Please enable JavaScript to use CodeHS

Standards Mapping

for Alabama Programming Foundations

29

Standards in this Framework

16

Standards Mapped

55%

Mapped to Course

Standard Lessons
F1
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
F2
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
F3
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
  1. 7.1 Communication is Key!
  2. 7.3 Building a Knowledge Base
F4
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
  1. 1.4 Cyber Ethics and Laws
  2. 4.7 Software Licenses
F5
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
F6
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
  1. 3.1 Create an Escape Room
  2. 7.4 Star in a Video!
F7
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
  1. 3.1 Create an Escape Room
  2. 8.4 Dev Tools Capture the Flag
1
Describe ethical and legal practices for safeguarding the confidentiality of business-related information
  1. 1.4 Cyber Ethics and Laws
  2. 1.5 Personal Data Security
2
Describe possible threats to a laptop, tablet, computer, and/or network and methods for avoiding attacks related to programming.
  1. 1.7 Common Cyber Attacks and Prevention
  2. 4.8 Application Security
3
Explain the consequences of social engineering, illegal, and unethical uses of technology.
  1. 1.4 Cyber Ethics and Laws
  2. 1.7 Common Cyber Attacks and Prevention
4
Describe computing innovations which have the potential to advance programming or other aspects of computer science.
  1. 5.9 Impact of the Internet
5
Describe the flow of data and instructions through computer systems.
  1. 5.5 IP Addresses
  2. 5.6 Routing and Packets
6
Explain how data is represented, manipulated, and stored in a computer.
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
7
Describe the components of the programming development environment (the hardware and software used by programmers).
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
8
Compare and contrast current programming languages utilized by business and industry and determine features, functions, and benefits of each.
9
Identify and explain various kinds of cryptographic algorithms.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
10
Explain why any input-processing algorithm must correctly handle all problem variants.
11
Write an algorithm to solve mathematical problems using formulas, equations, and functions.
12
Represent the logical flow of a program graphically.
13
Utilize and explain techniques for code commenting and documentation.
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
14
Design a program that uses mathematical operations, data, functions, looping and iteration, sequencing, abstraction, lists, and selection.
15
Design a program that passes arguments and parameters (variables).
16
Evaluate algorithms based on given designs to discuss their efficiency, correctness, and clarity
17
Construct programs that utilize logical algorithms from specifications and requirement statements.
18
Create a model software program which involves coding, testing, and documenting according to industry coding standards and guidelines.
19
Explain how strings of 0s and 1s are used in programming.
  1. 5.1 Computers Speak Binary
20
Summarize how numerical values are represented using different bases, including decimal and binary
  1. 5.2 Bits, Text, and Numbers
21
Demonstrate how numbers with decimals can have fixed-point or floating-point representations in binary.
22
Compare and contrast quantum and classical computing notation systems.