Please enable JavaScript to use CodeHS

Standards Mapping

for Alabama DLCS 2025 HS

Clear selection Print / Download

45

Standards in this Framework

32

Standards Mapped

71%

Mapped to Course

Standard Lessons
DLCS25.HS.1
Compare and contrast a generalized algorithm in pseudocode and its concrete implementation in a programming language.
  1. Advanced Python and AI Programming
  2. 5.1 Algorithms in Computing
DLCS25.HS.2
Translate pseudocode, flowcharts, or other planning tools into multiple programming languages.
  1. Advanced Python and AI Programming
  2. 5.1 Algorithms in Computing
DLCS25.HS.3
Explain the characteristics of algorithms, including speed, accuracy, and storage requirements.
  1. Indiana Computing Foundations for a Digital Age
  2. 5.13 Comparing Algorithms
  3. Advanced Python and AI Programming
  4. 5.2 Informal Runtime Analysis
  5. 5.4 Big O Notation
DLCS25.HS.4
Model and adapt classic algorithms, including sorting and searching, to solve computational problems.
  1. Advanced Python and AI Programming
  2. 1.11 Binary Search
  3. 5.3 Linear Search
  4. 5.6 Selection Sort
  5. 5.7 Insertion Sort
DLCS25.HS.5
Decompose problems into component parts, extract key information, and model levels of abstraction in complex systems.
  1. Indiana Computing Foundations for a Digital Age
  2. 10.5 Top Down Design and Decomposition in Karel
  3. AP Computer Science Principles in Python
  4. 1.6 Top Down Design and Decomposition in Karel
DLCS25.HS.6
Compare different data compression algorithms by analyzing their main features, including their compression speed and whether they preserve data exactly (lossless) or reduce data quality for higher compression (lossy).
DLCS25.HS.7
Create software solutions using libraries and application programming interfaces (APIs) that demonstrate code reuse.
  1. Indiana Computing Foundations for a Digital Age
  2. 11.4 Modules, Packages & Libraries
DLCS25.HS.8
Compare and contrast the major categories of machine learning, including supervised, unsupervised, and reinforcement learning. [AI]
  1. Introduction to AI for High School
  2. 3.1 Intro to Machine Learning
  3. 3.2 Supervised Learning
  4. 3.3 Unsupervised Learning
  5. 3.4 Reinforcement Learning
DLCS25.HS.9
Compare and contrast fundamental data structures and their uses.
DLCS25.HS.10
Develop and use a series of test cases to verify that a program performs according to its design specifications.
DLCS25.HS.11
Utilize an iterative and incremental software design process, including learning from mistakes, to improve a program.
  1. Indiana Computing Foundations for a Digital Age
  2. 7.1 Tech Impact Project
DLCS25.HS.12
Improve existing code by restructuring (refactoring) it to enhance readability and/or increase efficiency without changing its overall behavior.
DLCS25.HS.13
Select and utilize effective debugging techniques to correct problems in software.
  1. Indiana Computing Foundations for a Digital Age
  2. 10.14 Debugging Strategies
  3. AP Computer Science Principles in Python
  4. 1.15 Debugging Strategies
DLCS25.HS.14
Create a complete program to solve a problem or explore personal interests, using a text-based programming language.
  1. Indiana Computing Foundations for a Digital Age
  2. 7.1 Tech Impact Project
DLCS25.HS.15
Design and implement a program that processes user input, applies relational and logical operators within conditional logic, maintains program state, and produces appropriate responses.
  1. Indiana Computing Foundations for a Digital Age
  2. 7.1 Tech Impact Project
DLCS25.HS.16
Create interactive data visualizations to help others understand real-world phenomena. [AI]
DLCS25.HS.17
Verify the validity of a dataset by identifying missing, out-of-range, inconsistent, or invalid data and distinguishing these from statistical outliers using basic measures such as range, mean, or standard deviation.
  1. Indiana Computing Foundations for a Digital Age
  2. 6.5 Data Cleaning
DLCS25.HS.18
Correct or remove entries containing missing, out-of-range, inconsistent, or invalid data from a dataset to prepare it for analysis.
  1. Indiana Computing Foundations for a Digital Age
  2. 6.5 Data Cleaning
DLCS25.HS.19
Utilize data analysis tools and statistical methods on a dataset to discover useful information, identify patterns, or make an informed decision.
  1. Indiana Computing Foundations for a Digital Age
  2. 6.9 Statistical Measures
DLCS25.HS.20
Create and utilize models and simulations to help formulate, test, and refine a hypothesis.
  1. AP Computer Science Principles in Python
  2. 7.5 Simulation
DLCS25.HS.21
Update an existing model to address flaws and improve precision.
DLCS25.HS.22
Analyze how network infrastructure impacts the speed, reliability, and scalability of services.
  1. Indiana Computing Foundations for a Digital Age
  2. 3.7 Network Devices
  3. Fundamentals of Cybersecurity
  4. 6.5 Network Devices
DLCS25.HS.23
Explain how security protocols in networked systems protect or expose data and assess the risks associated with IoT devices and cloud services.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.6 Cybersecurity Essentials
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 8.7 Risky Business
