Please enable JavaScript to use CodeHS

Standards Mapping

for Oklahoma Level 1

28

Standards in this Framework

17

Standards Mapped

60%

Mapped to Course

Standard Lessons
L1.CS.D.01
Model how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 4.1 Operating Systems
  2. 4.13 System Administration Quiz
  3. 5.1 Computers Speak Binary
  4. 5.3 Encoding Images in Binary
  5. 5.12 IT Concepts Quiz
L1.CS.HS.01
Analyze the levels of abstraction and interactions between application software, system software, and hardware.
  1. 4.1 Operating Systems
  2. 4.13 System Administration Quiz
  3. 5.1 Computers Speak Binary
  4. 5.12 IT Concepts Quiz
L1.CS.T.01
Develop and apply criteria for the systematic discovery of errors and systematic strategies for the correction of errors in computing systems.
  1. 7.2 Troubleshooting Methodology
L1.NI.NCO.01
Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers, etc.) and network protocols (e.g., IP, DNS).
  1. 5.6 IP Addresses
  2. 5.7 Routing and Packets
  3. 5.9 OSI Model
  4. 5.12 IT Concepts Quiz
  5. 6.5 Network Devices
L1.NI.CY.01
Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system and the risks of an attack.
  1. 1.5 Personal Data Security
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
  4. 1.8 Cybersecurity and You Quiz
  5. 8.5 Environmental Controls
  6. 8.8 Data Security Quiz
L1.NI.CY.02
Recommend security measures to address various scenarios based on information security principles.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
  3. 1.8 Cybersecurity and You Quiz
  4. 8.6 Checking for Vulnerabilities
  5. 8.7 Risky Business
  6. 8.8 Data Security Quiz
L1.NI.CY.03
Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives, such as the user, enterprise, and government.
  1. 1.5 Personal Data Security
  2. 1.7 Common Cyber Attacks and Prevention
  3. 1.8 Cybersecurity and You Quiz
  4. 8.6 Checking for Vulnerabilities
  5. 8.7 Risky Business
  6. 8.8 Data Security Quiz
L1.DA.S.01
Convert and compare different bit representations of data types, such as characters, numbers, and images.
  1. 5.2 Bits, Text, and Numbers
  2. 5.3 Encoding Images in Binary
  3. 5.12 IT Concepts Quiz
L1.DA.S.02
Evaluate the trade-offs in how data is organized and stored digitally.
  1. 5.4 Lossy Compression
  2. 5.12 IT Concepts Quiz
  3. 6.4 Storage Options
  4. 6.12 IT Infrastructure Quiz
  5. 8.2 Using Databases
  6. 8.8 Data Security Quiz
L1.DA.CVT.01
Use tools and techniques to locate, collect, and create visualizations of small and largescale data sets (e.g., paper surveys and online data sets).
  1. 8.2 Using Databases
  2. 8.8 Data Security Quiz
L1.DA.IM.01
Illustrate and explain the relationships between collected data elements using computational models.
  1. 8.2 Using Databases
  2. 8.8 Data Security Quiz
L1.AP.A.01
Create a prototype that uses algorithms (e. g., searching, sorting, finding shortest distance) to provide a possible solution for a realworld problem.
L1.AP.V.01
Demonstrate the use of lists (e.g., arrays) to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
L1.AP.C.01
Justify the selection of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance, and memory usage.
L1.AP.M.01
Decompose problems into procedures using systematic analysis and design.
L1.AP.M.02
Create computational artifacts by systematically organizing, manipulating and/or processing data.
L1.AP.PD.01
Create software that will provide solutions to a variety of users using a software development process.
L1.AP.PD.02
Evaluate a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development.
  1. 4.7 Software Licenses
  2. 4.13 System Administration Quiz
L1.AP.PD.03
While working in a team, develop, test, and refine eventbased programs that solve practical problems or allow self-expression.
L1.AP.PD.04
Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a complex program.
L1.AP.PD.05
Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible.
L1.IC.CU.01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Can All Information Be Trusted?
  3. 1.4 Cyber Ethics and Laws
  4. 1.8 Cybersecurity and You Quiz
  5. 5.10 Impact of the Internet
  6. 5.12 IT Concepts Quiz
L1.IC.CU.02
Test and refine computational artifacts to ensure access to a variety of user audiences.
L1.IC.CU.03
Demonstrate ways a given algorithm can help solve computational problems across disciplines.
L1.IC.SI.01
Demonstrate and debate how computing increases and decreases connectivity and communication among people of various cultures.
  1. 5.11 The Impact of Computing Solutions in Developing Countries
L1.IC.SLE.01
Describe the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 1.4 Cyber Ethics and Laws
  2. 1.8 Cybersecurity and You Quiz
L1.IC.SLE.02
Describe and discuss the privacy concerns related to the large-scale collection and analysis of information about individuals (e.g., how websites collect and uses data) that may not be evident to users.
  1. 1.5 Personal Data Security
  2. 1.8 Cybersecurity and You Quiz
  3. 8.1 Data as a Resource
  4. 8.8 Data Security Quiz
L1.IC.SLE.03
Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity.
  1. 1.4 Cyber Ethics and Laws
  2. 1.8 Cybersecurity and You Quiz