Please enable JavaScript to use CodeHS

Standards Mapping

for Michigan 3B

28

Standards in this Framework

18

Standards Mapped

64%

Mapped to Course

Standard Lessons
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.5 Basic Crypto Systems: Vigenere Cipher
  3. 6.1 Project: Classic Cipher Newscast
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 5.4 Basic Crypto Systems: Cracking Caesar
  2. 6.1 Project: Classic Cipher Newscast
3B-AP-12
Compare and contrast fundamental data structures and their uses.
  1. 4.5 Arrays and Objects
  2. 22.2 Logical Operators
  3. 22.3 Comparison Operators
  4. 22.4 If Statements
  5. 22.5 For Loops in JavaScript
  6. 22.6 General For Loops
  7. 22.7 For Loop Practice
  8. 22.8 Random Numbers
  9. 22.9 While Loops
  10. 22.10 Loop and a Half
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.5 Basic Crypto Systems: Vigenere Cipher
  3. 6.1 Project: Classic Cipher Newscast
  4. 21.1 Challenge Problems
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 21.1 Challenge Problems
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
  6. 22.5 For Loops in JavaScript
  7. 22.6 General For Loops
  8. 22.7 For Loop Practice
  9. 22.8 Random Numbers
  10. 22.9 While Loops
  11. 22.10 Loop and a Half
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
  1. 2.7 Hacking Ethics
  2. 3.1 Project: Public Service Announcement
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 5.2 History of Cryptography
  5. 6.1 Project: Classic Cipher Newscast
  6. 7.6 Application Security
  7. 7.7 Browser Configuration
  8. 7.8 System Administration
  9. 8.1 Inside Web Apps
  10. 8.2 Developer Tools
  11. 8.9 Common Security Problems
  12. 8.10 SQL Injection Overview
  13. 8.11 Types of SQLi and Prevention
  14. 14.1 Project: Security Assessment Report
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.5 Basic Crypto Systems: Vigenere Cipher
  3. 6.1 Project: Classic Cipher Newscast
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 4.1 Programming Concepts
3B-CS-01
Categorize the roles of operating system software.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 9.4 Internet Hardware and Sending Information
  2. 9.7 Routing
  3. 10.1 Internal Components
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 8.3 The Value of Data
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 8.7 Basic Querying in SQL
  2. 8.8 Filtering Queries in SQL
  3. 14.1 Project: Security Assessment Report
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 1.3 Impact of Cybersecurity
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.5 Information Literacy
  5. 2.6 Creative Credit & Copyright
  6. 2.7 Hacking Ethics
  7. 3.1 Project: Public Service Announcement
  8. 5.2 History of Cryptography
  9. 6.1 Project: Classic Cipher Newscast
  10. 9.10 Impact of the Internet
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 1.3 Impact of Cybersecurity
  2. 1.4 The CIA Triad
  3. 2.3 Internet Safety
  4. 3.1 Project: Public Service Announcement
  5. 9.10 Impact of the Internet
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.4 The CIA Triad
  4. 2.3 Internet Safety
  5. 2.4 Privacy & Security
  6. 2.5 Information Literacy
  7. 2.6 Creative Credit & Copyright
  8. 3.1 Project: Public Service Announcement
  9. 5.1 Cryptography, Cryptology, Cryptanalysis
  10. 5.2 History of Cryptography
  11. 6.1 Project: Classic Cipher Newscast
  12. 9.1 Introduction to the Internet
  13. 9.10 Impact of the Internet
3B-IC-28
Debate laws and regulations that impact the development and use of software.
  1. 2.2 Cyberbullying
  2. 2.4 Privacy & Security
  3. 2.6 Creative Credit & Copyright
  4. 2.7 Hacking Ethics
  5. 3.1 Project: Public Service Announcement
  6. 7.5 Software Licenses
  7. 9.9 Viewing a Webpage
  8. 9.10 Impact of the Internet
  9. 14.1 Project: Security Assessment Report
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 9.4 Internet Hardware and Sending Information
  2. 10.5 Network Options
  3. 10.6 Network Communication
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.
  1. 1.4 The CIA Triad
  2. 2.1 Digital Footprint and Reputation
  3. 2.4 Privacy & Security
  4. 2.7 Hacking Ethics
  5. 3.1 Project: Public Service Announcement
  6. 5.2 History of Cryptography
  7. 6.1 Project: Classic Cipher Newscast
  8. 8.1 Inside Web Apps
  9. 8.2 Developer Tools
  10. 8.9 Common Security Problems
  11. 8.11 Types of SQLi and Prevention
  12. 9.8 Packets & Protocols
  13. 14.1 Project: Security Assessment Report