Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming L1


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 2.4 Hardware
  2. 6.1 Intro to Digital Information
Explain the interactions between application software, system software, and hardware layers.
  1. 2.2 Computer Organization
  2. 2.3 Software
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and resolve errors.
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 7.2 Internet Hardware
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 9.4 Privacy & Security
  2. 15.2 What is Cybersecurity?
  3. 15.3 Impact of Cybersecurity
Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Compare various security measures, considering trade-offs between the usability and security of a computing system.
Explain trade-offs when selecting and implementing cybersecurity recommendations.
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
  1. 6.3 Encoding Text with Binary
  2. 6.4 Pixel Images
  3. 6.6 Pixel Colors!
Evaluate the trade-offs in how data elements are organized and where data is stored.
Create interactive data representations using software tools to help others better understand real-world phenomena (e.g., paper surveys and online data sets).
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
Create a prototype that uses algorithms (e.g., searching, sorting, finding shortest distance) to provide a possible solution for a real-world problem relevant to the student.
Describe how artificial intelligence algorithms drive many software and physical systems.
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made.
  1. 1.16 Karel Challenges
Trace the execution of loops and conditional statements, illustrating output and changes in values of named variables.
  1. 13.4 For Loops
  2. 13.16 If Statements
  3. 13.17 If/ Else Statements
  4. 13.18 While Loops
  5. 13.19 Putting Together Control Structures
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 13.19 Putting Together Control Structures
  2. 14.2 Game Events
  3. 14.3 Sound Effects
  4. 14.4 Make a Shot!
  5. 14.5 Air Horn App
  6. 14.6 Event Handlers
  7. 14.7 Putting Game
  8. 14.8 Level Up!
  9. 14.9 Final Touches
  10. 14.10 Make a Game!
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.16 Karel Challenges
  2. 13.10 Top Down Design
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 13.8 Functions
  2. 13.13 Parameters
  3. 14.2 Game Events
  4. 14.3 Sound Effects
  5. 14.4 Make a Shot!
  6. 14.5 Air Horn App
  7. 14.6 Event Handlers
  8. 14.7 Putting Game
  9. 14.8 Level Up!
  10. 14.9 Final Touches
  11. 14.10 Make a Game!
Plan and develop programs by analyzing a problem and/or process, developing and documenting a solution, testing outcomes, and adapting the program for a variety of users.
  1. 14.2 Game Events
  2. 14.3 Sound Effects
  3. 14.4 Make a Shot!
  4. 14.5 Air Horn App
  5. 14.6 Event Handlers
  6. 14.7 Putting Game
  7. 14.8 Level Up!
  8. 14.9 Final Touches
  9. 14.10 Make a Game!
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 9.6 Creative Credit & Copyright
Use debugging tools to identify and fix errors in a program.
  1. 1.16 Karel Challenges
Design and develop computational artifacts, working in team roles, using collaborative tools.
  1. 10.1 Project: Public Service Announcement
  2. 13.19 Putting Together Control Structures
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
Evaluate and refine computational artifacts to make them more usable and accessible.
  1. 14.4 Make a Shot!
  2. 14.6 Event Handlers
  3. 14.9 Final Touches
  4. 14.10 Make a Game!
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 7.7 The Impact of the Internet
  4. 9.1 Digital Footprint and Reputation
  5. 9.2 Cyberbullying
  6. 15.2 What is Cybersecurity?
Test and refine computational artifacts to reduce bias and equity deficits.
Demonstrate how a given algorithm applies to problems across disciplines.
Use tools and methods for collaboration.
  1. 13.19 Putting Together Control Structures
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 9.1 Digital Footprint and Reputation
  2. 9.2 Cyberbullying
  3. 9.3 Internet Safety
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 9.6 Creative Credit & Copyright
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 9.6 Creative Credit & Copyright