Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 9-12 Advanced


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Evaluate the function of various devices to formulate a human interaction solution.
  1. 16.1 Magpie Lab
Integrate multifunctional computing devices to solve a problem.
Identify the functionality of various categories of hardware components and the communication between them, and use that information to build a system virtually or physically for a specific task.
Categorize types of operating systems and how they will be used.
Evaluate and revise a systematic process to identify the source of a problem and the steps to correct it within individual and connected devices.
Construct a networking devices map solution for a realworld scenario to establish communication between distant devices.
Develop a solution to a real-world scenario using networking protocols to establish network communication.
Improve scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together.
Identify cybersecurity ethics and law
Implement a devised solution to counter a security threat.
Compare and contrast various threat actors, such as nation-states, cyber terrorist groups, organized crime or hacktivists.
Explore and utilize examples of encryption methods (e.g., Vigenére, Bacon’s cipher and Enigma).
Design and implement an IoT life cycle scenario that encompasses data gathering, transmission, reception and data analysis to demonstrate how the IoT operates and apply these skills to design products that model the process.
Create multidimensional data collections that can be utilized through various methods to solve complex data problems.
  1. 5.1 What are Data Structures?
  2. 5.9 2D Arrays (Matrices or Grids)
Investigate data storage and collection tools to analyze tradeoffs and limitations.
  1. 5.1 What are Data Structures?
  2. 5.6 Arrays vs ArrayLists
  3. 5.9 2D Arrays (Matrices or Grids)
  4. 5.11 HashMaps
Create visualization or multisensory artifacts to communicate insights and knowledge gained from complex data analysis that answers real-world questions.
Create a model that simulates a complex system and uses extracted data to hypothesize, test and refine the model to discover connections or trends.
  1. 8.6 Advanced: Recursion
Define and explain recursive algorithms to understand how and when to apply them.
  1. 8.6 Advanced: Recursion
Use iteration to effectively solve problems.
  1. 2.9 For Loops
  2. 2.10 While Loops
  3. 2.12 Loop-and-a-Half
  4. 8.6 Advanced: Recursion
Use recursion to effectively solve problems.
  1. 8.2 Linear Search
  2. 8.3 Binary Search
  3. 8.4 Selection Sort
  4. 8.5 Insertion Sort
  5. 8.7 Mergesort
Define and explain sorting and searching algorithms to understand how and when to apply them.
  1. 8.2 Linear Search
  2. 8.3 Binary Search
  3. 8.4 Selection Sort
  4. 8.5 Insertion Sort
  5. 8.7 Mergesort
Use sorting and searching to analyze and organize data.
  1. 8.3 Binary Search
  2. 8.4 Selection Sort
Compare and contrast classical, cluster and quantum computing algorithms.
Utilize different data storage structures to store larger and more complex data than variables can contain.
  1. 5.1 What are Data Structures?
  2. 5.6 Arrays vs ArrayLists
  3. 5.9 2D Arrays (Matrices or Grids)
  4. 5.11 HashMaps
Identify the appropriate data structures or variables to use to design a solution to a complex problem.
  1. 5.1 What are Data Structures?
  2. 5.6 Arrays vs ArrayLists
  3. 5.9 2D Arrays (Matrices or Grids)
  4. 5.11 HashMaps
Write programs that use library methods and control structures and methods to solve a problem.
  1. 4.8 Wrapper Classes
  2. 4.13 Inheritance
  3. 5.6 Arrays vs ArrayLists
  4. 5.8 The List Interface
Refactor a program to be smaller and more efficient.
Construct solutions to problems using student-created components (e.g., procedures, modules, objects).
  1. 3.2 Methods and Parameters
  2. 3.3 Methods and Return Values
  3. 3.4 Javadocs and More Methods
  4. 4.4 Writing Classes
  5. 4.5 Writing Classes and Instance Methods
Design or redesign a solution to a large-scale computational problem by identifying generalizable patterns.
Create programming solutions by reusing existing code (e.g., libraries, Application Programming Interface (APIs), code repositories).
  1. 3.4 Javadocs and More Methods
  2. 4.3 Using a Class as a Client
  3. 5.6 Arrays vs ArrayLists
Fully implement the most appropriate software methodology to complete a team programming project.
Describe some of the technical difficulties in making computer perception systems function well for diverse groups.
Illustrate the abstraction hierarchy for speech understanding, from waveforms to sentences, showing how knowledge at each level is used to resolve ambiguities in the levels below.
Write code to create an algorithmic search.
Illustrate breadth-first, depth-first and best-first search algorithms to grow a search tree.
Evaluate a dataset used to train a real AI system by considering the size of the dataset, the way that the data were acquired and labeled, the storage required and the estimated time to produce the dataset.
Using a data visualization tool, investigate imbalances in training data in terms of gender, age, ethnicity or other demographic variables that could result in a biased model.
Identify and debate the issues of AI and consciousness.
Design an AI system to address social issues or explain how AI could be used to address a social issue.
Evaluate an alternative solution where a current tool does not exist due to limited resources.
Analyze the global impact of the distribution of computing resources in terms of equity, access and influence.
Design a study of the potential impacts of classical computers, clustered computing and quantum computing in different fields.
Evaluate and explore how research and commercial entities are using clustered and quantum computing as alternative solutions due to limitations of classical computers.
Create a scenario to demonstrate typical tradeoffs between usability and security and recommend security measures based on these or other tradeoffs.
Evaluate and explore how research and commercial entities use intellectual property laws including copyright, trademarks, and patents to identify practical, business and ethical impacts.