Please enable JavaScript to use CodeHS

Standards Mapping

for Tennessee Computer Science Foundations


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Accurately read, interpret, and demonstrate adherence to safety rules, including (1) rules published by the National Science Teachers Association (NSTA), (2) rules pertaining to electrical safety, (3) Internet safety, (4) Occupational Safety and Health Administration (OSHA) guidelines, and (5) state and national code requirements. Be able to distinguish between rules and explain why certain rules apply.
  1. 3.1 Safety Guidelines
Identify and explain the intended use of safety equipment available in the classroom. For example, demonstrate how to properly inspect, use, and maintain safe operating procedures with tools and equipment.
  1. 3.1 Safety Guidelines
Demonstrate understanding of electrical circuits and devices, and relate to the physical laws (such as Ohm’s Law and power laws) that govern behaviors of electrical circuits and devices. Accurately apply these physical laws to solve problems. For example, calculate the resistance of a DC circuit with a given DC voltage and current.
  1. 3.2 Introduction to Tinkercad Circuits
  2. 3.3 Introduction to Electrical Principles
Assemble the required connections of electronic test equipment to properly test the operation of basic electronic circuit behavior and performance, using equipment such as a digital multimeter. For example, demonstrate the proper use of a digital multimeter by measuring resistance of a circuit in a typical computer system; compare this finding by calculating the resistance given the voltage and current.
  1. 3.2 Introduction to Tinkercad Circuits
  2. 3.3 Introduction to Electrical Principles
Distinguish between the binary and hexadecimal counting systems. Using appropriate units, provide examples of each system and identify specific instances when IT professionals rely on them.
  1. 6.2 Number Systems
  2. 6.3 Encoding Text with Binary
Explain the functions of gates in logic circuits (e.g., AND, OR, NOT). For example, construct a truth table for the seatbelt warning light in an automobile.
  1. 3.4 Logic Gates and Chips
Research various occupations in information technology industries, such as programmers, web designers, webmasters, networking administrators, computer systems administrators, telecommunications line installers, and informational security analysts. Compose an informative table or chart that includes the following: work activities typically performed, tools and technology used, nature of work environment, and the knowledge and skills needed for success.
  1. 7.12 Careers and Ethics in the Internet Age
  2. 9.4 System Administration
Explore various professional societies related to information technology and identify the services and benefits provided by each member. Create a table that lists their purposes, benefits to membership, and any certifications affiliated with the organization. For example, investigate the Institute for Electrical and Electronics Engineers (IEEE), Computing Technology Industry Association (CompTIA), and the Association for Computing Machinery (ACM).
  1. 7.12 Careers and Ethics in the Internet Age
Drawing on multiple sources (i.e., internet, textbooks, videos, and journals), research the history of the Internet. Create a timeline or infographic, illustrating the Internet’s historical evolution from its inception to the present time. Discuss the needs that led to the creation of the Internet; discuss both the benefits and disadvantages of the Internet to society, as well as potential implications for the future. Provide examples drawn from the research to support claims.
  1. 7.1 Welcome to the Internet
Drawing on multiple sources (i.e., internet, textbooks, videos, and journals), research the history and development of operating systems (e.g., Microsoft Windows, Linux, UNIX). Create a presentation, illustrating their historical evolution, from their inceptions to the present, citing information found in research. Compare and contrast the general capabilities of a variety of operating systems, and explain how their designs and functionalities have improved over time.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 History of Operating Systems
Demonstrate an understanding of basic web terminology and concepts. Practice explaining these terminologies and concepts by creating methods to help students learn and remember the information. For example, students should be able to explain the purpose of terminology such as server, domain name system (DNS) , internet service provider (ISP), hardware and software connective devices, cloud computing, remote access protocols, map protocols, content management systems (CMS), cascading style sheets (CSS), and social networking terms.
