Please enable JavaScript to use CodeHS

Standards Mapping

for Oklahoma Level 1

28

Standards in this Framework

28

Standards Mapped

100%

Mapped to Course

Standard Lessons
L1.CS.D.01
Model how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. Oklahoma Computer Science I
  2. 4.1 Operating Systems
  3. 4.13 System Administration Quiz
  4. 5.1 Computers Speak Binary
  5. 5.3 Encoding Images in Binary
  6. 5.12 IT Concepts Quiz
  7. Oklahoma Web Design
  8. 1.2 The Internet
  9. 1.3 Browsers
  10. 1.4 Viewing Websites
  11. 1.5 Getting Started - What is the Web? Quiz
  12. Oklahoma Cybersecurity
  13. 4.1 Operating Systems
  14. 4.13 System Administration Quiz
  15. 5.1 Computers Speak Binary
  16. 5.3 Encoding Images in Binary
  17. 5.12 IT Concepts Quiz
L1.CS.HS.01
Analyze the levels of abstraction and interactions between application software, system software, and hardware.
  1. Oklahoma Computer Science I
  2. 4.1 Operating Systems
  3. 4.13 System Administration Quiz
  4. 5.1 Computers Speak Binary
  5. 5.12 IT Concepts Quiz
  6. Oklahoma Cybersecurity
  7. 4.1 Operating Systems
  8. 4.13 System Administration Quiz
  9. 5.1 Computers Speak Binary
  10. 5.12 IT Concepts Quiz
L1.CS.T.01
Develop and apply criteria for the systematic discovery of errors and systematic strategies for the correction of errors in computing systems.
  1. Oklahoma Computer Science I
  2. 7.2 Troubleshooting Methodology
  3. Oklahoma Computer Science II
  4. 1.17 Debugging Strategies
  5. 1.18 Programming with Karel Quiz
  6. Oklahoma Web Design
  7. 9.5 Prototype
  8. Oklahoma Cybersecurity
  9. 7.2 Troubleshooting Methodology
L1.NI.NCO.01
Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers, etc.) and network protocols (e.g., IP, DNS).
  1. Oklahoma Computer Science I
  2. 5.6 IP Addresses
  3. 5.7 Routing and Packets
  4. 5.9 OSI Model
  5. 5.12 IT Concepts Quiz
  6. 6.5 Network Devices
  7. Oklahoma Web Design
  8. 1.2 The Internet
  9. 12.2 Internet Hardware
  10. 12.3 Internet Addresses
  11. 12.4 DNS
  12. 12.5 Routing
  13. 12.6 Packets and Protocols
  14. 12.8 The Internet Quiz
  15. Oklahoma Cybersecurity
  16. 5.6 IP Addresses
  17. 5.7 Routing and Packets
  18. 5.9 OSI Model
  19. 5.12 IT Concepts Quiz
  20. 6.5 Network Devices
L1.NI.CY.01
Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system and the risks of an attack.
  1. Oklahoma Computer Science I
  2. 1.5 Personal Data Security
  3. 1.6 Cybersecurity Essentials
  4. 1.7 Common Cyber Attacks and Prevention
  5. 1.8 Cybersecurity and You Quiz
  6. 8.5 Environmental Controls
  7. 8.8 Data Security Quiz
  8. Oklahoma Cybersecurity
  9. 1.5 Personal Data Security
  10. 1.6 Cybersecurity Essentials
  11. 1.7 Common Cyber Attacks and Prevention
  12. 1.8 Cybersecurity and You Quiz
  13. 8.5 Environmental Controls
  14. 8.8 Data Security Quiz
L1.NI.CY.02
Recommend security measures to address various scenarios based on information security principles.
  1. Oklahoma Computer Science I
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
  4. 1.8 Cybersecurity and You Quiz
  5. 8.6 Checking for Vulnerabilities
  6. 8.7 Risky Business
  7. 8.8 Data Security Quiz
  8. Oklahoma Cybersecurity
  9. 1.6 Cybersecurity Essentials
  10. 1.7 Common Cyber Attacks and Prevention
  11. 1.8 Cybersecurity and You Quiz
  12. 8.6 Checking for Vulnerabilities
  13. 8.7 Risky Business
  14. 8.8 Data Security Quiz
L1.NI.CY.03
Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives, such as the user, enterprise, and government.
  1. Oklahoma Computer Science I
  2. 1.5 Personal Data Security
  3. 1.7 Common Cyber Attacks and Prevention
  4. 1.8 Cybersecurity and You Quiz
  5. 8.6 Checking for Vulnerabilities
  6. 8.7 Risky Business
  7. 8.8 Data Security Quiz
  8. Oklahoma Cybersecurity
  9. 1.5 Personal Data Security
