Please enable JavaScript to use CodeHS

Standards Mapping

for Florida Discovering Computer Science

121

Standards in this Framework

103

Standards Mapped

85%

Mapped to Course

Standard Lessons
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration.
SC.912.CC.1.2
Utilize tools within a project environment to communicate.
SC.912.CC.1.3
Present information and data using presentation software.
  1. Data Science with Python
  2. 1.10 Mini-Project: Findings
  3. 3.11 Data Storytelling Quiz
  4. AP Computer Science Principles in Python
  5. 14.1 Present a Data-Driven Insight
  6. Introduction to Python Programming
  7. 8.1 Project: Password Authenticator
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
  1. Data Science with Python
  2. 2.7 Interpret and Present
  3. AP Computer Science Principles in Python
  4. 14.1 Present a Data-Driven Insight
  5. 15.1 The Impacts of Computing
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
  1. Data Science with Python
  2. 3.11 Data Storytelling Quiz
  3. AP Computer Science Principles in Python
  4. 14.1 Present a Data-Driven Insight
  5. 15.1 The Impacts of Computing
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts.
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability.
  1. Data Science with Python
  2. 3.11 Data Storytelling Quiz
  3. AP Computer Science Principles in Python
  4. 18.1 Intro to Design Thinking
  5. 18.2 Prototype
  6. 18.3 Test
  7. 18.4 Project Prep and Development
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products.
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
  1. Introduction to Python Programming
  2. 16.1 Software Engineer
  3. 16.2 QA Engineer
  4. 16.3 Designer
  5. 16.4 Project Manager
SC.912.CO.1.2
Identify and select the file format based on trade-offs.
SC.912.CO.1.4
Describe the relationship between drivers, hardware and operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 6.1 Internal Components
SC.912.CO.1.5
Describe the organization of a computer and its principal components.
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
  3. 6.3 Peripheral Devices
  4. 6.4 Storage Options
  5. 6.5 Network Devices
SC.912.CO.1.7
Describe the process of protecting computer hardware from exploitation.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 4.10 System Administration
  5. 8.5 Environmental Controls
SC.912.CO.1.8
Describe how the Internet facilitates global communication.
  1. Fundamentals of Cybersecurity
  2. 5.4 What is the Internet?
  3. 5.9 Impact of the Internet
  4. 6.7 Network Options
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
SC.912.CO.2.3
Discuss the central processing unit (CPU).
  1. Data Science with Python
  2. 4.6 Bias in Data Analytics
  3. Fundamentals of Cybersecurity
  4. 6.1 Internal Components
SC.912.CO.2.4
Explore the role of a power supply unit (PSU) in relation to a computer system.
SC.912.CO.2.7
Evaluate various forms of input and output (IO).
  1. Data Science with Python
  2. 1.7 Pandas DataFrames
  3. 1.9 Using Functions
  4. Fundamentals of Cybersecurity
  5. 6.3 Peripheral Devices
  6. Introduction to Python Programming
  7. 3.3 User Input
SC.912.CO.2.8
Evaluate the basic components of wired computer networks.
  1. AP Computer Science Principles in Python
  2. 11.1 Welcome to the Internet
  3. 11.2 Internet Hardware
  4. Fundamentals of Cybersecurity
  5. 6.5 Network Devices
SC.912.CO.2.9
Evaluate the basic components of wireless computer networks.
  1. AP Computer Science Principles in Python
  2. 11.8 Sequential, Parallel & Distributed Computing
  3. Fundamentals of Cybersecurity
  4. 6.5 Network Devices
SC.912.CO.2.11
Investigate the issues that impact network functionality.
  1. AP Computer Science Principles in Python
  2. 11.8 Sequential, Parallel & Distributed Computing
  3. 11.9 Cybersecurity
  4. Fundamentals of Cybersecurity
  5. 5.5 IP Addresses
  6. 5.7 How Do Websites Work?
  7. 5.8 OSI Model
SC.912.CO.2.16
Describe how devices are identified on a network.
  1. AP Computer Science Principles in Python
  2. 11.3 Internet Addresses
  3. 11.4 Viewing Websites
  4. Fundamentals of Cybersecurity
  5. 5.5 IP Addresses
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem.
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
SC.912.CS.1.1
Identify possible risks to maintaining data confidentiality.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
SC.912.CS.1.2
Describe computer security vulnerabilities.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 8.6 Checking for Vulnerabilities
SC.912.CS.1.3