  1. 4.1 Introduction to HTML
  2. 4.2 Structure of an HTML Page
  3. 4.3 Formatting Text
  4. 4.5 Images
  5. 4.6 HTML Lists
  6. 4.7 HTML Tables
  7. 4.8 HTML Styling
  8. 4.10 CSS Select by Tag
  9. 4.11 CSS Select by Class
  10. 4.12 CSS Select by ID
  11. 7.2 Internet Hardware
  12. 7.4 Viewing Websites
  13. 7.5 DNS
  14. 8.1 Cloud Computing
Demonstrate a basic understanding of computer hardware components. Identify these components using pictures or actual models and briefly explain the function of each. Components should include, but are not limited to: a. Hardware used for input and output b. Hardware inside the computer case c. Motherboard d. Processor and the chipset e. Storage devices (e.g., primary, secondary) f. Expansion cards g. Electrical system
  1. 2.2 Computer Organization
  2. 2.5 Hardware
Demonstrate a basic understanding of computer networking. For example, explain the types of networks and what a client-server environment is.
  1. 2.2 Computer Organization
  2. 7.3 Internet Addresses
Identify, explain, and demonstrate the use of common keyboard shortcuts. Create a quick reference guide that would be user-friendly for a novice web designer. For example, students may create a multiple column table showing keyboard shortcuts for navigation, text editing, and text formatting. The table would identify which shortcuts are applicable to using Windows versus Mac OS.
  1. 4.13 Project: Make a Keyboard Shortcut Cheat Page
Synthesize research of historical and significant milestones that influenced the evolution of cloud computing. Create an annotated timeline or visual graphic illustrating significant time periods and major impacts of technology trends that influenced the development of cloud computing. Use academic research and news media citing specific textual evidence from research.
  1. 8.2 History of Cloud Computing
Identify, describe, and effectively summarize cloud technology roles including: cloud computing customer, cloud service provider and cloud service partner. Create a written report or visual depiction outlining the characteristics of each.
  1. 8.1 Cloud Computing
Research the features and requirements of the four main deployment models for cloud technology: public, private, community, and hybrid. Create a graphic illustration showing the roles of each and describe their differences.
  1. 8.3 Cloud vs Physical Computing
Consult a variety of sources to describe how virtualization, storage, networking and databases in cloud technologies are used. Sources may include textbooks, manuals, websites, video tutorials, and more. Create a visual display with accompanying text comparing these methods.
  1. 8.3 Cloud vs Physical Computing
Explore the onset of the Internet of Things (IoT) and explain how it is enabled by sensors, actuators, communication devices and computers that exchange and process data and can interface with users in a most instinctual way. Using a specific example, summarize in a graphic illustration or narrative how the IoT combines information, automation, computation, software, sensing, and networking to make traditional processes more efficient.
  1. 8.4 The Internet of Things
  2. 9.1 What is Cybersecurity?
Consult internet forums, textbooks, industry journals and other instructional materials to research the importance of developing and implementing databases, data collection systems, data analytics and other strategies that optimize statistical efficiency and quality. Write a brief paper that discusses the importance of these services in business today. Provide specific examples to support the claims.
  1. 10.1 Getting Started with Data
  2. 10.3 Data Collection & Limitations
There are different versions of the web design and development process. For example, most versions of the web design and development process involve project definition, site structure, visual design, site development, testing, refining, and launch. Using various resources, research, identify, and explain the steps involved in the process. As a class, develop an agreed-upon framework for applying the logical thought process to web design projects in the form of a flowchart or logic model, justifying the reasoning behind each step. Explain why it is an iterative process and always involves refinement.
  1. 5.3 Planning Your Site
Research, identify, and describe the specific activities involved at each step of the troubleshooting process, including by not limited to:1) gather information from the user or operator and back up data, 2) verify the problem exists, 3) isolate the cause of the problem and generate alternative solutions, 4) plan a solution and resolve the problem, 5) verify that the problem was resolved and prevent a future occurrence, and 6) document findings, resolution, and preventative maintenance plan. Explain why it is important to document the process throughout.
  1. 6.9 Troubleshooting Computer Issues
Demonstrate an understanding of flowcharts and know what various symbols mean. Identify a problem that a programmer would solve using the logical thinking process, and create a flowchart that would guide the code development. For example, create a flowchart that incorporates at least three decisions, or paths, to solve a problem.
  1. 10.2 Visualizing and Interpreting Data
Explore how teams are formed to complete and manage web design and development projects. Using the information gained from research, identify and explain various roles and responsibilities for members of a web design and development team. Include why teams are more efficient than individuals in the web design and development process. Present the findings to classmates.
