Please enable JavaScript to use CodeHS

Standards Mapping

for Rhode Island 9-12

34

Standards in this Framework

32

Standards Mapped

94%

Mapped to Course

Standard Lessons
3-CT-A-1
Create computational artifacts that use algorithms to solve computational problems by leveraging prior knowledge and personal interests.
  1. 9.1 Let's Build Mastermind
3-CT-V-1
Explain the role of a variable within a program, and the scope in which its name and value can be used.
  1. 2.4 Variables
3-CT-D-1
Create a program that processes a collection of data.
  1. 6.1 Tuples
  2. 6.2 Lists
  3. 6.3 For Loops and Lists
  4. 6.4 List Methods
  5. 6.5 Simulation
  6. 7.1 Getting Started with Data
  7. 7.2 Visualizing and Interpreting Data
  8. 7.3 Data Collection & Limitations
3-CT-C-1
Create and justify the selection of specific control structures when tradeoffs involve code organization, readability, and program performance and explain the benefits and drawbacks of choices made.
  1. 1.10 If Statements
  2. 1.12 While Loops in Karel
  3. 1.13 Control Structures Example
  4. 1.17 Karel Challenges
  5. 3.4 If Statements
  6. 3.5 Key Events
  7. 3.6 For Loops in Python
  8. 3.7 General For Loops
  9. 3.8 For Loop Practice
  10. 3.10 While Loops
3-CT-M-1
Identify existing computational artifacts that can be used for the subtasks of a decomposed problem
  1. 1.5 Top Down Design and Decomposition in Karel
3-CT-M-2
Create computational artifacts by incorporating predefined procedures, self-defined procedures and external artifacts.
  1. 4.1 Functions and Parameters 1
  2. 4.2 Functions and Parameters 2
  3. 4.3 Functions and Parameters 3
  4. 4.4 Functions and Return Values 1
  5. 4.5 Functions and Return Values 2
3-CT-CD-1
Systematically design and implement computational artifacts for targeted audiences by incorporating feedback from users.
  1. 8.1 Intro to Design Thinking
  2. 8.2 Prototype
  3. 8.3 Test
  4. 8.4 Project Prep and Development
3-CT-CD-2
Systematically test and refine programs using a range of test cases.
  1. 2.6 Basic Math in Python
  2. 18.5 The in Keyword
3-CT-CD-3
Document computational artifacts in order to make them easier to follow, test, and debug.
  1. 1.6 Commenting Your Code
3-CSN-H-1
Analyze a computing system and explain how abstractions simplify the underlying implementation details embedded in everyday objects.
  1. 1.7 Abstraction
  2. 1.8 Super Karel
  3. 1.16 Ultra Karel
  4. 4.8 Python vs Karel
  5. 11.1 Computers Speak Binary
  6. 11.2 Bits, Text, and Numbers
  7. 11.3 Encoding Images in Binary
  8. 12.1 Internal Components
3-CSN-HS-1
Compare levels of abstraction and interactions between application software, system software, and hardware layers.
  1. 11.1 Computers Speak Binary
  2. 11.2 Bits, Text, and Numbers
  3. 11.3 Encoding Images in Binary
  4. 11.6 Routing and Packets
  5. 11.7 How Do Websites Work?
  6. 11.8 OSI Model
  7. 12.1 Internal Components
3-CSN-T-1
Develop and communicate troubleshooting strategies others can use to identify and fix errors.
  1. 1.4 Functions in Karel
  2. 1.14 Debugging Strategies
3-CSN-N-1
Identify the various elements of a network and describe how they function and interact to transfer information.
  1. 11.6 Routing and Packets
  2. 11.7 How Do Websites Work?
  3. 11.8 OSI Model
3-CY-R-1
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  1. 5.2 Personal Data and Collection
  2. 10.9 Browser Configuration
3-CY-R-2
Analyze an existing or proposed application to identify the potential ways it could be used to obtain sensitive information.
  1. 5.2 Personal Data and Collection
  2. 5.6 Cybersecurity Essentials
3-CY-R-3
Explain how the digital security of an organization may be affected by the actions of its employees.
  1. 10.10 System Administration
3-CY-S-1
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  1. 5.7 Common Cyber Attacks and Prevention
  2. 10.8 Application Security
  3. 10.9 Browser Configuration
  4. 10.10 System Administration
  5. 12.10 Network Communication
  6. 12.11 Network Management
3-CY-S-2
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
  1. 5.5 Personal Data Security
  2. 5.7 Common Cyber Attacks and Prevention
  3. 10.8 Application Security
  4. 10.10 System Administration
  5. 12.10 Network Communication
3-CY-RP-1
Describe the appropriate actions to take in response to detected security breaches.
  1. 5.7 Common Cyber Attacks and Prevention
  2. 12.11 Network Management
3-DA-CVT-1
Select appropriate data-collection tools and presentation techniques for different types of data.
  1. 7.2 Visualizing and Interpreting Data
  2. 7.3 Data Collection & Limitations
3-DA-IM-1
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
  1. 6.5 Simulation
3-DA-IM-2
Discuss potential hidden biases that could be introduced while collecting a dataset and how these biases could affect analysis conclusions.
  1. 7.3 Data Collection & Limitations
3-DA-IM-3
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. 6.5 Simulation
3-DA-ST-1
Explain tradeoffs between storing data locally or in central, cloud-based systems.
  1. 12.4 Storage Options
3-DA-ST-2
Translate data for various real-world phenomena, such as characters, numbers, and images, into bits.
  1. 11.1 Computers Speak Binary
  2. 11.2 Bits, Text, and Numbers
  3. 11.3 Encoding Images in Binary
3-DL-CU-1
Select appropriate software tools or resources to create a complex artifact or solve a problem.
  1. 11.3 Encoding Images in Binary
3-DL-SDI-1
Decompose a complex problem into multiple questions, identify which can be explored through digital sources, and synthesize query results using a variety of software tools.
  1. 11.9 Impact of the Internet
3-DL-US-1
Describe different kinds of computations that software tools perform to tailor a system to individual users.
  1. 10.9 Browser Configuration
3-RC-CU-1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 11.9 Impact of the Internet
3-RC-CU-2
Design and analyze computational artifacts to reduce bias and equity deficits.
  1. 11.9 Impact of the Internet
3-RC-CU-3
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 11.9 Impact of the Internet
3-RC-SLE-1
Evaluate the impact of intellectual property laws on the use of digital information.
  1. 5.4 Cyber Ethics and Laws
  2. 10.7 Software Licenses
3-RC-SLE-2
Evaluate the social and economic implications of privacy and free speech in the context of safety, law, or ethics.
3-RC-SI-1
Use tools and methods for collaboration on a project to increase connectivity between people in different cultures and career fields.