Please enable JavaScript to use CodeHS

Standards Mapping

for Idaho 9-10

44

Standards in this Framework

20

Standards Mapped

45%

Mapped to Course

Standard Lessons
9-10.AP.01
Design and develop a software artifact by leading, initiating, and participating in a team (e.g. pair programming, agile software development).
9-10.AP.02
Demonstrate how diverse collaboration, both inside and outside of a team, impacts the design and development of software products (e.g. students show their own artifacts and demonstrate and reflect how diverse collaboration made a product better).
9-10.AP.03
Compare a variety of programming languages available to solve problems and develop systems.
  1. 4.1 Programming Concepts
9-10.AP.04
Explore security issues that might lead to compromised computer programs (e.g. ambiguous function calls, lack of error checking of the input, buffer overflow, SQL injection attacks, denial of service attacks).
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
9-10.AP.05
Classify and define the different types of software licenses in order to understand how to apply each one to a specific software example.
  1. 7.5 Software Licenses
9-10.AP.06
Understand the notion of hierarchy and abstraction in high-level languages, translation, instruction sets, and logic circuits.
9-10.AP.07
Explore issues surrounding mobile computing by creating a mobile computing application (e.g. App Inventor).
9-10.AP.08
Create software solutions by applying analysis, design, implementation and testing techniques.
9-10.AP.09
Demonstrate code reuse by creating programming solutions using APIs and libraries (e.g. using text to speech in App Inventor, using Twitter API).
9-10.AP.10
Illustrate the flow of execution and output of a given program (e.g. flow and control diagrams).
  1. 4.6 Organizational Techniques
9-10.AP.11
Illustrate how mathematical and statistical functions, sets, and logic are used in computation.
9-10.AP.12
Design algorithms using sequence, selection, iteration and recursion.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
  8. 22.10 Loop and a Half
  9. 23.1 Control Structures Challenges
9-10.AP.13
Explain, represent, and understand natural phenomena using modeling and simulation
9-10.AP.14
Describe the concept of parallel processing as a strategy to solve large problems.
9-10.AP.15
Compare and evaluate software development processes used to solve problems (e.g. waterfall, agile).
9-10.AP.16
Decompose a complex problem into simpler parts using predefined functions and parameters, classes, and methods.
9-10.AP.17
Demonstrate the value of abstraction to manage problem complexity.
9-10.AP.18
Evaluate and improve program quality using various debugging and testing methods and examine the difference between verification and validation.
9-10.AP.19
Evaluate programs written by others for readability and usability.
9-10.CS.01
Identify and evaluate what computing resources are required for a given purpose (e.g. system requirements needed to run a program, hardware, and software needed to run game X).
  1. 7.4 Software and Applications
  2. 10.1 Internal Components
  3. 10.2 Peripheral Devices
9-10.CS.02
Explore the unique features of embedded computers in areas such as mobile devices, sensors, and vehicles.
  1. 1.2 What is Cybersecurity?
9-10.CS.03
Create or modify a program that uses different forms of input and output. (e.g. use voice input instead of text input, use text-to-speech for output)
9-10.CS.04
Demonstrate the multiple levels of abstraction that support program execution including programming languages, translations, and low-level systems including the fetch-execute cycle (e.g. model, dance, create a play/presentation).
9-10.DA.01
Illustrate how various types of data are stored in a computer system (e.g. how sound and images are stored).
  1. 10.4 Storage Options
9-10.DA.02
Differentiate between information access and distribution rights (e.g. write, discuss).
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
9-10.DA.03
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, the government (e.g. persuasive essay, presentation, or debate).
  1. 1.2 What is Cybersecurity?
  2. 2.4 Privacy & Security
  3. 3.1 Project: Public Service Announcement
9-10.DA.04
Explain the principles of security by examining encryption, cryptography, and authentication techniques.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 6.1 Project: Classic Cipher Newscast
9-10.DA.05
Apply basic techniques for locating, collecting, and understanding the quality of small and large-scale data sets (e.g. public data sets).
9-10.DA.06
Convert between binary, decimal, octal, and hexadecimal representations of data.
  1. 9.2 Notational Systems
  2. 9.3 Data Representation
9-10.DA.07
Analyze the representation and trade-offs among various forms of digital information (e.g. lossy versus lossless compression).
9-10.DA.08
Analyze data and identify patterns through modeling and simulation.
9-10.IC.01
Explain the social and economic implications associated with unethical computing practices (e.g. software piracy, intrusion, malware, current corporate fraud examples).
  1. 2.4 Privacy & Security
  2. 2.7 Hacking Ethics
  3. 8.9 Common Security Problems
9-10.IC.02
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large scale analysis of information about individuals (e.g. social media, online shopping, how grocery/dept stores collect and use personal data).
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
  3. 8.9 Common Security Problems
9-10.IC.03
Understand and explain the impact of artificial intelligence and robotics.
9-10.IC.04
Describe how computer science shares features with creating and designing an artifact such as in music and art.
9-10.IC.05
Demonstrate how computing enhances traditional forms and enables new forms of experience, expression, communication, and collaboration (e.g. virtual reality).
9-10.IC.06
Explain the impact of the digital divide on access to critical information (e.g. education, healthcare, medical records, access to training).
  1. 9.10 Impact of the Internet
9-10.IC.07
Compare the positive and negative impacts of computing on behavior and culture.
  1. 9.10 Impact of the Internet
9-10.IC.08
Evaluate a computational artifact for its effectiveness for universal access (e.g. compare sample code with accessibility standards, building in access from initial design).
9-10.IC.09
Practice responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. 2.1 Digital Footprint and Reputation
  2. 2.6 Creative Credit & Copyright
  3. 2.7 Hacking Ethics
9-10.IC.10
Explain how computer science fosters innovation and enhances other careers and disciplines.
9-10.IC.11
Explain the impacts of computing on business, manufacturing, commerce, and society.
  1. 9.10 Impact of the Internet
9-10.NI.01
Describe the underlying process of Internet-based services. (e.g. illustrate how information flows in a global network, servers and clients, cloud services, secure versus insecure communication).
  1. 10.5 Network Options
  2. 10.6 Network Communication
9-10.NI.02
Illustrate the basic components of computer networks, protocols and routing (e.g. team based activities which may include drawing a diagram of a network including routers, switches, local networks, and end user computing devices, creating models with string and paper, see CS unplugged activities).
  1. 9.7 Routing
  2. 9.8 Packets & Protocols
  3. 10.6 Network Communication