Please enable JavaScript to use CodeHS

Standards Mapping

for Florida Computer Programming Fundamentals Honors

138

Standards in this Framework

123

Standards Mapped

89%

Mapped to Course

Standard Lessons
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration.
  1. 12.1 Engineering Design Process
SC.912.CC.1.2
Utilize tools within a project environment to communicate.
  1. 12.1 Engineering Design Process
SC.912.CC.1.3
Present information and data using presentation software.
  1. 7.1 Project: Password Authenticator
  2. 10.10 Mini-Project: Findings
  3. 12.7 Showcase Your Creation!
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
  5. 12.7 Showcase Your Creation!
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts.
  1. 12.7 Showcase Your Creation!
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability.
  1. 4.7 Errors and Debugging
  2. 9.3 Designer
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products.
  1. 12.7 Showcase Your Creation!
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
  1. 9.1 Software Engineer
  2. 9.2 QA Engineer
  3. 9.3 Designer
  4. 9.4 Project Manager
SC.912.CO.1.2
Identify and select the file format based on trade-offs.
  1. 3.8 Compatibility
SC.912.CO.1.3
Select and use the correct file type for specific tasks.
  1. 3.8 Compatibility
SC.912.CO.1.5
Describe the organization of a computer and its principal components.
  1. 3.1 Internal Components
  2. 3.3 Peripheral Devices
  3. 3.4 Storage Options
  4. 3.5 Network Devices
SC.912.CO.1.8
Describe how the Internet facilitates global communication.
  1. 2.1 What is the Internet?
  2. 2.5 Emerging Technologies and Society
  3. 3.6 Network Options
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
  1. 1.4 Can All Information Be Trusted?
SC.912.CO.2.3
Discuss the central processing unit (CPU).
  1. 3.1 Internal Components
SC.912.CO.2.7
Evaluate various forms of input and output (IO).
  1. 3.3 Peripheral Devices
  2. 4.5 User Input
  3. 10.7 Pandas DataFrames
  4. 10.9 Using Functions
SC.912.CO.2.10
Explore the components of a data packet.
  1. 2.3 Routing and Packets
SC.912.CO.2.11
Investigate the issues that impact network functionality.
  1. 2.2 IP Addresses
  2. 2.4 How Do Websites Work?
  3. 3.2 Sequential, Parallel & Distributed Computing
SC.912.CO.2.16
Describe how devices are identified on a network.
  1. 2.2 IP Addresses
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem.
  1. 12.1 Engineering Design Process
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software.
  1. 3.7 Hardware and Software
SC.912.CO.3.4
Explain how automated software testing can reduce the cost of the testing effort.
  1. 12.6 Test
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
  1. 1.6 Personal Data Security
  2. 1.7 Cybersecurity Essentials
SC.912.CS.3.3
Analyze the limitations of a program’s temporary storage and the security vulnerabilities.
  1. 1.10 Dev Tools Capture the Flag
SC.912.CS.3.4
Trace the social engineering attack cycle.
  1. 1.8 Common Cyber Attacks and Prevention
SC.912.DC.1.2
Analyze the effects of digital currencies on the current financial market.
  1. 2.6 Digital Currencies
SC.912.DC.2.1
Differentiate between a digital currency and a security.
  1. 2.6 Digital Currencies
SC.912.DC.2.2
Discuss the risks associated with digital currencies.
  1. 2.6 Digital Currencies
SC.912.DC.2.3
Compare decentralized currencies to centralized currencies.
  1. 2.6 Digital Currencies
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
  1. 2.5 Emerging Technologies and Society
SC.912.ET.2.1
Explore the history of Artificial Intelligence (AI).
  1. 11.1 Human & Artificial Intelligence
  2. 11.3 Generative vs. Predictive AI
  3. 11.6 Who Builds AI?
SC.912.ET.2.2
Describe the major branches of Artificial Intelligence (AI).
  1. 11.2 Branches of Artificial Intelligence
  2. 11.3 Generative vs. Predictive AI
  3. 11.7 Intro to Machine Learning
SC.912.ET.2.3
Evaluate the application of algorithms to Artificial Intelligence (AI).
  1. 11.11 Algorithms in AI
SC.912.ET.2.4
Evaluate the Artificial Intelligence (AI) of computers to model human behaviors.
  1. 11.1 Human & Artificial Intelligence
SC.912.ET.2.5
Describe major applications of artificial intelligence (AI) and machine learning.
  1. 11.3 Generative vs. Predictive AI
  2. 11.4 Large Language Models