Evaluate computer security vulnerabilities.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 8.6 Checking for Vulnerabilities
SC.912.CS.2.1
Analyze security and privacy issues that relate to computer networks and network connected devices.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 8.6 Checking for Vulnerabilities
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
SC.912.CS.3.4
Trace the social engineering attack cycle.
SC.912.ET.1.1
Describe the emerging features of mobile devices, smart devices and vehicles.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
SC.912.ET.1.2
Describe the physical and cognitive challenges faced by users when learning to use computer interfaces.
  1. Introduction to Python Programming
  2. 16.3 Designer
SC.912.ET.1.4
Examine device-to-device interactions that exclude human input.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
SC.912.ET.1.5
Explore the concepts of virtual and augmented reality.
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
  1. AP Computer Science Principles in Python
  2. 15.1 The Impacts of Computing
  3. Fundamentals of Cybersecurity
  4. 5.9 Impact of the Internet
SC.912.ET.2.1
Explore the history of Artificial Intelligence (AI).
  1. Introduction to AI for High School
  2. 1.1 Human & Artificial Intelligence
  3. 1.2 Generative vs. Predictive AI
  4. 1.5 Who Builds AI?
  5. 7.1 Introduction to Artificial Intelligence
SC.912.ET.2.5
Describe major applications of artificial intelligence (AI) and machine learning.
  1. Introduction to AI for High School
  2. 1.2 Generative vs. Predictive AI
  3. 1.3 Large Language Models
  4. 2.1 Intro to Machine Learning
  5. 7.1 Introduction to Artificial Intelligence
  6. 7.2 Artificial Intelligence and Machine Learning
  7. 7.3 Machine Learning and Neural Networks
SC.912.ET.2.6
Describe how predictive Artificial Intelligence (AI) can be used to solve problems.
  1. Introduction to AI for High School
  2. 1.2 Generative vs. Predictive AI
  3. 1.3 Large Language Models
  4. 7.1 Introduction to Artificial Intelligence
SC.912.ET.3.2
Examine how robotics are used to address human challenges.
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online.
  1. AP Computer Science Principles in Python
  2. 11.9 Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 1.2 Personal Data and Collection
  5. 1.5 Personal Data Security
SC.912.HS.1.2
Evaluate the consequences of cyberbullying.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.1.3
Determine the consequences of inaction when witnessing unsafe Internet practices.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
  4. 1.7 Common Cyber Attacks and Prevention
SC.912.HS.1.4
Examine the positive outcomes when someone reports suspicious behavior on the Internet.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. 1.7 Common Cyber Attacks and Prevention
SC.912.HS.1.6
Describe the impact of permissible privacy and security.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.2.1
Prioritize regulating screen time and the use of electronic devices for mental and physical well-being.
SC.912.HS.2.2
Investigate the correlation between sedentary behavior and digital device use.
SC.912.HS.2.3
Assess the role of digital health trackers in promoting healthy behaviors.
SC.912.HS.2.4
Analyze the relationship between eye strain related to use of technology and exposure to increased blue light.
SC.912.HS.3.1
Discuss the permanency of data on the Internet.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.PE.1.1
Write code segments.
  1. Data Science with Python
  2. 7.9 Logical Operators
  3. AP Computer Science Principles in Python
  4. 1.2 Introduction to Programming With Karel
  5. Introduction to Python Programming
  6. 2.1 Introduction to Programming With Karel
  7. 3.3 User Input
  8. 5.1 Booleans
  9. 5.2 If Statements
  10. 5.4 Logical Operators
SC.912.PE.1.2
Create iterative and non-iterative structures within a program.
  1. Data Science with Python
  2. 7.9 Logical Operators
  3. 7.11 For Loops
  4. AP Computer Science Principles in Python
  5. 1.10 For Loops
  6. Introduction to Python Programming
  7. 2.9 For Loops
  8. 5.2 If Statements
  9. 5.4 Logical Operators
  10. 7.1 While Loops
  11. 7.2 For Loops
SC.912.PE.1.3
Create selection structures within a program.
  1. Data Science with Python
  2. 7.9 Logical Operators
  3. AP Computer Science Principles in Python
  4. 1.11 If Statements
  5. Introduction to Python Programming
  6. 2.10 If Statements
  7. 5.2 If Statements
  8. 5.4 Logical Operators
