Please enable JavaScript to use CodeHS

Standards Mapping

for Georgia Assessments for the Certification of Educators

53

Standards in this Framework

53

Standards Mapped

100%

Mapped to Course

Standard Lessons
I.1.A
Understands computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers
  1. 3.1 History of Computers
I.1.B
Knows the obstacles to equal access to computing among different groups and the impact of those obstacles
  1. 3.6 Ethical and Social Implications of Computing
I.1.C
Understands beneficial and harmful effects of computing innovations and the trade-offs between them
  1. 3.6 Ethical and Social Implications of Computing
I.2.A
Knows different methods of protecting intellectual property rights and the tradeoffs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)
  1. 6.9 Creative Credit & Copyright
I.2.B
Understands ethical and unethical computing practices and their social, economic, and cultural implications
  1. 3.6 Ethical and Social Implications of Computing
I.2.C
Knows privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world
  1. 7.4 Privacy and Security
II.1.A
Understands abstraction as a foundation of computer science
  1. 13.5 User Input
  2. 14.4 String Methods
  3. 15.3 Using a Class as a Client
II.1.B
Knows how to use pattern recognition, problem decomposition, and abstraction to develop an algorithm
  1. 17.1 What is an Algorithm?
II.1.C
Understands number base conversion and binary, decimal, and hexadecimal number systems
  1. 4.3 Number Systems
  2. 4.4 Encoding Text with Binary
  3. 4.6 Hexadecimal
II.1.D
Understands how to develop and analyze algorithms expressed in multiple formats (e.g., natural language, flowcharts, pseudocode)
  1. 13.2 Organizational Techniques
II.2.A
Is familiar with the limitations of computing in terms of time, space, and solvability as well as with the use of heuristic solutions that can address these limitations
  1. 3.5 Future of Computing
  2. 4.11 Cryptography
II.2.B
Understands searching and sorting algorithms; can analyze sorting algorithms for correctness and can analyze searching algorithms for correctness and efficiency
  1. 17.4 Selection Sort
  2. 17.5 Insertion Sort
  3. 17.7 Mergesort
II.2.C
Understands simple recursive algorithms (e.g., n factorial, sum of first n integers)
  1. 17.6 Recursion
II.2.D
Is familiar with the use of randomization in computing
  1. 17.9 Random and Pseudorandom Numbers
III.1.A
Understands how to write and modify computer programs in a text-based programming language
  1. 2.1 Introduction to Programming With Karel
III.1.B
Understands how to analyze computer programs in terms of correctness
  1. 12.1 Basic Debugging in Java
  2. 12.3 Debugging Techniques
  3. 12.4 Common Java Errors
III.1.C
Knows the concepts of extensibility, modifiability, and reusability
  1. 14.1 Java Methods
  2. 15.4 Writing Classes
  3. 15.5 Writing Classes and Instance Methods
  4. 15.11 Inheritance
III.1.D
Understands the three basic constructs used in programming: sequence, selection, and iteration
  1. 13.11 Comparison Operators
  2. 13.12 If Statements
  3. 13.13 For Loops
  4. 13.16 Loop-and-a-Half
III.1.E
Understands how to use standard operators (i.e., assignment, arithmetic, relational, logical) and operator precedence to write programs
  1. 13.4 Variables and Types
  2. 13.10 Logical Operators
  3. 13.12 If Statements
III.1.F
Understands how to use variables and a variety of data types
  1. 13.4 Variables and Types
III.2.A
Understands how to write and call procedures with parameters and return values
  1. 14.1 Java Methods
  2. 14.3 Methods and Return Values
III.2.B
Knows the concepts of event-driven programs that respond to external events (e.g., sensors, messages, clicks)
  1. 13.5 User Input
III.2.C
Is familiar with usability and user experience (e.g., ease of use and accessibility)
  1. 10.1 Intro to Design Thinking
III.2.D
Is familiar with dictionaries/maps, stacks, and queues
  1. 16.6 HashMaps, Stacks, and Queues
III.2.E
Understands how to use debugging techniques and appropriate test cases
  1. 12.1 Basic Debugging in Java
  2. 12.3 Debugging Techniques
III.2.F
Is familiar with characteristics of well-documented computer programs that are usable, readable, and modular
  1. 13.2 Organizational Techniques
III.2.G
Is familiar with techniques to obtain and use feedback to produce high-quality code (e.g., code reviews, peer feedback, end user feedback)
  1. 11.1 Collaboration in Computer Science
III.2.H
Knows how to use libraries and APIs
  1. 15.3 Using a Class as a Client
III.2.I
Understands programming techniques to validate correct input and detect incorrect input
  1. 14.5 Exceptions
III.2.J
Is familiar with the features and capabilities of integrated development environments (IDEs)
  1. 12.6 Java Outside of CodeHS
III.2.K
Is familiar with the differences between low- and high-level programming languages
  1. 13.1 Programming Languages
III.2.L
Is familiar with different programming paradigms
  1. 13.1 Programming Languages
III.2.M
Knows object-oriented programming concepts
  1. 15.1 Intro to Classes and Objects
  2. 15.2 Classes vs. Objects
III.2.N
Is familiar with program compilation and program interpretation
  1. 13.1 Programming Languages
IV.1.A
Understands bits as the universal medium for expressing digital information
  1. 4.2 Intro to Digital Information
IV.1.B
Is familiar with concepts of data encryption and decryption
  1. 4.11 Cryptography
IV.1.C
Knows how to use computational tools, including spreadsheets, to analyze data in order to discover, explain, and visualize patterns, connections, and trends
  1. 5.3 Using Spreadsheets with Data
IV.2.A
Is familiar with the use of computing in simulation and modeling
  1. 5.5 Simulation
IV.2.B
Is familiar with methods to store, manage, and manipulate data
  1. 5.4 Data Collection & Limitations
IV.2.C
Is familiar with a variety of computational methods for data collection, aggregation, and generation
  1. 5.1 Getting Started with Data
V.1.A
Knows that operating systems are programs that control and coordinate interactions between hardware and software components
  1. 3.4 Hardware
V.1.B
Is familiar with computing systems embedded in everyday objects (e.g., Internet of Things [IoT], ATMs, medical devices)
  1. 3.5 Future of Computing
  2. 6.1 Welcome to the Internet
V.1.C
Knows the capabilities, features, and uses of different types of computing systems (e.g., desktop, mobile, cluster)
  1. 3.2 Computer Organization
  2. 8.2 Operating Systems Software
V.1.D
Is familiar with computers as layers of abstraction from hardware (e.g., logic gates, chips) to software (e.g., system software, applications)
  1. 3.4 Hardware
V.1.E
Is familiar with the steps required to execute a computer program (fetch-decodeexecute cycles)
  1. 3.4 Hardware
V.1.F
Is familiar with trade-offs between local, network, and cloud computing and storage
  1. 3.2 Computer Organization
V.1.G
Is familiar with communication between devices
  1. 6.2 Internet Hardware
  2. 9.7 Network Communication
V.2.A
Knows components of networks
  1. 9.6 Network Options
  2. 9.7 Network Communication
V.2.B
Is familiar with factors that have an impact on network functionality
  1. 6.2 Internet Hardware
  2. 9.7 Network Communication
V.2.C
Is familiar with how Internet and Web protocols work
  1. 6.6 Packets and Protocols
V.2.D
Is familiar with digital and physical strategies for maintaining security
  1. 6.7 Cybersecurity
  2. 7.4 Privacy and Security
  3. 7.7 Common Security Problems
  4. 7.8 Environmental Controls
  5. 7.9 Digital Certificates
V.2.E
Is familiar with concepts of cybersecurity
  1. 6.7 Cybersecurity
V.2.F
Is familiar with the components that make up the Web (e.g., HTTP, HTML, browsers, servers, clients)
  1. 6.7 Cybersecurity
  2. 7.4 Privacy and Security
  3. 7.7 Common Security Problems
  4. 7.8 Environmental Controls
  5. 7.9 Digital Certificates