  3. 11.7 Intro to Machine Learning
SC.912.ET.2.6
Describe how predictive Artificial Intelligence (AI) can be used to solve problems.
  1. 11.3 Generative vs. Predictive AI
  2. 11.4 Large Language Models
SC.912.ET.3.2
Examine how robotics are used to address human challenges.
  1. 2.5 Emerging Technologies and Society
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Social Media Impacts
  3. 1.3 Personal Data and Collection
  4. 1.6 Personal Data Security
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.6 Personal Data Security
  3. 1.8 Common Cyber Attacks and Prevention
SC.912.HS.1.6
Describe the impact of permissible privacy and security.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.6 Personal Data Security
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.1
Discuss the permanency of data on the Internet.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Social Media Impacts
SC.912.PE.1.1
Write code segments.
  1. 4.4 Variables and Types
  2. 4.5 User Input
  3. 5.1 Booleans
  4. 5.2 If Statements
  5. 5.4 Logical Operators
  6. 5.5 Floating Point Numbers and Rounding
  7. 6.1 While Loops
  8. 7.1 Project: Password Authenticator
  9. 8.1 Functions
SC.912.PE.1.2
Create iterative and non-iterative structures within a program.
  1. 5.2 If Statements
  2. 5.4 Logical Operators
  3. 6.1 While Loops
  4. 6.2 For Loops
  5. 6.3 Break and Continue
  6. 6.4 Nested Control Structures
SC.912.PE.1.3
Create selection structures within a program.
  1. 5.2 If Statements
  2. 5.4 Logical Operators
  3. 10.8 Selecting Columns
SC.912.PE.1.4
Write a void function that does not return a value.
  1. 8.1 Functions
SC.912.PE.1.5
Write a non-void function that will return a value.
  1. 8.4 Functions and Return Values
SC.912.PE.1.6
Create a nested array to aggregate data.
  1. 10.3 Exploring Data Using Python
SC.912.PE.1.7
Define multiple variables to the same value while utilizing aliasing.
SC.912.PE.1.8
Define a class to store data attributes.
SC.912.PE.1.9
Create methods that a class can inherit.
SC.912.PE.1.10
Write programs that validate user input.
  1. 7.1 Project: Password Authenticator
SC.912.PE.1.11
Compare the differences in execution of interpreted and compiled languages.
SC.912.PE.1.12
Classify programming languages.
  1. 4.1 The Language of Computers
SC.912.PE.1.13
Describe and identify types of programming errors.
  1. 4.7 Errors and Debugging
SC.912.PE.1.14
Design and implement variables in a program using global and local scope
  1. 8.3 Namespaces in Functions
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used.
  1. 3.10 Command Line Interface
  2. 3.11 Network Communication
SC.912.PE.1.16
Explain the distinction between a programming language’s standard library and the Application Programming Interface (API).
  1. 10.4 Modules, Packages & Libraries
SC.912.PE.1.17
Examine the building blocks of algorithms.
  1. 4.2 How to Think Like a Programmer
SC.912.PE.1.18
Develop a computer program.
  1. 7.1 Project: Password Authenticator
  2. 12.3 Define
SC.912.PE.1.19
Review a computer program to verify program functionality, programming styles, program usability and adherence to common programming standards.
  1. 4.7 Errors and Debugging
  2. 9.2 QA Engineer
  3. 12.6 Test
SC.912.PE.1.20
Write programs that use standard logic operators.
  1. 5.4 Logical Operators
SC.912.PE.1.21
Use Boolean logic to perform logical operations.
  1. 5.4 Logical Operators
SC.912.PE.1.22
Explain structures and their uses within a program.
SC.912.PE.1.23
Compile, run, test and debug a digital artifact.
  1. 4.7 Errors and Debugging
  2. 7.1 Project: Password Authenticator
SC.912.PE.2.1
Create a matrix from connected lists.
SC.912.PE.2.2
Evaluate the purpose of sublist indexing.
SC.912.PE.2.3
Compare techniques for analyzing massive data collections.
  1. 10.3 Exploring Data Using Python
  2. 10.4 Modules, Packages & Libraries
  3. 10.7 Pandas DataFrames
SC.912.PE.3.1
Evaluate arithmetic expressions using operator precedence.
  1. 4.6 Mathematical Operators
SC.912.PE.3.2
Decompose a problem by defining new code segments.
  1. 4.2 How to Think Like a Programmer
  2. 6.3 Break and Continue
  3. 6.4 Nested Control Structures
  4. 7.1 Project: Password Authenticator
SC.912.PE.3.3
Design and implement a simple simulation that is representative of a natural phenomenon.
  1. 8.6 Simulation
SC.912.PE.3.4
Evaluate algorithms by their efficiency, correctness and clarity.
  1. 4.3 Printing in Python
  2. 4.4 Variables and Types
  3. 4.8 String Operators
  4. 5.1 Booleans
  5. 5.2 If Statements
  6. 12.6 Test
SC.912.PE.3.5
Differentiate automated testing platforms and their uses.
  1. 12.6 Test
SC.912.PE.3.6
Explain the different types of testing that can be performed in a complex software system.
SC.912.PE.3.7
Introduce complex problems and understand that these problems may be computationally unsolvable.
SC.912.PE.3.8
Describe the concept of parallel processing as a strategy to solve large problems.
  1. 3.2 Sequential, Parallel & Distributed Computing
SC.912.PE.3.10
Simplify a complex problem by using abstraction to manage complexity using functions and parameters, classes and methods.
SC.912.PE.3.11
Perform advanced searches to locate information and design a data-collection approach to gather original data.
  1. 1.4 Can All Information Be Trusted?
  2. 10.2 Gathering Data
SC.912.PE.3.12
Explain how data analysis is used to enhance the understanding of complex natural and human systems.
SC.912.PE.3.13
Create a computational model that utilizes data to analyze and enhance the understanding of complex natural and human systems.
SC.912.PE.3.14
Analyze data by identifying patterns through modeling and simulation of real-world data.
  1. 10.5 Series and Central Tendency
  2. 10.6 Measures of Spread
  3. 12.2 Research and Analyze
SC.912.PE.3.15
Test the accuracy of scientific hypotheses using computer models and simulations.
  1. 10.5 Series and Central Tendency
  2. 10.10 Mini-Project: Findings
SC.912.PE.3.16
Design a representation of a computer program.
  1. 9.1 Software Engineer
  2. 12.1 Engineering Design Process
  3. 12.4 Ideate
  4. 12.5 Prototype
  5. 12.6 Test
  6. 12.7 Showcase Your Creation!
SC.912.PE.3.17
Summarize the differences between an array and an array list.
SC.912.PE.3.18
Explain the principles of cryptography.
  1. 1.13 Cryptography
SC.912.PE.3.19
Determine which encryption method is suitable for an intended task.
  1. 1.13 Cryptography
  2. 1.14 Asymmetric Encryption
SC.912.PE.4.1
Explore software development cycles that can be used to solve problems at different software development stages.
  1. 9.1 Software Engineer
  2. 10.1 What is Data Science?
SC.912.PE.4.2
Develop a software artifact according to a common software development methodology.
  1. 10.10 Mini-Project: Findings
  2. 12.3 Define
SC.912.PE.4.3
Identify the tools required to develop a program.
  1. 9.1 Software Engineer
  2. 10.3 Exploring Data Using Python
SC.912.PE.4.4
Identify the software environment required to create a program within a specific language.
  1. 10.3 Exploring Data Using Python
SC.912.PE.4.5
Define user prompts for clarity and usability within a program.
  1. 4.5 User Input
SC.912.PE.4.6
Write a program that utilizes both input and output.
  1. 4.5 User Input
SC.912.PE.4.7
Use internal documentation to collaboratively design a program according to accepted standards.
  1. 12.1 Engineering Design Process
  2. 12.2 Research and Analyze
  3. 12.3 Define
  4. 12.4 Ideate
  5. 12.5 Prototype
  6. 12.6 Test
SC.912.PE.4.8
Create mobile computing applications and/or dynamic web pages using a variety of design and development tools, programming languages and mobile devices/emulators.
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.3
Analyze the impact of digital media.
  1. 1.4 Can All Information Be Trusted?
  2. 2.5 Emerging Technologies and Society
  3. 10.2 Gathering Data
SC.912.TI.1.4
Analyze the impact of digital media on culture and persona.
  1. 1.2 Social Media Impacts
  2. 2.5 Emerging Technologies and Society
SC.912.TI.1.5
Describe the impact of computing on business and commerce.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.6
Describe how technology impacts personal life.
  1. 1.7 Cybersecurity Essentials
  2. 2.5 Emerging Technologies and Society
SC.912.TI.1.7
Evaluate ways in which technology may improve accessibility for the varying needs of learners, including students with disabilities (SWD).
  1. 2.5 Emerging Technologies and Society
  2. 9.3 Designer
  3. 12.2 Research and Analyze
SC.912.TI.1.8
Explain how economic and societal factors are affected by access to critical information.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.11
