Please enable JavaScript to use CodeHS

Standards Mapping

for Idaho Digital Literacy

21

Standards in this Framework

21

Standards Mapped

100%

Mapped to Course

Standard Lessons
9-12.CS.1.4
Create or modify a program that uses different forms of input and output.
  1. 3.3 User Input
  2. 10.13 User Input
  3. 12.3 User Input
9-12.CS.1.6
Create a model of how embedded systems sense, process, and interact in a given environment.
  1. 2.2 Embedded Systems
9-12.CS.2.6
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, and the government.
  1. 1.4 Cyber Ethics and Laws
9-12.CS.3.4
Identify and evaluate the beneficial and harmful effects of computing innovations on behavior and culture.
  1. 1.3 Can All Information Be Trusted?
  2. 2.1 Impact of the Internet (Duplicate)
  3. 2.4 Human & Artificial Intelligence (Duplicate)
  4. 2.5 Project: AI on Trial (Duplicate)
9-12.CS.3.5
Debate how the issues of equity, data access, and distribution of computing resources create a digital divide in a global society.
  1. 2.1 Impact of the Internet (Duplicate)
9-12.CS.3.8
Research and explain the social, moral, ethical, and legal impacts of artificial intelligence systems and respective usage.
  1. 2.5 Project: AI on Trial (Duplicate)
9-12.CS.5.2
Design algorithms using sequence, selection, iteration and recursion.  *Recursion will be addressed in an upper computer science course.
  1. 5.2 If Statements
  2. 7.1 While Loops
  3. 7.2 For Loops
  4. 10.17 If Statements
  5. 10.18 If/ Else Statements
  6. 10.19 While Loops
  7. 10.20 Putting Together Control Structures
  8. 15.2 If/Else Statements
  9. 15.6 While Loops
  10. 15.8 While Loops and Graphics
  11. 15.9 For Loops
  12. 15.10 For Loops and Graphics
9-12.CS.5.1
Diagram the flow and execution and output of a given program.
  1. 5.3 Comparison Operators (Duplicate)
  2. 7.1 While Loops
  3. 10.2 Tracy's Grid World
  4. 15.9 For Loops
9-12.CS.3.2
Explain the social and economic implications associated with unethical computing practices. 
  1. 1.4 Cyber Ethics and Laws
  2. 2.5 Project: AI on Trial (Duplicate)
9-12.CS.3.3
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large-scale analysis of personal information.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
  3. 2.3 Data as a Resource (Duplicate)
9-12.CS.3.7
Understand and define artificial intelligence.
  1. 1.3 Can All Information Be Trusted?
  2. 2.4 Human & Artificial Intelligence (Duplicate)
9-12.CS.5.23
Critically examine algorithms and design an original algorithm (adapt, remix, improve).
  1. 3.1 Printing in Python
  2. 3.5 String Operators
  3. 5.1 Booleans
  4. 5.2 If Statements
  5. 7.3 Break and Continue
  6. 9.1 Project: Remix
  7. 10.23 Project: Remix
  8. 15.11 Project: Remix
9-12.ICT.2.1
Develop and manage their digital identity and understand the permanence of their digital actions including the effect on current and future reputation.
  1. 1.1 Digital Footprint and Responsibility
9-12.ICT.2.3
Demonstrate an understanding of the rights and obligations of using and sharing intellectual property.
  1. 1.3 Can All Information Be Trusted?
  2. 1.4 Cyber Ethics and Laws
9-12.ICT.2.4
Maintain their digital security and understand data collection technology used to track their online activity.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
  3. 2.3 Data as a Resource (Duplicate)
9-12.CS.3.1
Demonstrate responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.4 Cyber Ethics and Laws
9-12.ICT.2.2
Engage in positive, safe, legal and ethical behavior when using technology.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.4 Cyber Ethics and Laws
ODC.9-10.5
Manage personal data to maintain digital privacy and security and be conscious and aware of data-collection technology used to track and exploit navigation online. 
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
  3. 2.3 Data as a Resource (Duplicate)
ODC.11-12.5
Demonstrate the responsible and ethical use of information and communication technologies by distinguishing between kinds of information that should and should not be publicly shared and describing the consequences of a poor decision.
  1. 1.3 Can All Information Be Trusted?
  2. 1.4 Cyber Ethics and Laws
ODC.9-12.6.
Integrate multiple sources of information presented in diverse digital media, evaluating the credibility and accuracy of each source.
  1. 1.3 Can All Information Be Trusted?
  2. 2.1 Impact of the Internet (Duplicate)
  3. 2.5 Project: AI on Trial (Duplicate)
ODC.9-12.8.
Make strategic use of digital media presentations to enhance understanding of findings, reasoning, and evidence and to add interest.
  1. 2.1 Impact of the Internet (Duplicate)
  2. 2.5 Project: AI on Trial (Duplicate)