DLCS25.HS.24
Explain the tradeoffs when selecting and implementing cybersecurity recommendations, balancing cost, performance, usability, and security.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.5 Personal Data Security
  3. Fundamentals of Cybersecurity
  4. 1.5 Personal Data Security
DLCS25.HS.25
Summarize the mechanisms and purposes of various tracking technologies and identify strategies to manage them.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.2 Personal Data and Collection
  3. Fundamentals of Cybersecurity
  4. 1.2 Personal Data and Collection
DLCS25.HS.26
Investigate the purpose of and relationship among various computer security measures.
  1. Indiana Computing Foundations for a Digital Age
  2. 3.9 Network Communication
  3. Fundamentals of Cybersecurity
  4. 6.10 Network Communication
DLCS25.HS.27
Create a personal cybersecurity plan incorporating the CIA Triad *(confidentiality, integrity, and availability)* to safeguard sensitive information and ensure its trustworthiness and accessibility.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.6 Cybersecurity Essentials
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
DLCS25.HS.28
Investigate the motivations behind hacking and examine the associated ethical considerations.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.4 Cyber Ethics and Laws
  3. Fundamentals of Cybersecurity
  4. 1.4 Cyber Ethics and Laws
DLCS25.HS.29
Appraise the trustworthiness of new or unfamiliar resources in order to make safe choices when downloading, installing, and using software.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.7 Common Cyber Attacks and Prevention
  3. 2.9 Application Security
  4. Fundamentals of Cybersecurity
  5. 1.7 Common Cyber Attacks and Prevention
  6. 4.8 Application Security
DLCS25.HS.30
Compare alternative computing architectures, including cluster and quantum computing, to classical computing systems.
DLCS25.HS.31
Explain the interactions between application software, operating systems, drivers, and hardware.
  1. Indiana Computing Foundations for a Digital Age
  2. 2.3 Operating Systems
  3. 2.5 Comparing Operating Systems
  4. 2.6 Compatibility
  5. Fundamentals of Cybersecurity
  6. 4.1 Operating Systems
  7. 4.3 Comparing Operating Systems
  8. 4.4 Compatibility
DLCS25.HS.32
Compare and contrast the common metadata elements of various file types.
  1. Indiana Computing Foundations for a Digital Age
  2. 2.6 Compatibility
  3. Fundamentals of Cybersecurity
  4. 4.4 Compatibility
DLCS25.HS.33
Develop and implement troubleshooting strategies to identify and correct problems with computing devices.
  1. Indiana Computing Foundations for a Digital Age
  2. 4.2 Troubleshooting Methodology
  3. Fundamentals of Cybersecurity
  4. 7.2 Troubleshooting Methodology
DLCS25.HS.34
Research and explain the impact of computing technology on career pathways across different industries and career fields.
  1. Indiana Computing Foundations for a Digital Age
  2. 4.1 Communication is Key!
  3. Fundamentals of Cybersecurity
  4. 7.1 Communication is Key!
  5. 10.1 After Fundamentals of Cybersecurity
DLCS25.HS.35
Research and share information regarding current AI applications in various career fields. [AI]
DLCS25.HS.36
Analyze the implications of data privacy and consent for making informed decisions about personal data security.
  1. Indiana Computing Foundations for a Digital Age
  2. 1.2 Personal Data and Collection
  3. Fundamentals of Cybersecurity
  4. 1.2 Personal Data and Collection
DLCS25.HS.37
Identify and evaluate the consequences of technology-related laws and policies, including those addressing privacy, accessibility, and intellectual property.
  1. Introduction to AI for High School
  2. 5.7 AI Governance and the Future of AI
DLCS25.HS.38
Analyze the ethical issues related to AI technologies and evaluate their societal and ecological impacts. [AI]
  1. Introduction to AI for High School
  2. 5.1 Effects of Using Biased AI
  3. 5.2 Hallucinations and Security Risks
  4. 5.3 Deepfakes and Misinformation
  5. 5.6 Environmental Impacts of AI
DLCS25.HS.39
Predict the transformative effects of hypothetical future technologies. [AI]
DLCS25.HS.40
Follow Americans with Disabilities Act (ADA) standards to design digital artifacts that reduce barriers caused by the digital divide, disability, or bias.
DLCS25.HS.41
Research and report potential dangers and unintended consequences of over-reliance on AI tools. [AI]
DLCS25.HS.42
Explain how systems learn user preferences and behaviors to deliver personalized content and targeted advertisements. [AI]
  1. Introduction to AI for High School
  2. 1.7 Who Builds AI?
DLCS25.HS.43
Investigate the mental health risks associated with excessive technology use, including social isolation, anxiety, and depression, and develop strategies to mitigate them.
DLCS25.HS.44
Evaluate the usability of software applications for broad audiences by considering feedback from real-world users.
DLCS25.HS.45
Identify a problem best solved through human-machine collaboration, decomposing it into tasks suited for each.
  1. Introduction to AI for High School
  2. 1.2 Human & Artificial Intelligence
  3. 6.2 Project: AI-Assisted Coding