Please enable JavaScript to use CodeHS

Standards Mapping

for Montana 9-12

57

Standards in this Framework

43

Standards Mapped

75%

Mapped to Course

Standard Lessons
CS.AP.9-12.1
create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests;
  1. Foundations of Computer Science
  2. 2.4 Functions in Karel
  3. 2.5 The Start Function
  4. 2.11 If Statements
  5. 2.12 If/Else Statements
  6. 2.13 While Loops in Karel
  7. 2.14 Control Structures Example
  8. 2.15 More Karel Examples and Testing
  9. 3.2 Challenge Problems
  10. 5.2 Variables
  11. 5.3 User Input
  12. 5.4 Basic Math in JavaScript
  13. 5.5 Using Graphics in JavaScript
  14. 6.1 Graphics Challenges
  15. 7.1 Booleans
  16. 7.2 Logical Operators
  17. 7.3 Comparison Operators
  18. 7.4 If Statements
  19. 7.5 For Loops in JavaScript
  20. 7.6 General For Loops
  21. 7.7 For Loop Practice
  22. 7.8 Random Numbers
  23. 7.9 While Loops
  24. 7.10 Loop and a Half
  25. 8.1 Control Structures Challenges
  26. AP Computer Science Principles in Python
  27. 1.5 Functions in Karel
  28. 1.11 If Statements
  29. 1.12 If/Else Statements
  30. 1.13 While Loops in Karel
  31. 1.14 Control Structures Example
  32. 1.16 Algorithms
  33. 1.17 Ultra Karel
  34. 1.18 Karel Challenges
  35. 4.1 Booleans
  36. 4.2 Logical Operators
  37. 4.3 Comparison Operators
  38. 4.4 If Statements
  39. 4.6 For Loops in Python
  40. 4.7 General For Loops
  41. 4.8 For Loop Practice
  42. 4.10 While Loops
  43. 4.11 Loop and a Half
CS.AP.9-12.2
describe how artificial intelligence drives many software and physical systems;
  1. Introduction to AI for High School
  2. 5.1 The Ethics of Artificial Intelligence
CS.AP.9-12.3
implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem;
CS.AP.9-12.4
use and adapt classic algorithms to solve computational problems;
CS.AP.9-12.5
evaluate algorithms in terms of their efficiency, correctness, and clarity;
CS.AP.9-12.6
use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables;
  1. Foundations of Computer Science
  2. 9.11 Intro to Lists/Arrays
  3. 9.12 Adding/Removing From an Array
  4. 9.13 Array Length and Looping Through Arrays
  5. 9.14 Iterating Over an Array
CS.AP.9-12.7
compare and contrast fundamental data structures and their uses;
  1. Foundations of Computer Science
  2. 17.4 When Do I Use an Object?
CS.AP.9-12.8
justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made;
  1. Foundations of Computer Science
  2. 7.4 If Statements
  3. 7.5 For Loops in JavaScript
  4. 7.6 General For Loops
  5. 7.7 For Loop Practice
  6. 7.9 While Loops
  7. 7.10 Loop and a Half
  8. 8.1 Control Structures Challenges
CS.AP.9-12.9
design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions;
  1. Foundations of Computer Science
  2. 9.10 Mouse Events: Mouse Clicked
  3. 15.1 Mouse Events: Mouse Moved
  4. 15.3 Key Events
  5. 15.4 Crazy Ball Game
CS.AP.9-12.10
decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, or objects;
  1. Foundations of Computer Science
  2. 2.5 The Start Function
  3. 2.6 Top Down Design and Decomposition in Karel
  4. 3.2 Challenge Problems
  5. 6.1 Graphics Challenges
  6. 7.5 For Loops in JavaScript
  7. 7.7 For Loop Practice
  8. 7.8 Random Numbers
  9. 7.9 While Loops
  10. 7.10 Loop and a Half
  11. 8.1 Control Structures Challenges
  12. 9.1 Functions and Parameters 1
  13. 9.2 Functions and Parameters 2
  14. 9.3 Functions and Parameters 3
  15. 9.4 Functions and Return Values 1
  16. 9.5 Functions and Return Values 2
  17. 9.6 Timers
  18. 9.7 Random Circles
  19. 9.8 Random Ghosts
  20. 9.9 Bouncing Ball
