given algorithm applies to problems across disciplines.
  1. 7.7 Removing an Element From an Array
L1.IC.SI.01 Demonstrate how computing increases connectivity among people of various cultures.
  1. 13.9 The Impact of the Internet
L1.IC.SLE.01 Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 13.10 Creative Credit & Copyright
L1.IC.SLE.02 Explain the privacy concerns related to the large-scale collection and analysis of information about individuals (e.g., how businesses, social media, and the government collects and uses data) that may not be evident to users.
L1.IC.SLE.03 Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity.