Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming L2


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Categorize the roles of operating system software.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
Identify how hardware components facilitate logic, input, output, and storage in computing systems, and their common malfunctions.
  1. 10.1 Internal Components
  2. 10.2 Peripheral Devices
Describe the issues that impact network functionality (e.g., bandwidth, load, latency, topology).
  1. 9.4 Internet Hardware and Sending Information
  2. 10.5 Network Options
Compare ways software developers protect devices and information from unauthorized access.
  1. 8.9 Common Security Problems
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
Use data analysis tools and techniques to identify patterns in data representing complex systems.
Select data collection tools and techniques, and use them to generate data sets that support a claim or communicate information.
Formulate, refine, and test scientific hypotheses using models and simulations.
Critically examine and trace classic algorithms. Use and adapt classic algorithms to solve computational problems (e.g., selection sort, insertion sort, binary search, linear search).
Develop an artificial intelligence algorithm to play a game against a human opponent or solve a real-world problem.
Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency, correctness, and clarity.
Compare and contrast simple data structures and their uses (e.g., lists, stacks, queues).
Trace the execution of recursion, illustrating output and changes in values of named variables.
Construct solutions to problems using student-created components, such as procedures, modules, and/or objects.
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 21.1 Challenge Problems
Demonstrate code reuse by creating programming solutions using libraries and APIs.
Plan and develop programs that will provide solutions to a variety of users using a software life cycle process.
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (e.g., code documentation) in a group software project.
Develop programs for multiple computing platforms.
Evaluate key qualities of a program through a process such as a code review (e.g., qualities could include correctness, usability, readability, efficiency, portability, and scalability).
Develop and use a series of test cases to verify that a program performs according to its design specifications
Explain security issues that might lead to compromised computer programs.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 4.1 Programming Concepts
Evaluate the beneficial and harmful effects that computational artifacts and innovations have on society.
  1. 1.2 What is Cybersecurity?
  2. 7.4 Software and Applications
  3. 9.10 Impact of the Internet
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 9.1 Introduction to the Internet
  2. 9.10 Impact of the Internet
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 9.10 Impact of the Internet
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
Debate laws and regulations that impact the development and use of software and technology.
  1. 2.6 Creative Credit & Copyright
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 1.2 What is Cybersecurity?
  2. 2.1 Digital Footprint and Reputation
  3. 2.2 Cyberbullying
  4. 2.4 Privacy & Security
  5. 2.6 Creative Credit & Copyright