SC.912.PE.1.10
Write programs that validate user input.
  1. Introduction to Python Programming
  2. 8.1 Project: Password Authenticator
SC.912.PE.1.12
Classify programming languages.
  1. Fundamentals of Cybersecurity
  2. 13.1 The Language of Computers
  3. Introduction to Python Programming
  4. 3.7 Programming Languages
SC.912.PE.1.13
Describe and identify types of programming errors.
  1. AP Computer Science Principles in Python
  2. 1.15 Debugging Strategies
  3. Introduction to Python Programming
  4. 2.14 Debugging Strategies
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used.
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 6.10 Network Communication
SC.912.PE.1.17
Examine the building blocks of algorithms.
  1. AP Computer Science Principles in Python
  2. 1.16 Algorithms
  3. Introduction to Python Programming
  4. 2.15 Algorithms
SC.912.PE.1.18
Develop a computer program.
  1. Introduction to Python Programming
  2. 6.1 Project: Quiz Game
  3. 8.1 Project: Password Authenticator
SC.912.PE.1.19
Review a computer program to verify program functionality, programming styles, program usability and adherence to common programming standards.
  1. Introduction to Python Programming
  2. 16.2 QA Engineer
SC.912.PE.1.20
Write programs that use standard logic operators.
  1. Data Science with Python
  2. 7.9 Logical Operators
  3. Introduction to Python Programming
  4. 5.4 Logical Operators
SC.912.PE.1.21
Use Boolean logic to perform logical operations.
  1. Introduction to Python Programming
  2. 5.1 Booleans
SC.912.PE.1.23
Compile, run, test and debug a digital artifact.
  1. Introduction to Python Programming
  2. 8.1 Project: Password Authenticator
SC.912.PE.2.3
Compare techniques for analyzing massive data collections.
  1. Data Science with Python
  2. 1.3 Exploring Data Using Python
  3. 1.4 Modules, Packages & Libraries
  4. 1.7 Pandas DataFrames
SC.912.PE.3.1
Evaluate arithmetic expressions using operator precedence.
  1. Data Science with Python
  2. 7.4 Mathematical Operators
  3. Introduction to Python Programming
  4. 3.4 Mathematical Operators
SC.912.PE.3.2
Decompose a problem by defining new code segments.
  1. Data Science with Python
  2. 7.12 Break and Continue
  3. AP Computer Science Principles in Python
  4. 1.6 Top Down Design and Decomposition in Karel
  5. Introduction to Python Programming
  6. 2.5 Top Down Design and Decomposition in Karel
  7. 7.3 Break and Continue
  8. 7.4 Nested Control Structures
  9. 8.1 Project: Password Authenticator
SC.912.PE.3.4
Evaluate algorithms by their efficiency, correctness and clarity.
  1. Data Science with Python
  2. 7.5 String Operators
  3. AP Computer Science Principles in Python
  4. 1.2 Introduction to Programming With Karel
  5. 1.3 More Basic Karel
  6. 1.6 Top Down Design and Decomposition in Karel
  7. 1.15 Debugging Strategies
  8. Introduction to Python Programming
  9. 2.1 Introduction to Programming With Karel
  10. 2.2 More Basic Karel
  11. 2.5 Top Down Design and Decomposition in Karel
  12. 2.14 Debugging Strategies
  13. 3.1 Printing in Python
  14. 3.2 Variables and Types
  15. 3.5 String Operators
  16. 5.1 Booleans
  17. 5.2 If Statements
SC.912.PE.3.11
Perform advanced searches to locate information and design a data-collection approach to gather original data.
  1. Data Science with Python
  2. 1.2 Gathering Data
  3. Fundamentals of Cybersecurity
  4. 1.3 Can All Information Be Trusted?
  5. Introduction to Python Programming
  6. 15.5 Writing to File
SC.912.PE.3.14
Analyze data by identifying patterns through modeling and simulation of real-world data.
  1. Data Science with Python
  2. 1.5 Series and Central Tendency
  3. 1.6 Measures of Spread
  4. Introduction to Python Programming
  5. 13.3 Packing and Unpacking
SC.912.PE.3.15
Test the accuracy of scientific hypotheses using computer models and simulations.
  1. Data Science with Python
  2. 1.5 Series and Central Tendency
  3. 1.10 Mini-Project: Findings
  4. 3.7 Trends and Correlations
SC.912.PE.3.16
Design a representation of a computer program.
  1. AP Computer Science Principles in Python
  2. 18.2 Prototype
  3. Introduction to Python Programming
  4. 16.1 Software Engineer
SC.912.PE.3.18
Explain the principles of cryptography.
  1. AP Computer Science Principles in Python
  2. 8.10 Cryptography
  3. Fundamentals of Cybersecurity
  4. 2.1 Cryptography: Then, Now, and Future
  5. 2.2 Symmetric Encryption
  6. 2.3 Asymmetric Encryption
SC.912.PE.4.5
Define user prompts for clarity and usability within a program.
