Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina 9-12

123

Standards in this Framework

43

Standards Mapped

34%

Mapped to Course

Standard Lessons
HS1.CS.1.1
Analyze the impact that computing devices have in real-world settings (e.g., traffic lights, medical devices, facial recognition).
HS2.CS.1.1
Investigate how a problem is systematically solved through the selection and integration of hardware and software components.
HS3.CS.1.1
Recommend modifications for existing computing devices and software to improve functionality for end users.
  1. 13.5 Prototype
  2. 13.6 Test
HS4.CS.1.1
Develop a solution to a given problem using appropriate hardware and software (e.g., sensor devices, Wi-Fi capabilities, specialized displays, runtime modules, operating systems, application programming interfaces (APIs)).
HS1.CS.1.2
Compare and contrast the elements of a computing system by examining hardware elements for their intended use (e.g., input-output (I/O) devices, random access memory (RAM), read only memory (ROM), storage devices, motherboards, and processors including the arithmetic logic unit (ALU), control unit, registers, cache memory, example implementations of some of these components using logic gates) (Virginia, 2017).
HS2.CS.1.2
Analyze how various hardware and software layers provide simplifying abstractions (e.g., a redundant array of independent disks (RAID) controller hiding details of data storage on multiple disks, an operating system hiding details of virtual memory, the presentation layer of a network hiding details about encryption).
HS3.CS.1.2
Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, specialized devices like global positioning systems (GPSs)).
HS4.CS.1.2
Cite evidence of how selecting appropriate hardware and software components enhances user interfaces to provide better solutions for real-world problems.
HS1.CS.1.3
Compare and contrast the strengths and weaknesses of various popular operating systems, (e.g., Windows, Windows Server, OS-X, Android, iOS, UNIX, Linux).
HS2.CS.1.3
Analyze the roles of operating system software components (e.g., memory management, data storage and retrieval, process management, access control) in a specific solution (CSTA, 2017).
HS3.CS.1.3
Investigate how the components of an operating system provide simplifying abstractions for a user or developer (e.g., the basic inputoutput system (BIOS), user interface, memory management, process management, file systems, devices, drivers).
HS4.CS.1.3
Defend the choice of an appropriate operating system based on the requirements of a given computer system or project.
HS1.CS.2.1
Interpret various types of error messages from various sources (e.g., operating systems, applications, application programming interfaces (APIs)) to assist in solving common computer malfunctions.
HS2.CS.2.1
Research credible sources of information that can be used for complex troubleshooting strategies (e.g., modifying system settings, correcting connectivity problems).
HS3.CS.2.1
Solve common computer malfunctions or describe the problem accurately, using technical vocabulary, so that others can solve it.
HS4.CS.2.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors (CSTA, 2017).
HS1.NI.1.1
Describe how hardware, software, and protocols work together for transmitting data across networks.
HS2.NI.1.1
Compare and contrast common network protocols (e.g., Internet Protocol (IP), File Transfer Protocol (FTP), Transmission Control Protocol (TCP), Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol with Secure Sockets Layer (HTTPS), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), Telnet, Secure Shell Protocol (SSH)) (Arkansas, 2016).
HS3.NI.1.1
Explain each layer of the Open Systems Interconnect (OSI) Model (Arkansas, 2016).
HS4.NI.1.1
Trace data through the Open Systems Interconnect (OSI) Model.
HS1.NI.1.2
Model the relationship between routers, switches, servers, topology, and addressing (CSTA, 2017).
HS2.NI.1.2
Analyze the tradeoffs and hierarchical structures of various common network topologies (Arkansas, 2016).
HS3.NI.1.2
Design a practical, efficient, and secure network solution (e.g., small office network) (Arkansas, 2016).
HS4.NI.1.2
Evaluate the scalability and reliability of a network (e.g., bandwidth, load, delay, topology) (CSTA, 2017).
HS1.NI.2.1
Reflect on case studies or current events in which governments or organizations experienced data leaks or data loss as a result of cybersecurity attacks (CSTA, 2017).
HS2.NI.2.1
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-of-service attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017).
