Please enable JavaScript to use CodeHS

Standards Mapping

for South Dakota CS Principles


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Compare and contrast how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 2.8 Abstraction
Use concepts to compare levels of abstraction and interactions between application software, system software, and hardware layers.
Develop and implement guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 2.17 Debugging Strategies
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.1 What is Cybersecurity?
  2. 1.6 Privacy & Security
Recommend security measures to address various scenarios based on the CIA Triad (confidentiality, integrity, and availability).
  1. 1.2 The CIA Triad
Recommend various security measures, considering tradeoffs between the usability and security of a computing system.
  1. 1.5 Internet Safety
  2. 1.6 Privacy & Security
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
Evaluate the tradeoffs in how data elements are organized and where data is stored.
  1. 1.7 Information Literacy
Select and use data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
Use and evaluate algorithms in terms of their efficiency, correctness, and clarity.
Compare and contrast fundamental data structures and their uses.
  1. 5.2 Variables
  2. 9.11 Intro to Lists/Arrays
  3. 17.1 Intro to Objects/Maps
  4. 17.5 Intro to Sets
  5. 17.6 Intro to Grids
Recommend specific control structures and identify tradeoffs involving implementation, readability, and program performance.
  1. 2.10 For Loops
  2. 2.11 If Statements
  3. 2.12 If/Else Statements
  4. 2.13 While Loops in Karel
  5. 2.14 Control Structures Example
  6. 3.2 Challenge Problems
  7. 7.4 If Statements
  8. 7.5 For Loops in JavaScript
  9. 7.6 General For Loops
  10. 7.7 For Loop Practice
  11. 7.9 While Loops
  12. 7.10 Loop and a Half
  13. 8.1 Control Structures Challenges
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 9.1 Functions and Parameters 1
  3. 9.2 Functions and Parameters 2
  4. 9.3 Functions and Parameters 3
  5. 9.4 Functions and Return Values 1
  6. 9.5 Functions and Return Values 2
  7. 9.6 Timers
  8. 17.1 Intro to Objects/Maps
  9. 17.2 Basics of Objects
  10. 17.4 When Do I Use an Object?
Construct solutions to problems based on user feedback.
  1. 10.1 Intro to Design Thinking
  2. 10.3 Test
Plan and develop programs for broad audiences using a software life cycle process.
Investigate and compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 1.3 Digital Footprint and Reputation
  2. 1.4 Cyberbullying
  3. 1.10 Creative Credit & Copyright
  4. 4.7 The Impact of the Internet
Identify and critique bias, equity, access, and influence in existing computer programs.
  1. 10.3 Test
Identify and use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  1. 3.1 Collaborative Programming
Debate laws and regulations that impact the development and use of software.
  1. 1.3 Digital Footprint and Reputation
  2. 1.5 Internet Safety
  3. 1.6 Privacy & Security
  4. 1.10 Creative Credit & Copyright
Explore careers in computer science.
  1. 11.1 Computer Science Careers