  1. Introduction to Python Programming
  2. 3.3 User Input
SC.912.PE.4.6
Write a program that utilizes both input and output.
  1. AP Computer Science Principles in Python
  2. 3.8 Mouse Events: Mouse Clicked
  3. Introduction to Python Programming
  4. 3.3 User Input
SC.912.PE.4.7
Use internal documentation to collaboratively design a program according to accepted standards.
  1. AP Computer Science Principles in Python
  2. 1.7 Commenting Your Code
  3. 18.1 Intro to Design Thinking
  4. 18.2 Prototype
  5. 18.3 Test
  6. 18.4 Project Prep and Development
  7. Introduction to Python Programming
  8. 2.6 Commenting Your Code
SC.912.TI.1.1
Analyze historical trends in hardware and software.
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning.
  1. Fundamentals of Cybersecurity
  2. 16.2 Alternative Learning Opportunities
SC.912.TI.1.3
Analyze the impact of digital media.
  1. Data Science with Python
  2. 1.2 Gathering Data
  3. AP Computer Science Principles in Python
  4. 15.1 The Impacts of Computing
  5. Fundamentals of Cybersecurity
  6. 1.3 Can All Information Be Trusted?
  7. 5.9 Impact of the Internet
SC.912.TI.1.4
Analyze the impact of digital media on culture and persona.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
SC.912.TI.1.5
Describe the impact of computing on business and commerce.
  1. AP Computer Science Principles in Python
  2. 15.1 The Impacts of Computing
  3. Fundamentals of Cybersecurity
  4. 5.9 Impact of the Internet
SC.912.TI.1.6
Describe how technology impacts personal life.
  1. AP Computer Science Principles in Python
  2. 15.1 The Impacts of Computing
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 5.9 Impact of the Internet
SC.912.TI.1.7
Evaluate ways in which technology may improve accessibility for the varying needs of learners, including students with disabilities (SWD).
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
  3. Introduction to Python Programming
  4. 16.3 Designer
SC.912.TI.1.8
Explain how economic and societal factors are affected by access to critical information.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
SC.912.TI.1.10
Analyze technology-related career paths.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
  4. Introduction to Python Programming
  5. 16.1 Software Engineer
  6. 16.2 QA Engineer
  7. 16.3 Designer
  8. 16.4 Project Manager
SC.912.TI.1.12
Examine the history of networking devices.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
SC.912.TI.1.13
Examine the historical impact of social media.
SC.912.TI.2.1
Research how social media and technology can be used to distort, exaggerate or misrepresent information.
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
SC.912.TI.2.4
Explore the legal ramifications of technology use.
  1. AP Computer Science Principles in Python
  2. 11.11 Creative Credit & Copyright
  3. Fundamentals of Cybersecurity
  4. 1.4 Cyber Ethics and Laws
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices.
  1. AP Computer Science Principles in Python
  2. 11.11 Creative Credit & Copyright
  3. Fundamentals of Cybersecurity
  4. 1.4 Cyber Ethics and Laws
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects.
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property.
  1. AP Computer Science Principles in Python
  2. 11.11 Creative Credit & Copyright
  3. Fundamentals of Cybersecurity
  4. 4.7 Software Licenses
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information.
  1. AP Computer Science Principles in Python
  2. 11.11 Creative Credit & Copyright
  3. Fundamentals of Cybersecurity
  4. 1.4 Cyber Ethics and Laws
SC.912.TI.2.11
Utilize citation tools when using digital information.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
  1. Introduction to Python Programming
  2. 6.1 Project: Quiz Game
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
  1. AP Computer Science Principles in Python
  2. 1.6 Top Down Design and Decomposition in Karel
  3. Introduction to Python Programming
  4. 2.5 Top Down Design and Decomposition in Karel
SC.K12.CTR.3.1
Complete tasks with digital fluency.
  1. AP Computer Science Principles in Python
  2. 18.1 Intro to Design Thinking
  3. 18.2 Prototype
  4. 18.3 Test
  5. 18.4 Project Prep and Development
  6. Introduction to Python Programming
  7. 3.3 User Input
SC.K12.CTR.4.1
Express solutions as computational steps.
  1. AP Computer Science Principles in Python
  2. 1.16 Algorithms
  3. 18.1 Intro to Design Thinking
  4. 18.2 Prototype
  5. 18.3 Test
  6. 18.4 Project Prep and Development