HS3.NI.2.1
Research security measures (i.e., hardware, software, and practices that control access to data and systems) to combat a variety of cybersecurity vulnerabilities (CSTA, 2017).
HS4.NI.2.1
Recommend security measures (i.e., hardware, software, and practices that control access to data and systems) to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts (CSTA, 2017).
HS1.NI.2.2
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
HS2.NI.2.2
Compare and contrast ways software developers protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
HS3.NI.2.2
Evaluate various security measures, considering tradeoffs between the usability and security of a computing system. (e.g., a web filter that prevents access to many educational sites but keeps a campus’ network safe) (CSTA, 2017).
HS4.NI.2.2
Select and justify cybersecurity recommendations (i.e., hardware, software, and practices that control access to data and systems) appropriate for an intended audience and purpose (CSTA, 2017).
HS1.DA.1.1
Describe the various data collection methods, data analysis tools, and data representation tools.
  1. 10.1 Collecting and Storing Data
HS2.DA.1.1
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
  1. 10.1 Collecting and Storing Data
HS3.DA.1.1
Explain how different collection methods and tools influence the amount and quality of the data that is observed and recorded.
  1. 10.1 Collecting and Storing Data
HS4.DA.1.1
Justify the choice of a data collection method, data analysis tool, and data representation tool over alternate options.
  1. 10.1 Collecting and Storing Data
HS1.DA.1.2
Describe the various data storage tools and data organization methods.
  1. 10.1 Collecting and Storing Data
HS2.DA.1.2
Compare and contrast the various data storage tools and data organization methods.
  1. 10.1 Collecting and Storing Data
HS3.DA.1.2
Justify choices on how data elements are organized and where data is stored considering cost, speed, reliability, accessibility, privacy, and integrity (e.g., local storage, portable storage, cloud storage).
  1. 10.1 Collecting and Storing Data
HS4.DA.1.2
Evaluate the data storage needs of a computing solution (e.g., file compression).
HS1.DA.1.3
Distinguish between various methods of data representation (i.e., analog, digital, binary).
HS2.DA.1.3
Translate between various methods of data representation (i.e., analog, digital, ASCII, binary).
HS1.DA.2.1
Describe the properties of a data set that could be used to explore a realworld phenomenon or support a claim.
  1. 10.11 Using APIs
HS2.DA.2.1
Compare and contrast data sets that could be used to explore a real-world phenomenon or support a claim.
  1. 10.11 Using APIs
HS3.DA.2.1
Create data sets that could be used to explore a realworld phenomenon or support a claim.
HS4.DA.2.1
Evaluate the use of large data sets to explore a realworld phenomenon or support a claim.
  1. 10.11 Using APIs
HS1.DA.2.2
Identify various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016).
HS2.DA.2.2
Compare and contrast various types of computational models and their uses for data composed of multiple data elements that relate to one another (e.g., population data may contain information about age, gender, height) (K – 12 Framework, 2016).
HS3.DA.2.2
Evaluate the limitations of a computational model and the accuracy of inferences.
HS4.DA.2.2
Create a computational model using large data sets, make inferences, and address the limitations of the model.
HS1.DA.3.1
Identify a data set that could be used to solve a real-world problem.
HS2.DA.3.1
Evaluate how the same data set can be visualized and reconstructed to support multiple sides of an issue.
HS3.DA.3.1
Construct a data visualization to solve a real-world problem using software tools or programming (e.g., generated scatter, bar, and line charts).
HS4.DA.3.1
Analyze patterns in a data visualization then select a collection tool to validate a claim or share information with a group of people.
HS1.DA.3.2
Organize collected data to communicate the solution to a real-world phenomenon and support a claim.
HS2.DA.3.2
Compare and contrast data visualizations for exploring real-world phenomenon or supporting a claim.
HS3.DA.3.2
Evaluate possible computational models for data visualizations that aid in solving a variety of problems.
HS4.DA.3.2
Create a computational model for data visualization.
HS1.AP.1.1
Create flowcharts and/or pseudocode to express a problem or idea as an algorithm.
HS2.AP.1.1
Create algorithms to solve computational problems that have an application in the real world (e.g., local community, church, civic organization, school, home life).