Evaluate the benefits of technology regarding environmental concerns.
SC.912.TI.1.12
Examine the history of networking devices.
  1. 3.5 Network Devices
SC.912.TI.1.13
Examine the historical impact of social media.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Social Media Impacts
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
  1. 1.4 Can All Information Be Trusted?
  2. 1.5 Cyber Ethics and Laws
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.4
Explore the legal ramifications of technology use.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
  1. 3.9 Software Licenses
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property.
  1. 3.9 Software Licenses
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.11
Utilize citation tools when using digital information.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.12
Describe legal regulations that govern Internet usage and interaction.
  1. 1.5 Cyber Ethics and Laws
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
  5. 12.7 Showcase Your Creation!
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
  1. 4.2 How to Think Like a Programmer
  2. 12.3 Define
SC.K12.CTR.3.1
Complete tasks with digital fluency.
  1. 4.4 Variables and Types
  2. 4.5 User Input
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
SC.K12.CTR.4.1
Express solutions as computational steps.
  1. 4.6 Mathematical Operators
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
  1. 4.6 Mathematical Operators
  2. 5.2 If Statements
  3. 7.1 Project: Password Authenticator
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
  1. 12.2 Research and Analyze
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
  1. 7.1 Project: Password Authenticator
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
  1. 7.1 Project: Password Authenticator
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
  1. 10.1 What is Data Science?
  2. 10.7 Pandas DataFrames
  3. 10.10 Mini-Project: Findings
  4. 12.2 Research and Analyze
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
  1. 4.5 User Input
  2. 4.6 Mathematical Operators
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
  1. 4.3 Printing in Python
  2. 4.4 Variables and Types
  3. 4.7 Errors and Debugging
  4. 4.8 String Operators
  5. 5.1 Booleans
  6. 5.2 If Statements
  7. 12.1 Engineering Design Process
  8. 12.2 Research and Analyze
  9. 12.3 Define
  10. 12.4 Ideate
  11. 12.5 Prototype
  12. 12.6 Test
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
  1. 10.5 Series and Central Tendency
  2. 10.6 Measures of Spread
  3. 10.7 Pandas DataFrames
  4. 12.2 Research and Analyze
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
  1. 7.1 Project: Password Authenticator
  2. 10.5 Series and Central Tendency
  3. 10.10 Mini-Project: Findings
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. 4.6 Mathematical Operators
  2. 7.1 Project: Password Authenticator
  3. 10.5 Series and Central Tendency
  4. 10.6 Measures of Spread
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
  1. 10.2 Gathering Data
  2. 10.9 Using Functions
  3. 10.10 Mini-Project: Findings
  4. 12.2 Research and Analyze
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
  1. 9.1 Software Engineer
  2. 9.2 QA Engineer
  3. 9.3 Designer
  4. 9.4 Project Manager
  5. 11.4 Large Language Models
ELA.K12.EE.3.1
Make inferences to support comprehension.
  1. 10.1 What is Data Science?
  2. 10.2 Gathering Data
  3. 10.9 Using Functions
  4. 10.10 Mini-Project: Findings
  5. 12.2 Research and Analyze
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
  1. 12.1 Engineering Design Process
  2. 12.2 Research and Analyze
  3. 12.3 Define
  4. 12.4 Ideate
  5. 12.5 Prototype
  6. 12.6 Test
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
  1. 7.1 Project: Password Authenticator
  2. 10.10 Mini-Project: Findings
  3. 12.1 Engineering Design Process
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
  1. 7.1 Project: Password Authenticator
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
ELD.K12.ELL.SI.1
English language learners communicate for social and instructional purposes within the school setting.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Personal Data and Collection
  3. 4.1 The Language of Computers
  4. 4.2 How to Think Like a Programmer
  5. 12.3 Define