Please enable JavaScript to use CodeHS

Standards Mapping

for ID 9-12

58

Standards in this Framework

33

Standards Mapped

56%

Mapped to Course

Standard Lessons
9-12.CS.1.1
Identify and describe hardware components.
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
  3. 6.4 Storage Options
  4. 6.5 Network Devices
9-12.CS.1.2
Identify and evaluate what computing system resources are required for a specific software program.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.6 Software and Applications
9-12.CS.1.3
Identify the use of embedded computers in various applications.
9-12.CS.1.4
Create or modify a program that uses different forms of input and output.
  1. Introduction to Python Programming
  2. 3.3 User Input
  3. 15.1 What is File I/O
  4. Introduction to Computer Science in JavaScript (Corgi)
  5. 3.3 User Input
  6. 10.4 Mouse Click Events
  7. 10.6 Key Events
9-12.CS.1.5
Identify how a high level programming language abstracts machine language in a computer program.
  1. Introduction to Python Programming
  2. 2.7 Abstraction
9-12.CS.1.6
Create a model of how embedded systems sense, process, and interact in a given environment.
9-12.CS.2.1
Use applicable data collection techniques for various scenarios.
9-12.CS.2.2
Apply basic techniques for locating, collecting, and understanding the quality of data sets.
9-12.CS.2.3
Analyze data and identify patterns through modeling and simulation.
9-12.CS.2.4
Use data analysis to show the transformation from data to information to knowledge.
9-12.CS.2.5
Use models and simulations to help formulate, refine, and test scientific hypotheses.
9-12.CS.2.6
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, and the government.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 1.7 Common Cyber Attacks and Prevention
  4. 8.1 Data as a Resource
9-12.CS.2.7
Analyze the strengths and weaknesses of security policies based on their usage of encryption and authentication strategies.
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
9-12.CS.2.8
Convert between binary, decimal, octal, and hexadecimal representations of data.
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
  3. 5.2 Bits, Text, and Numbers
9-12.CS.2.9
Describe how real-world phenomena such as numbers, Strings, or images are represented as binary in a computer.
  1. Fundamentals of Cybersecurity
  2. 5.3 Encoding Images in Binary
9-12.CS.2.10
Analyze the trade-offs among various compression algorithms.
9-12.CS.3.1
Demonstrate responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.3 Can All Information Be Trusted?
  4. 1.4 Cyber Ethics and Laws
9-12.CS.3.2
Explain the social and economic implications associated with unethical computing practices.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 1.6 Cybersecurity Essentials
  4. 1.7 Common Cyber Attacks and Prevention
9-12.CS.3.3
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large-scale analysis of personal information.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. 1.6 Cybersecurity Essentials
  4. 1.7 Common Cyber Attacks and Prevention
9-12.CS.3.4
Identify and evaluate the beneficial and harmful effects of computing innovations on behavior and culture.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
  4. 1.5 Personal Data Security
  5. 1.7 Common Cyber Attacks and Prevention
  6. 5.9 Impact of the Internet
9-12.CS.3.5
Debate how the issues of equity, data access, and distribution of computing resources create a digital divide in a global society.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
9-12.CS.3.6
Debate laws and regulations that impact the development, security and use of software.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
9-12.CS.3.7
Understand and define artificial intelligence.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
9-12.CS.3.8
Research and explain the social, moral, ethical, and legal impacts of artificial intelligence systems and respective usage.
9-12.CS.3.9
Explain how computer automation continues to transform society and the global economy (e.g. financial markets, transactions, predictions).
9-12.CS.3.10
Research, analyze, and present how computational thinking has enabled computing to revolutionize business, manufacturing, commerce and society.
9-12.CS.3.11
Evaluate the accessibility of a computational artifact.
9-12.CS.3.12
Describe how computer science shares features with creating and designing an artifact such as in music and art.
9-12.CS.3.13
Understand the ecosystem of open-source software development and its impact on global collaboration.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
9-12.CS.3.14
Explain how computer science fosters innovation and enhances other career and disciplines.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
9-12.CS.4.1
Illustrate the basic components of computer networks and protocols.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 5.8 OSI Model
  5. 6.7 Network Options
9-12.CS.4.2
Analyze the issues that impact network functionality.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 6.7 Network Options
  4. 6.10 Network Communication
9-12.CS.4.3
Describe the data flow that occurs when using Internet-based services.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 5.8 OSI Model
9-12.CS.4.4
Examine how encryption is essential to ensuring privacy and security over the internet.
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
9-12.CS.5.1
Diagram the flow of execution and output of a given program.
9-12.CS.5.2
Design algorithms using sequence, selection, iteration and recursion.
  1. Introduction to Computer Science in JavaScript (Corgi)
  2. 2.1 Challenge Problems
  3. 7.1 Control Structures Challenges
  4. 11.1 Animation Challenges
  5. 12.1 Breakout
9-12.CS.5.3
Use variable scope and encapsulation to design programs with cohesive and modular components.
  1. Introduction to Python Programming
  2. 22.5 Class Variables vs. Instance Variables
  3. Introduction to Computer Science in JavaScript (Corgi)
  4. 9.1 Functions Challenges
  5. 10.1 Timers
  6. 10.4 Mouse Click Events
9-12.CS.5.4
Decompose a complex problem using abstraction through methods and/or classes.
  1. Introduction to Python Programming
  2. 22.1 Classes and Objects
  3. 22.2 Methods
9-12.CS.5.5
Demonstrate the value of abstraction to manage problem complexity.
  1. Introduction to Python Programming
  2. 2.7 Abstraction
9-12.CS.5.6
Demonstrate code reuse by creating programming solutions using APIs and libraries.
9-12.CS.5.7
Evaluate the qualities of a program such as correctness, usability, readability, efficiency, portability and scalability through processes such as debugging and code review.
  1. Introduction to Python Programming
  2. 2.14 Debugging Strategies
9-12.CS.5.8
Compare and contrast simple data structures and their uses.
  1. Introduction to Python Programming
  2. 12.1 Tuples
  3. 12.2 Lists
  4. Introduction to Computer Science in JavaScript (Corgi)
  5. 20.1 Intro to Arrays
  6. 21.1 Intro to Objects
9-12.CS.5.9
Compare software development processes.
9-12.CS.5.10
Demonstrate an understanding of the software life cycle process.
  1. Introduction to Python Programming
  2. 16.1 Software Engineer
9-12.CS.5.11
Design and develop a software artifact by leading, initiating, and participating in a team.
9-12.CS.5.12
Create collaborative software projects using Integrated Development Environments, or other collaborative tools.
9-12.CS.5.13
Understand the positive and negative implications that arise when you add functionality to an existing program.
9-12.CS.5.14
Demonstrate how diverse team collaboration improves the design and development of software products.
9-12.CS.5.15
Compare a variety of programming languages available to solve problems and develop systems.
  1. Introduction to Python Programming
  2. 3.7 Programming Languages
9-12.CS.5.16
Analyze security issues that might lead to compromised computer programs.
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
9-12.CS.5.17
Classify and define the different types of software licenses in order to understand how to apply each one to a specific software example.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
9-12.CS.5.18
Analyze the notion of intelligent behavior through the programs that learn and adapt, play games, do image recognition, perform text analysis, and control the behavior of robots.
9-12.CS.5.19
Illustrate how mathematical and statistical functions, sets, and logic are used in computation.
  1. Introduction to Python Programming
  2. 3.4 Mathematical Operators
  3. 5.4 Logical Operators
  4. 22.9 Modules
9-12.CS.5.20
Describe the concept of parallel processing.
9-12.CS.5.21
Explore issues surrounding mobile computing.
  1. Fundamentals of Cybersecurity
  2. 4.5 Laptops and Tablets
9-12.CS.5.22
Explain the value of heuristic algorithms to approximate solutions for interactable problems.
9-12.CS.5.23
Critically examine algorithms and design an original algorithm (e.g. adapt, remix, improve).
9-12.CS.5.24
Classify problems as tractable, interactable, or computationally unsolvable.