  1. 5.1 Using Teams to Create Websites
Synthesize common principles and templates for successful project management. Explain, using examples, why strong management skills are important in the web design and development process.
  1. 5.1 Using Teams to Create Websites
  2. 5.3 Planning Your Site
Research and identify the skills that are required to communicate effectively with a client. Develop a questionnaire that would be used to determine the needs of a client for a prospective web development project. Using the questionnaire, conduct mock client interviews with classmates and provide each other with constructive feedback to revise the questionnaire and process.
  1. 5.2 Project Overview
As a team, list primary rules to guide writing content that is appropriate for a web site publication. Apply these rules to a variety of web-based writing assignments throughout the course. For example, develop and maintain a blog throughout the course to practice appropriate writing techniques and style for web publication.
  1. 5.4 Project: Your First Website
Given a specific client’s vision, create a simple web site using a content management system (CMS) such as WordPress. Follow the multistep process to download the software application of choice, and demonstrate how to upload and store files. Practice proofreading and critiquing other classmates’ sites, and provide constructive feedback on one another’s writing and layout design.
  1. 5.4 Project: Your First Website
Drawing on multiple sources (i.e., internet, textbooks, videos, and journals), research the various social, legal, and ethical issues encountered by IT professionals. Using these findings, identify the roles and responsibilities one must consider while developing a prospective project or addressing an IT problem. For example, web developers and programmers must apply copyright laws and understand uses of open source software.
  1. 7.11 Creative Credit & Copyright
  2. 7.12 Careers and Ethics in the Internet Age
Using various sources (i.e., internet, textbooks, videos, and journals), research and identify reasons as to why data security should be a priority to technology professionals through demonstrating an understanding of information security fundamentals on Confidentiality, Availability, and Integrity.
  1. 9.1 What is Cybersecurity?
  2. 9.2 Impact of Cybersecurity
  3. 9.3 The CIA Triad
Demonstrate an understanding of the various security breaches that can occur with the Internet. Prepare a text explaining enterprise-level security, the purpose of encryption, and the protocols that can be implemented to secure web sites. Evaluate personal privacy issues versus employers’ rights to regulate computing resources.
  1. 9.2 Impact of Cybersecurity
  2. 9.3 The CIA Triad
Identify various security practices for computer and network systems, such as how to control access to secured resources and computer resources. Give specific examples of methods that an administrator can use, like encryption techniques, basic input/output system (BIOS) features, and strategies for dealing with malware.
  1. 9.4 System Administration
Understand and demonstrate the effective use of file and folder management techniques to maintain directory structure for a web site. Describe the most efficient methods for digital file management, including the use of site root and subfolders for assets (e.g., images, templates, CSS).
  1. 11.1 File Management for Websites
Explore and identify various languages, such as Python, HTML, PHP, C++, Visual Basic, Java, JavaScript, and C #. Explain how programmers use these languages to solve a variety of IT problems, furnishing examples of how they are applied.
  1. 1.1 Introduction to Programming With Karel
  2. 1.2 More Basic Karel
  3. 1.3 Karel Can't Turn Right
  4. 1.4 Functions in Karel
  5. 1.6 Top Down Design and Decomposition in Karel
  6. 1.7 Commenting Your Code
  7. 1.9 For Loops
  8. 1.10 If Statements
  9. 1.12 While Loops in Karel
  10. 1.13 Control Structures Example
  11. 4.1 Introduction to HTML
Using various resources, research, identify, and explain the steps involved in the software development life cycle, including but not limited to: planning, designing, coding, testing, deployment, and maintenance. Explain why it is an iterative process and always involves refinement.
  1. 11.5 Software Development Life Cycle
Demonstrate an understanding of how batch files function within a programming environment. Identify common commands to create code for batch files (e.g., title, echo, echo off, pause, CLS, ipconfig, and ping). For example, list various scenarios for using batch files to complete specific programming tasks. Create and execute batch file code to perform one of the tasks identified.
  1. 11.2 Command Line Interface
  2. 11.3 Network Management
  3. 11.4 Shell Scripts