  10. 1.7 Common Cyber Attacks and Prevention
  11. 1.8 Cybersecurity and You Quiz
  12. 8.6 Checking for Vulnerabilities
  13. 8.7 Risky Business
  14. 8.8 Data Security Quiz
L1.DA.S.01
Convert and compare different bit representations of data types, such as characters, numbers, and images.
  1. Oklahoma Computer Science I
  2. 5.2 Bits, Text, and Numbers
  3. 5.3 Encoding Images in Binary
  4. 5.12 IT Concepts Quiz
  5. Oklahoma Computer Science II
  6. 3.6 Using RGB to Create Colors
  7. Oklahoma Cybersecurity
  8. 5.2 Bits, Text, and Numbers
  9. 5.3 Encoding Images in Binary
  10. 5.12 IT Concepts Quiz
L1.DA.S.02
Evaluate the trade-offs in how data is organized and stored digitally.
  1. Oklahoma Computer Science I
  2. 5.4 Lossy Compression
  3. 5.12 IT Concepts Quiz
  4. 6.4 Storage Options
  5. 6.12 IT Infrastructure Quiz
  6. 8.2 Using Databases
  7. 8.8 Data Security Quiz
  8. Oklahoma Cybersecurity
  9. 5.4 Lossy Compression
  10. 5.12 IT Concepts Quiz
  11. 6.4 Storage Options
  12. 6.12 IT Infrastructure Quiz
  13. 8.2 Using Databases
  14. 8.8 Data Security Quiz
L1.DA.CVT.01
Use tools and techniques to locate, collect, and create visualizations of small and largescale data sets (e.g., paper surveys and online data sets).
  1. Oklahoma Computer Science I
  2. 8.2 Using Databases
  3. 8.8 Data Security Quiz
  4. Oklahoma Computer Science II
  5. 11.1 The Value of Data
  6. 11.2 Data Collection & Limitations
  7. 11.3 Present a Data-Driven Insight
  8. Oklahoma Cybersecurity
  9. 8.2 Using Databases
  10. 8.8 Data Security Quiz
L1.DA.IM.01
Illustrate and explain the relationships between collected data elements using computational models.
  1. Oklahoma Computer Science I
  2. 8.2 Using Databases
  3. 8.8 Data Security Quiz
  4. Oklahoma Cybersecurity
  5. 8.2 Using Databases
  6. 8.8 Data Security Quiz
L1.AP.A.01
Create a prototype that uses algorithms (e. g., searching, sorting, finding shortest distance) to provide a possible solution for a realworld problem.
  1. Oklahoma Computer Science II
  2. 10.2 Plan and Design
L1.AP.V.01
Demonstrate the use of lists (e.g., arrays) to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
  1. Oklahoma Computer Science II
  2. 9.1 Intro to Lists/Arrays
  3. 9.2 Adding/Removing From an Array
  4. 9.3 Array Length and Looping Through Arrays
  5. 10.3 Develop Round 1
  6. 10.5 Develop Round 2
L1.AP.C.01
Justify the selection of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance, and memory usage.
  1. Oklahoma Computer Science II
  2. 5.2 Logical Operators
  3. 5.3 Comparison Operators
  4. 5.12 Javascript Control Structures Quiz
  5. 6.1 Control Structures Challenges
  6. 10.6 Deployment
L1.AP.M.01
Decompose problems into procedures using systematic analysis and design.
  1. Oklahoma Computer Science II
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.18 Programming with Karel Quiz
  4. 7.1 Functions and Parameters 1
  5. 7.2 Functions and Parameters 2
  6. 7.4 Functions and Return Values 1
  7. 7.5 Functions and Return Values 2
  8. 7.6 Functions and Parameters Quiz
  9. 10.2 Plan and Design
  10. 10.3 Develop Round 1
  11. Oklahoma Web Design
  12. 9.1 Intro to Design Thinking
  13. 9.2 Empathy
  14. 9.3 Define
  15. 9.4 Ideate
  16. 9.5 Prototype
  17. 9.6 Test
L1.AP.M.02
Create computational artifacts by systematically organizing, manipulating and/or processing data.
  1. Oklahoma Computer Science II
  2. 9.4 Iterating Over an Array
  3. 9.7 Applying Iteration - Usernames and Passwords
  4. 10.5 Develop Round 2
  5. 11.3 Present a Data-Driven Insight
L1.AP.PD.01
Create software that will provide solutions to a variety of users using a software development process.
  1. Oklahoma Computer Science II
  2. 10.1 Software Development Life Cycle
  3. 10.2 Plan and Design
  4. 10.3 Develop Round 1
  5. 10.4 Test
