Please enable JavaScript to use CodeHS

Standards Mapping

for Arizona 8


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Improve the design of computing devices based on an analysis of how users interact them, and consider unintended consequences.
Design and evaluate projects that combine hardware and software components to collect and exchange data.
Systematically identify and develop strategies to fix problems with computing devices and their components.
  1. 11.3 Network Devices
  2. 12.1 Methodology
  3. 12.2 Support Practice
Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 6.1 Project: Classic Cipher Newscast
Evaluate how various physical and digital security measures protect electronic information and how a lack of such measures could lead to vulnerabilities.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
  6. 8.9 Common Security Problems
  7. 8.10 SQL Injection Overview
  8. 8.11 Types of SQLi and Prevention
Develop models to illustrate the role of protocols in transmitting data across networks and the Internet.
  1. 10.8 Packets & Protocols
Collect data using computational tools and transform the data to make it more meaningful and useful.
Represent data using multiple encoding schemes including binary and ASCII.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
Design computational models and evaluate them based on the reliability and validity of the data they generate.
Develop planning strategies, such as flowcharts or pseudocode, to develop algorithms to address complex problems.
  1. 21.1 Challenge Problems
Create named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
  3. 22.1 Booleans
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.4 If Statements
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
Decompose problems into parts to facilitate the design, implementation, and review of programs.
  1. 21.1 Challenge Problems
Create procedures with parameters to organize code and make it easier to reuse.
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
Incorporate existing code, media, and libraries into original programs, and give attribution.
Systematically test and refine programs using a range of possible inputs.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.4 If Statements
  5. 22.9 While Loops
Distribute and execute tasks while maintaining a project timeline when collaboratively developing computational artifacts.
Document programs to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
Compare and contrast tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 10.10 Impact of the Internet
Develop a solution to address an issue of bias or accessibility in the design of existing technologies.
Collaborate with contributors by using digital technologies when creating a computational product.
  1. 3.1 Project: Public Service Announcement
Evaluate the benefits and risks associated with sharing information digitally.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention