Please enable JavaScript to use CodeHS

Standards Mapping

for Montana 9-12

57

Standards in this Framework

16

Standards Mapped

28%

Mapped to Course

Standard Lessons
CS.AP.9-12.1
create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests;
  1. 1.5 Functions in Karel
  2. 1.11 If Statements
  3. 1.12 If/Else Statements
  4. 1.13 While Loops in Karel
  5. 1.14 Control Structures Example
  6. 1.16 Algorithms
  7. 1.17 Ultra Karel
  8. 1.18 Karel Challenges
  9. 4.1 Booleans
  10. 4.2 Logical Operators
  11. 4.3 Comparison Operators
  12. 4.4 If Statements
  13. 4.6 For Loops in Python
  14. 4.7 General For Loops
  15. 4.8 For Loop Practice
  16. 4.10 While Loops
  17. 4.11 Loop and a Half
CS.AP.9-12.2
describe how artificial intelligence drives many software and physical systems;
CS.AP.9-12.3
implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem;
CS.AP.9-12.4
use and adapt classic algorithms to solve computational problems;
CS.AP.9-12.5
evaluate algorithms in terms of their efficiency, correctness, and clarity;
CS.AP.9-12.6
use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables;
CS.AP.9-12.7
compare and contrast fundamental data structures and their uses;
CS.AP.9-12.8
justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made;
CS.AP.9-12.9
design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions;
CS.AP.9-12.10
decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects;
CS.AP.9-12.11
create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs;
CS.AP.9-12.12
construct solutions to problems using student-created procedures, modules, or objects;
CS.AP.9-12.13
analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution;
CS.AP.9-12.14
demonstrate code reuse by creating programming solutions using libraries and application programming interfaces;
CS.AP.9-12.15
systematically design and develop programs for broad audiences by incorporating feedback from users;
CS.AP.9-12.16
evaluate and refine computational artifacts to make them more usable and accessible;
CS.AP.9-12.17
design and develop computational artifacts working in team roles using collaborative tools;
CS.AP.9-12.18
document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs;
CS.AP.9-12.19
plan and develop programs for broad audiences using a software life cycle process;
CS.AP.9-12.20
explain security issues that might lead to compromised computer programs;
CS.AP.9-12.21
develop programs for multiple computing platforms;
CS.AP.9-12.22
use version control systems, integrated development environments, and collaborative tools and practices in a group software project;
CS.AP.9-12.23
develop and use a series of test cases to verify that a program performs according to its design specifications;
CS.AP.9-12.24
modify an existing program to add additional functionality and discuss intended and unintended implications;
CS.AP.9-12.25
evaluate key qualities of a program through a process such as a code review; and
CS.AP.9-12.26
compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
CS.CS.9-12.1
explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects;
CS.CS.9-12.2
compare levels of abstraction and interactions between application software, system software, and hardware layers;
CS.CS.9-12.3
categorize the roles of operating system software;
CS.CS.9-12.4
develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and
CS.CS.9-12.5
illustrate ways computing systems implement logic, input, and output through hardware components.
CS.DA.9-12.1
create interactive data visualizations using software tools to help others better understand authentic phenomena;
CS.DA.9-12.2
use data analysis tools and techniques to identify patterns in data representing complex systems;
CS.DA.9-12.3
select data collection tools and techniques to generate data sets that support a claim or communicate information;
CS.DA.9-12.4
translate between different bit representations of authentic phenomena, including characters, numbers, and images;
CS.DA.9-12.5
evaluate the tradeoffs in how data elements are organized and where data is stored;
CS.DA.9-12.6
create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and
CS.DA.9-12.7
evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. 7.5 Simulation
CS.IC.9-12.1
evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices;
  1. 11.10 The Impact of the Internet
  2. 12.1 The Effects of the Internet
CS.IC.9-12.2
evaluate the ways computing technologies impact American Indian communities in Montana;
CS.IC.9-12.3
test and refine computational artifacts to reduce bias and equity deficits;
CS.IC.9-12.4
demonstrate ways a given algorithm applies to problems across disciplines;
  1. 5.8 Python vs Karel
  2. 5.9 Basic Python and Graphics Challenges
CS.IC.9-12.5
evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society;
  1. 11.1 Welcome to the Internet
  2. 12.1 The Effects of the Internet
CS.IC.9-12.6
evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities;
CS.IC.9-12.7
predict how computational innovations that have revolutionized aspects of our culture might evolve;
  1. 11.1 Welcome to the Internet
  2. 11.10 The Impact of the Internet
  3. 12.1 The Effects of the Internet
CS.IC.9-12.8
use tools and methods to connect and work with others on a project including people in different cultures and career fields;
CS.IC.9-12.9
explain the beneficial and harmful effects that intellectual property laws can have on innovation;
  1. 11.11 Creative Credit & Copyright
CS.IC.9-12.10
explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;
  1. 8.10 Cryptography
  2. 11.9 Cybersecurity
CS.IC.9-12.11
evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and
  1. 11.9 Cybersecurity
CS.IC.9-12.12
debate laws and regulations that impact the development and use of software.
  1. 11.11 Creative Credit & Copyright
  2. 12.1 The Effects of the Internet
CS.NI.9-12.1
recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts;
  1. 11.9 Cybersecurity
CS.NI.9-12.2
explain tradeoffs when selecting and implementing cybersecurity recommendations;
  1. 11.9 Cybersecurity
CS.NI.9-12.3
compare ways software developers protect devices and information from unauthorized access;
  1. 8.10 Cryptography
  2. 9.1 Practice PT: Steganography
  3. 11.9 Cybersecurity
CS.NI.9-12.4
evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology;
  1. 11.1 Welcome to the Internet
  2. 11.2 Internet Hardware
  3. 11.3 Internet Addresses
  4. 11.4 Viewing Websites
  5. 11.5 DNS
  6. 11.6 Routing
  7. 11.7 Packets and Protocols
  8. 11.8 Sequential, Parallel & Distributed Computing
CS.NI.9-12.5
give examples to illustrate how sensitive data can be affected by malware and other attacks;
  1. 8.10 Cryptography
  2. 11.9 Cybersecurity
  3. 11.10 The Impact of the Internet
CS.NI.9-12.6
compare various security measures, considering tradeoffs between the usability and security of a computing system; and
  1. 11.9 Cybersecurity
  2. 11.10 The Impact of the Internet
CS.NI.9-12.7
discuss the issues that impact functionality.