HS3.AP.1.1
Adapt predefined algorithms to solve computational problems.
  1. 8.1 Introduction to jQuery
HS4.AP.1.1
Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017).
  1. 14.13 Loop and a Half
  2. 14.14 Functions and Parameters 1
  3. 14.15 Functions and Parameters 2
HS1.AP.2.1
Trace the flow of execution of a program that uses a combination of control structures (e.g., conditionals, loops, event handlers, recursion).
  1. 10.11 Using APIs
HS2.AP.2.1
Design and iteratively develop programs that combine control structures (e.g., conditionals, loops, event handlers, recursion).
  1. 10.11 Using APIs
HS3.AP.2.1
Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., tradeoffs involving implementation, readability, and program performance).
HS1.AP.2.2
Trace the flow of execution of a program that uses a variety of programming constructs (e.g., procedures, modules, objects).
  1. 14.14 Functions and Parameters 1
  2. 14.15 Functions and Parameters 2
HS2.AP.2.2
Design a solution through systematic analysis using programming constructs (e.g., procedures, modules, objects).
  1. 10.4 JavaScript Objects
HS3.AP.2.2
Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution.
  1. 10.4 JavaScript Objects
  2. 10.10 For/In Loops
HS1.AP.3.1
Decompose tasks into smaller, reusable parts to facilitate the design, implementation, and review of programs.
  1. 10.10 For/In Loops
HS2.AP.3.1
Develop code to solve the smaller parts of a decomposed task that can be reused to solve similar problems (e.g., procedures, functions, objects).
  1. 10.4 JavaScript Objects
HS3.AP.3.1
Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries).
  1. 8.1 Introduction to jQuery
  2. 10.11 Using APIs
HS4.AP.3.1
Justify the selection of modular parts in the creation of a complex solution.
  1. 5.12 The Box Model
  2. 10.4 JavaScript Objects
HS1.AP.4.1
Plan and develop programs for a variety of audiences using a process that incorporates development, feedback, and revision.
  1. 13.1 Intro to Design Thinking
  2. 13.3 Define
  3. 13.4 Ideate
  4. 13.5 Prototype
HS2.AP.4.1
Plan and develop a program that addresses potential security issues.
HS3.AP.4.1
Plan and develop a program that is accessible across multiple computing platforms (e.g., iOS, Unix, Windows, web-based).
HS4.AP.4.1
Evaluate a program through a review process (e.g., code review, beta testing, pilot group).
  1. 13.5 Prototype
  2. 13.6 Test
HS1.AP.4.2
Seek and incorporate feedback to refine a solution (e.g., users, team members, code review, teachers).
  1. 13.1 Intro to Design Thinking
  2. 13.5 Prototype
  3. 13.6 Test
HS2.AP.4.2
Systematically test programs using a range of test cases to meet design specifications (e.g., specific outcomes, functionality, user interface, error handling) (CSTA, 2017).
  1. 9.3 Interactive Resume Development
  2. 13.5 Prototype
  3. 13.6 Test
  4. 14.13 Loop and a Half
HS3.AP.4.2
Evaluate and refine programs to make them more usable, functional, and accessible.
  1. 9.3 Interactive Resume Development
  2. 13.5 Prototype
  3. 13.6 Test
HS4.AP.4.2
Implement version control to track program refinements.
HS1.AP.4.3
Recognize the variety of documentation methods available while developing a program (e.g., inline comments, procedure header, purposeful naming).
  1. 14.2 Variables
HS2.AP.4.3
Document programs in order to make them easier to follow, test, and debug.
  1. 14.2 Variables
HS3.AP.4.3
Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator.
  1. 8.1 Introduction to jQuery
  2. 10.11 Using APIs
HS4.AP.4.3
Justify design decisions by documenting the design process of complex programs (e.g., developer journal, digital portfolio, presentation).
HS1.AP.4.4
Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons).
  1. 3.6 Copyright
HS2.AP.4.4
Discuss the implications of using licensed resources in a developed solution.
  1. 3.6 Copyright
HS3.AP.4.4
Develop a systematic solution that incorporates licensed resources.
HS4.AP.4.4
Research the process for licensing student-created resources.
HS1.AP.5.1
Justify and use appropriate data types (i.e., primitive and non-primitive) in simple programs.
  1. 14.2 Variables
  2. 14.3 User Input
  3. 14.5 Booleans
HS2.AP.5.1
Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types and incorporate them in programs.
  1. 14.19 Intro to Lists/Arrays
HS3.AP.5.1
Determine when external data structures (e.g., databases, flat files) are appropriate and incorporate them in programs.
  1. 10.1 Collecting and Storing Data
  2. 10.7 Storing Data with Firebase
HS4.AP.5.1
Justify how data structures and abstraction are used to manage program complexity.
