Please enable JavaScript to use CodeHS

Standards Mapping

for South Dakota CS Principles


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Compare and contrast how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
  4. 6.1 Intro to Digital Information
Use concepts to compare levels of abstraction and interactions between application software, system software, and hardware layers.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
  4. 6.1 Intro to Digital Information
Develop and implement guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 7.2 Internet Hardware
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
  6. 7.7 The Impact of the Internet
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 9.4 Privacy & Security
  2. 15.2 What is Cybersecurity?
  3. 15.3 Impact of Cybersecurity
Recommend security measures to address various scenarios based on the CIA Triad (confidentiality, integrity, and availability).
  1. 15.4 The CIA Triad
Recommend various security measures, considering tradeoffs between the usability and security of a computing system.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
  1. 6.1 Intro to Digital Information
  2. 6.2 Number Systems
  3. 6.3 Encoding Text with Binary
  4. 6.4 Pixel Images
  5. 6.5 Hexadecimal
  6. 6.6 Pixel Colors!
  7. 6.7 Image Manipulation
Evaluate the tradeoffs in how data elements are organized and where data is stored.
  1. 9.5 Information Literacy
  2. 13.11 Variables
Select and use data collection tools and techniques to generate data sets that support a claim or communicate information.
Use and evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 1.16 Karel Challenges
  2. 4.13 Viewing Websites
Compare and contrast fundamental data structures and their uses.
Recommend specific control structures and identify tradeoffs involving implementation, readability, and program performance.
  1. 1.12 While Loops in Karel
  2. 1.13 Control Structures Example
  3. 1.14 More Karel Examples and Testing
  4. 1.15 How to Indent Your Code
  5. 1.16 Karel Challenges
  6. 13.14 Using i in For Loops
  7. 13.15 Extended Loop Control
  8. 13.18 While Loops
  9. 13.19 Putting Together Control Structures
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.8 Functions
  3. 13.10 Top Down Design
Construct solutions to problems based on user feedback.
  1. 14.9 Final Touches
  2. 14.10 Make a Game!
Plan and develop programs for broad audiences using a software life cycle process.
Investigate and compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 1.1 Introduction to Programming With Karel
  2. 4.1 Introduction to HTML
  3. 4.9 Introduction to CSS
  4. 13.1 Intro to Python with Tracy the Turtle
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 7.7 The Impact of the Internet
  4. 9.1 Digital Footprint and Reputation
  5. 9.2 Cyberbullying
  6. 9.6 Creative Credit & Copyright
Identify and critique bias, equity, access, and influence in existing computer programs.
Identify and use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
Debate laws and regulations that impact the development and use of software.
  1. 7.7 The Impact of the Internet
  2. 9.1 Digital Footprint and Reputation
  3. 9.3 Internet Safety
  4. 9.4 Privacy & Security
  5. 9.6 Creative Credit & Copyright
Explore careers in computer science.