  7. Introduction to Python Programming
  8. 2.15 Algorithms
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
  1. AP Computer Science Principles in Python
  2. 18.4 Project Prep and Development
  3. Introduction to Python Programming
  4. 8.1 Project: Password Authenticator
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
  1. Data Science with Python
  2. 2.3 Importing and Filtering Data
  3. AP Computer Science Principles in Python
  4. 14.1 Present a Data-Driven Insight
  5. Introduction to Python Programming
  6. 13.3 Packing and Unpacking
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
  1. Data Science with Python
  2. 2.1 Data Science for Change
  3. Introduction to Python Programming
  4. 8.1 Project: Password Authenticator
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
  1. Introduction to Python Programming
  2. 6.1 Project: Quiz Game
  3. 8.1 Project: Password Authenticator
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
  1. Data Science with Python
  2. 1.1 What is Data Science?
  3. 1.7 Pandas DataFrames
  4. 1.10 Mini-Project: Findings
  5. AP Computer Science Principles in Python
  6. 14.1 Present a Data-Driven Insight
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
  1. Data Science with Python
  2. 7.4 Mathematical Operators
  3. Fundamentals of Cybersecurity
  4. 5.2 Bits, Text, and Numbers
  5. Introduction to Python Programming
  6. 3.3 User Input
  7. 3.4 Mathematical Operators
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
  1. Data Science with Python
  2. 7.5 String Operators
  3. AP Computer Science Principles in Python
  4. 1.2 Introduction to Programming With Karel
  5. 1.3 More Basic Karel
  6. 1.6 Top Down Design and Decomposition in Karel
  7. 1.15 Debugging Strategies
  8. Introduction to Python Programming
  9. 2.1 Introduction to Programming With Karel
  10. 2.2 More Basic Karel
  11. 2.5 Top Down Design and Decomposition in Karel
  12. 2.14 Debugging Strategies
  13. 3.1 Printing in Python
  14. 3.2 Variables and Types
  15. 3.5 String Operators
  16. 5.1 Booleans
  17. 5.2 If Statements
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
  1. Data Science with Python
  2. 1.5 Series and Central Tendency
  3. 1.6 Measures of Spread
  4. 1.7 Pandas DataFrames
  5. 3.5 Normal Distribution
  6. AP Computer Science Principles in Python
  7. 1.6 Top Down Design and Decomposition in Karel
  8. Introduction to Python Programming
  9. 2.5 Top Down Design and Decomposition in Karel
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
  1. Data Science with Python
  2. 1.5 Series and Central Tendency
  3. 1.10 Mini-Project: Findings
  4. Introduction to Python Programming
  5. 8.1 Project: Password Authenticator
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. Data Science with Python
  2. 1.5 Series and Central Tendency
  3. 1.6 Measures of Spread
  4. 2.1 Data Science for Change
  5. 7.4 Mathematical Operators
  6. Fundamentals of Cybersecurity
  7. 5.2 Bits, Text, and Numbers
  8. Introduction to Python Programming
  9. 3.4 Mathematical Operators
  10. 8.1 Project: Password Authenticator
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
  1. Data Science with Python
  2. 1.2 Gathering Data
  3. 1.9 Using Functions
  4. 1.10 Mini-Project: Findings
  5. 2.7 Interpret and Present
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
  1. Introduction to AI for High School
  2. 1.3 Large Language Models
  3. Introduction to Python Programming
  4. 3.7 Programming Languages
  5. 16.2 QA Engineer
ELA.K12.EE.3.1
Make inferences to support comprehension.
  1. Data Science with Python
  2. 1.1 What is Data Science?
  3. 1.2 Gathering Data
  4. 1.9 Using Functions
  5. 1.10 Mini-Project: Findings
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
  1. Data Science with Python
  2. 3.11 Data Storytelling Quiz
  3. Introduction to Python Programming
  4. 6.1 Project: Quiz Game
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
  1. Data Science with Python
  2. 1.10 Mini-Project: Findings
  3. Introduction to Python Programming
  4. 8.1 Project: Password Authenticator
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
  1. Introduction to Python Programming
  2. 6.1 Project: Quiz Game
  3. 8.1 Project: Password Authenticator
ELD.K12.ELL.SI.1
English language learners communicate for social and instructional purposes within the school setting.
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 13.1 The Language of Computers
  4. Introduction to Python Programming
  5. 6.1 Project: Quiz Game