  21. 9.10 Mouse Events: Mouse Clicked
CS.AP.9-12.11
create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs;
  1. Foundations of Computer Science
  2. 2.4 Functions in Karel
  3. 2.5 The Start Function
  4. 2.6 Top Down Design and Decomposition in Karel
  5. 3.2 Challenge Problems
  6. 5.5 Using Graphics in JavaScript
  7. 6.1 Graphics Challenges
  8. 9.6 Timers
  9. 9.7 Random Circles
  10. 9.8 Random Ghosts
  11. 9.9 Bouncing Ball
  12. 9.10 Mouse Events: Mouse Clicked
  13. 9.12 Adding/Removing From an Array
  14. 9.13 Array Length and Looping Through Arrays
  15. 9.14 Iterating Over an Array
CS.AP.9-12.12
construct solutions to problems using student-created procedures, modules, or objects;
  1. Foundations of Computer Science
  2. 2.4 Functions in Karel
  3. 3.2 Challenge Problems
  4. 6.1 Graphics Challenges
  5. 8.1 Control Structures Challenges
  6. 9.6 Timers
  7. 9.7 Random Circles
  8. 9.8 Random Ghosts
  9. 9.9 Bouncing Ball
  10. 9.10 Mouse Events: Mouse Clicked
CS.AP.9-12.13
analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution;
  1. Foundations of Computer Science
  2. 3.2 Challenge Problems
CS.AP.9-12.14
demonstrate code reuse by creating programming solutions using libraries and application programming interfaces;
CS.AP.9-12.15
systematically design and develop programs for broad audiences by incorporating feedback from users;
  1. Foundations of Computer Science
  2. 10.1 Intro to Design Thinking
  3. 10.2 Prototype
  4. 10.3 Test
CS.AP.9-12.16
evaluate and refine computational artifacts to make them more usable and accessible;
  1. Foundations of Computer Science
  2. 10.1 Intro to Design Thinking
  3. 10.2 Prototype
  4. 10.3 Test
CS.AP.9-12.17
design and develop computational artifacts working in team roles using collaborative tools;
  1. Foundations of Computer Science
  2. 3.1 Collaborative Programming
CS.AP.9-12.18
document design decisions using text, graphics, presentations, or demonstrations in the development of complex programs;
  1. Foundations of Computer Science
  2. 2.7 Commenting Your Code
  3. 10.4 Project Prep and Development
CS.AP.9-12.19
plan and develop programs for broad audiences using a software life cycle process;
CS.AP.9-12.20
explain security issues that might lead to compromised computer programs;
  1. Foundations of Computer Science
  2. 1.1 What is Cybersecurity?
  3. 1.2 The CIA Triad
  4. 1.6 Privacy & Security
CS.AP.9-12.21
develop programs for multiple computing platforms;
CS.AP.9-12.22
use version control systems, integrated development environments, and collaborative tools and practices in a group software project;
  1. Foundations of Computer Science
  2. 3.1 Collaborative Programming
CS.AP.9-12.23
develop and use a series of test cases to verify that a program performs according to its design specifications;
  1. Foundations of Computer Science
  2. 2.11 If Statements
  3. 2.12 If/Else Statements
  4. 2.13 While Loops in Karel
  5. 2.14 Control Structures Example
  6. 2.15 More Karel Examples and Testing
  7. 3.2 Challenge Problems
CS.AP.9-12.24
modify an existing program to add additional functionality and discuss intended and unintended implications;
CS.AP.9-12.25
evaluate key qualities of a program through a process such as a code review; and
CS.AP.9-12.26
compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
CS.CS.9-12.1
explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects;
  1. Foundations of Computer Science
  2. 2.8 Abstraction
  3. 2.9 Super Karel
CS.CS.9-12.2
compare levels of abstraction and interactions between application software, system software, and hardware layers;