  1. 10.4 JavaScript Objects
  2. 14.19 Intro to Lists/Arrays
HS1.IC.1.1
Research computing solutions to problems in different countries, considering the personal, ethical, social, economic, and cultural impact (e.g., the use of drones to deliver blood and medical supplies in countries in Africa, the use of Uber in India to address traffic congestion).
HS2.IC.1.1
Compare and contrast the efficiency, feasibility, and ethical impacts of deploying the same computing solution in various countries.
HS3.IC.1.1
Hypothesize the future impacts of computing across the world (e.g., personal, health, workforce, economy, education, culture, environment).
HS1.IC.1.2
Research traditional and non-traditional computer science careers.
HS2.IC.1.2
Identify a computer science career in a nontraditional computer science industry for each of the five computing disciplines (i.e., computer science, software engineering, information technology, information systems, computer engineering).
HS3.IC.1.2
Research how computing is used in non-traditional computer science careers (e.g., sensors on soldiers’ or firefighters’ uniforms, robots to detect and diffuse explosive devices).
HS1.IC.2.1
Select the most appropriate means of communication for given situations (e.g., personal versus professional communication, communication with teachers and employers).
HS2.IC.2.1
Discuss how social media and computing devices have positively and negatively impacted communication.
  1. 2.3 Digital Footprint and Reputation
HS3.IC.2.1
Justify proper and improper use of social media and computing devices (e.g., role-playing and example scenarios).
  1. 2.3 Digital Footprint and Reputation
HS4.IC.2.1
Create rules of etiquette for proper use of social media and computing devices.
  1. 2.3 Digital Footprint and Reputation
HS1.IC.2.2
Discuss issues related to personal security (e.g., personal, financial, professional).
HS2.IC.2.2
Define and visually display students’ digital footprint.
  1. 2.3 Digital Footprint and Reputation
HS3.IC.2.2
Analyze the relationship between students’ digital footprint and personal security.
  1. 2.3 Digital Footprint and Reputation
HS4.IC.2.2
Recommend methods to protect digital information in different situations (e.g., traveling to other countries, two-factor authentication, encryption).
HS1.IC.2.3
Explain the implications of proper and improper use of social media (e.g., college admissions, employment, cyberbullying laws).
  1. 2.3 Digital Footprint and Reputation
HS2.IC.2.3
Identify ethical and legal computing practices.
HS3.IC.2.3
Distinguish among ethical, unethical, legal, and illegal computing practices (e.g., fair-use, illegal music/video downloads, sharing copyrighted pictures/videos, black-hat hacking, white-hat hacking).
HS4.IC.2.3
Investigate how computer use and digital privacy are governed across the globe (e.g., government regulations for computer use in the United State, Canada, China, North Korea, and Russia).
HS1.IC.3.1
Identify factors (e.g., net neutrality, government regulations, infrastructure, funding) that impact equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
HS2.IC.3.1
Research current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
HS3.IC.3.1
Evaluate the effectiveness of current efforts to provide equitable access to computing resources for underrepresented groups (e.g., race, ethnicity, gender, geographic location, socioeconomic status).
HS4.IC.3.1
Design a solution to improve equitable access to computing resources for underrepresented groups (e.g. classroom, school, neighborhood).
  1. 13.4 Ideate
HS1.IC.3.2
Identify computer scientists from underrepresented groups and their specific contributions (e.g., African-American, Latino, women, disabled).
HS1.IC 3.3
Identify the advantages and disadvantages of diverse perspectives and backgrounds when solving computational problems.
HS2.IC 3.3
Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age).
HS3.IC 3.3
Recommend modifications to make a current computing solution more inclusive for all users.
HS1.IC.4.1
Discuss how Moore’s Law has impacted computing.
HS2.IC.4.1
Discuss the advantages and disadvantages of advancing and emerging technologies over time (e.g., the impacts of artificial intelligence, virtual reality, and biometrics on productivity, job loss, inventions, quality of life, and globalization).
HS3.IC.4.1
Hypothesize problems that the next generation of computing will solve.
HS1.IC.4.2
Define and provide examples of big data (e.g., information collected from social media or smartphone use).
HS2.IC.4.2
Research how big data is used to solve computing problems.