  6. 10.5 Develop Round 2
  7. 10.6 Deployment
L1.AP.PD.02
Evaluate a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development.
  1. Oklahoma Computer Science I
  2. 4.7 Software Licenses
  3. 4.13 System Administration Quiz
  4. Oklahoma Computer Science II
  5. 10.6 Deployment
  6. Oklahoma Cybersecurity
  7. 4.7 Software Licenses
  8. 4.13 System Administration Quiz
L1.AP.PD.03
While working in a team, develop, test, and refine eventbased programs that solve practical problems or allow self-expression.
  1. Oklahoma Computer Science II
  2. 10.1 Software Development Life Cycle
  3. 10.2 Plan and Design
  4. 10.3 Develop Round 1
  5. 10.4 Test
  6. 10.5 Develop Round 2
  7. 10.6 Deployment
  8. Oklahoma Web Design
  9. 10.1 Final Web Design Project
L1.AP.PD.04
Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a complex program.
  1. Oklahoma Computer Science II
  2. 10.2 Plan and Design
  3. Oklahoma Web Design
  4. 9.4 Ideate
L1.AP.PD.05
Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible.
  1. Oklahoma Computer Science II
  2. 10.4 Test
  3. 10.5 Develop Round 2
  4. Oklahoma Web Design
  5. 9.2 Empathy
  6. 9.5 Prototype
  7. 9.6 Test
L1.IC.CU.01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. Oklahoma Computer Science I
  2. 1.1 Digital Footprint and Responsibility
  3. 1.3 Can All Information Be Trusted?
  4. 1.4 Cyber Ethics and Laws
  5. 1.8 Cybersecurity and You Quiz
  6. 5.10 Impact of the Internet
  7. 5.12 IT Concepts Quiz
  8. Oklahoma Web Design
  9. 12.7 The Impact of the Internet
  10. 12.8 The Internet Quiz
  11. Oklahoma Cybersecurity
  12. 1.1 Digital Footprint and Responsibility
  13. 1.3 Can All Information Be Trusted?
  14. 1.4 Cyber Ethics and Laws
  15. 1.8 Cybersecurity and You Quiz
  16. 5.10 Impact of the Internet
  17. 5.12 IT Concepts Quiz
L1.IC.CU.02
Test and refine computational artifacts to ensure access to a variety of user audiences.
  1. Oklahoma Computer Science II
  2. 10.4 Test
  3. 10.5 Develop Round 2
  4. Oklahoma Web Design
  5. 9.6 Test
  6. 10.1 Final Web Design Project
L1.IC.CU.03
Demonstrate ways a given algorithm can help solve computational problems across disciplines.
  1. Oklahoma Computer Science II
  2. 5.11 Applying Conditionals - Password Validation
  3. 5.12 Javascript Control Structures Quiz
  4. 9.7 Applying Iteration - Usernames and Passwords
L1.IC.SI.01
Demonstrate and debate how computing increases and decreases connectivity and communication among people of various cultures.
  1. Oklahoma Computer Science I
  2. 5.11 The Impact of Computing Solutions in Developing Countries
  3. Oklahoma Cybersecurity
  4. 5.11 The Impact of Computing Solutions in Developing Countries
L1.IC.SLE.01
Describe the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. Oklahoma Computer Science I
  2. 1.4 Cyber Ethics and Laws
  3. 1.8 Cybersecurity and You Quiz
  4. Oklahoma Web Design
  5. 2.6 Copyright
  6. 2.11 HTML - Structuring Websites Quiz
  7. Oklahoma Cybersecurity
  8. 1.4 Cyber Ethics and Laws
  9. 1.8 Cybersecurity and You Quiz
L1.IC.SLE.02
Describe and discuss the privacy concerns related to the large-scale collection and analysis of information about individuals (e.g., how websites collect and uses data) that may not be evident to users.
  1. Oklahoma Computer Science I
  2. 1.5 Personal Data Security
  3. 1.8 Cybersecurity and You Quiz
  4. 8.1 Data as a Resource
  5. 8.8 Data Security Quiz
  6. Oklahoma Cybersecurity
  7. 1.5 Personal Data Security
  8. 1.8 Cybersecurity and You Quiz
  9. 8.1 Data as a Resource
  10. 8.8 Data Security Quiz
L1.IC.SLE.03
Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity.
  1. Oklahoma Computer Science I
  2. 1.4 Cyber Ethics and Laws
  3. 1.8 Cybersecurity and You Quiz
  4. Oklahoma Cybersecurity
  5. 1.4 Cyber Ethics and Laws
  6. 1.8 Cybersecurity and You Quiz