  1. Foundations of Computer Science
  2. 2.8 Abstraction
CS.CS.9-12.3
categorize the roles of operating system software;
CS.CS.9-12.4
develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors; and
  1. Foundations of Computer Science
  2. 2.17 Debugging Strategies
CS.CS.9-12.5
illustrate ways computing systems implement logic, input, and output through hardware components.
CS.DA.9-12.1
create interactive data visualizations using software tools to help others better understand authentic phenomena;
  1. Foundations of Computer Science
  2. 1.8 Visualizing and Interpreting Data
CS.DA.9-12.2
use data analysis tools and techniques to identify patterns in data representing complex systems;
CS.DA.9-12.3
select data collection tools and techniques to generate data sets that support a claim or communicate information;
  1. Foundations of Computer Science
  2. 1.9 Data Collection & Limitations
CS.DA.9-12.4
translate between different bit representations of authentic phenomena, including characters, numbers, and images;
  1. Foundations of Computer Science
  2. 5.6 Using RGB to Create Colors
CS.DA.9-12.5
evaluate the tradeoffs in how data elements are organized and where data is stored;
  1. Foundations of Computer Science
  2. 1.6 Privacy & Security
CS.DA.9-12.6
create computational models that represent the relationships among different elements of data collected from a phenomenon or process; and
  1. Foundations of Computer Science
  2. 1.8 Visualizing and Interpreting Data
  3. 1.9 Data Collection & Limitations
CS.DA.9-12.7
evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. AP Computer Science Principles in Python
  2. 7.5 Simulation
CS.IC.9-12.1
evaluate the ways computing technologies, globally and locally impact personal, ethical, social, economic, and cultural practices;
  1. Foundations of Computer Science
  2. 1.3 Digital Footprint and Reputation
  3. 1.4 Cyberbullying
  4. 1.10 Creative Credit & Copyright
  5. 1.11 Hacking Ethics
  6. 1.12 Project: Public Service Announcement
  7. 4.1 Intro to the Internet
  8. 4.7 The Impact of the Internet
  9. AP Computer Science Principles in Python
  10. 11.10 The Impact of the Internet
  11. 12.1 The Effects of the Internet
CS.IC.9-12.2
evaluate the ways computing technologies impact American Indian communities in Montana;
CS.IC.9-12.3
test and refine computational artifacts to reduce bias and equity deficits;
CS.IC.9-12.4
demonstrate ways a given algorithm applies to problems across disciplines;
  1. AP Computer Science Principles in Python
  2. 5.8 Python vs Karel
  3. 5.9 Basic Python and Graphics Challenges
CS.IC.9-12.5
evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society;
  1. Foundations of Computer Science
  2. 4.7 The Impact of the Internet
  3. AP Computer Science Principles in Python
  4. 11.1 Welcome to the Internet
  5. 12.1 The Effects of the Internet
CS.IC.9-12.6
evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society, including the impact on American Indians living in urban, rural, and reservation communities;
  1. Foundations of Computer Science
  2. 4.7 The Impact of the Internet
CS.IC.9-12.7
predict how computational innovations that have revolutionized aspects of our culture might evolve;
  1. Foundations of Computer Science
  2. 4.1 Intro to the Internet
  3. 4.7 The Impact of the Internet
  4. AP Computer Science Principles in Python
  5. 11.1 Welcome to the Internet
  6. 11.10 The Impact of the Internet
  7. 12.1 The Effects of the Internet
CS.IC.9-12.8
use tools and methods to connect and work with others on a project including people in different cultures and career fields;
  1. Foundations of Computer Science
  2. 3.1 Collaborative Programming
CS.IC.9-12.9
explain the beneficial and harmful effects that intellectual property laws can have on innovation;
  1. Foundations of Computer Science
  2. 1.7 Information Literacy
  3. 1.10 Creative Credit & Copyright
  4. AP Computer Science Principles in Python
  5. 11.11 Creative Credit & Copyright
CS.IC.9-12.10
explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;
  1. Foundations of Computer Science
  2. 1.1 What is Cybersecurity?
  3. 1.2 The CIA Triad
  4. 1.3 Digital Footprint and Reputation
  5. 1.5 Internet Safety
  6. 1.6 Privacy & Security
  7. AP Computer Science Principles in Python
  8. 8.10 Cryptography
  9. 11.9 Cybersecurity
CS.IC.9-12.11
evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and
  1. Foundations of Computer Science
  2. 1.3 Digital Footprint and Reputation
  3. 1.6 Privacy & Security
  4. 1.11 Hacking Ethics
  5. AP Computer Science Principles in Python
  6. 11.9 Cybersecurity
CS.IC.9-12.12
debate laws and regulations that impact the development and use of software.
  1. AP Computer Science Principles in Python
  2. 11.11 Creative Credit & Copyright
  3. 12.1 The Effects of the Internet
CS.NI.9-12.1
recommend security measures to address various scenarios based on factors including efficiency, feasibility, and ethical impacts;
  1. Foundations of Computer Science
  2. 1.1 What is Cybersecurity?
  3. 1.2 The CIA Triad
  4. 1.3 Digital Footprint and Reputation
  5. 1.5 Internet Safety
  6. 1.6 Privacy & Security
  7. AP Computer Science Principles in Python
  8. 11.9 Cybersecurity
CS.NI.9-12.2
explain tradeoffs when selecting and implementing cybersecurity recommendations;
  1. Foundations of Computer Science
  2. 1.1 What is Cybersecurity?
  3. 1.2 The CIA Triad
  4. 1.3 Digital Footprint and Reputation
  5. 1.6 Privacy & Security
  6. AP Computer Science Principles in Python
  7. 11.9 Cybersecurity
CS.NI.9-12.3
compare ways software developers protect devices and information from unauthorized access;
  1. AP Computer Science Principles in Python
  2. 8.10 Cryptography
  3. 9.1 Practice PT: Steganography
  4. 11.9 Cybersecurity
CS.NI.9-12.4
evaluate the scalability and reliability of networks by describing the relationship between routers, addressing, switches, servers, and topology;
  1. Foundations of Computer Science
  2. 4.2 Internet Hardware
  3. 4.3 Internet Addresses
  4. 4.4 DNS
  5. 4.5 Routing
  6. 4.6 Packets and Protocols
  7. AP Computer Science Principles in Python
  8. 11.1 Welcome to the Internet
  9. 11.2 Internet Hardware
  10. 11.3 Internet Addresses
  11. 11.4 Viewing Websites
  12. 11.5 DNS
  13. 11.6 Routing
  14. 11.7 Packets and Protocols
  15. 11.8 Sequential, Parallel & Distributed Computing
CS.NI.9-12.5
give examples to illustrate how sensitive data can be affected by malware and other attacks;
  1. Foundations of Computer Science
  2. 1.1 What is Cybersecurity?
  3. AP Computer Science Principles in Python
  4. 8.10 Cryptography
  5. 11.9 Cybersecurity
  6. 11.10 The Impact of the Internet
CS.NI.9-12.6
compare various security measures, considering tradeoffs between the usability and security of a computing system; and
  1. Foundations of Computer Science
  2. 1.2 The CIA Triad
  3. AP Computer Science Principles in Python
  4. 11.9 Cybersecurity
  5. 11.10 The Impact of the Internet
CS.NI.9-12.7
discuss the issues that impact functionality.
  1. Foundations of Computer Science
  2. 1.2 The CIA Triad