Please enable JavaScript to use CodeHS

Standards Mapping

for Pennsylvania 3B

28

Standards in this Framework

12

Standards Mapped

42%

Mapped to Course

Standard Lessons
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
  1. 10.5 Future of Computing
  2. 10.5 Future of Computing
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
3B-AP-12
Compare and contrast fundamental data structures and their uses.
  1. 4.1 Extra Karel Practice
  2. 4.1 Extra Karel Practice
  3. 5.1 Extra Karel Puzzles
  4. 5.1 Extra Karel Puzzles
  5. 6.13 Parameters
  6. 6.13 Parameters
  7. 6.14 Using i in For Loops
  8. 6.14 Using i in For Loops
  9. 6.16 If Statements
  10. 6.16 If Statements
  11. 6.17 If/ Else Statements
  12. 6.17 If/ Else Statements
  13. 6.18 While Loops
  14. 6.18 While Loops
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 2.3 Karel Can't Turn Right
  2. 2.3 Karel Can't Turn Right
  3. 2.4 Functions in Karel
  4. 2.4 Functions in Karel
  5. 2.5 The Start Function
  6. 2.5 The Start Function
  7. 2.6 Top Down Design and Decomposition in Karel
  8. 2.6 Top Down Design and Decomposition in Karel
  9. 2.7 Commenting Your Code
  10. 2.7 Commenting Your Code
  11. 2.8 Super Karel
  12. 2.8 Super Karel
  13. 2.9 For Loops
  14. 2.9 For Loops
  15. 2.10 If Statements
  16. 2.10 If Statements
  17. 2.11 If/Else Statements
  18. 2.11 If/Else Statements
  19. 2.12 While Loops in Karel
  20. 2.12 While Loops in Karel
  21. 2.13 Control Structures Example
  22. 2.13 Control Structures Example
  23. 2.14 More Karel Examples and Testing
  24. 2.14 More Karel Examples and Testing
  25. 2.15 How to Indent Your Code
  26. 2.15 How to Indent Your Code
  27. 2.16 Karel Challenges
  28. 2.16 Karel Challenges
  29. 4.1 Extra Karel Practice
  30. 4.1 Extra Karel Practice
  31. 5.1 Extra Karel Puzzles
  32. 5.1 Extra Karel Puzzles
  33. 6.10 Top Down Design
  34. 6.10 Top Down Design
  35. 11.7 Image Manipulation
  36. 11.7 Image Manipulation
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 6.1 Intro to Python with Tracy the Turtle
  2. 6.1 Intro to Python with Tracy the Turtle
  3. 6.2 Tracy's Grid World
  4. 6.2 Tracy's Grid World
  5. 6.3 Turning Tracy
  6. 6.3 Turning Tracy
  7. 6.4 For Loops
  8. 6.4 For Loops
  9. 6.5 Turning Tracy Using Angles
  10. 6.5 Turning Tracy Using Angles
  11. 6.8 Functions
  12. 6.8 Functions
  13. 6.9 Artistic Effects
  14. 6.9 Artistic Effects
  15. 6.15 Extended Loop Control
  16. 6.15 Extended Loop Control
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 2.1 Introduction to Programming With Karel
  2. 2.1 Introduction to Programming With Karel
  3. 2.2 More Basic Karel
  4. 2.2 More Basic Karel
  5. 2.3 Karel Can't Turn Right
  6. 2.3 Karel Can't Turn Right
  7. 2.4 Functions in Karel
  8. 2.4 Functions in Karel
  9. 2.5 The Start Function
  10. 2.5 The Start Function
  11. 2.6 Top Down Design and Decomposition in Karel
  12. 2.6 Top Down Design and Decomposition in Karel
  13. 2.7 Commenting Your Code
  14. 2.7 Commenting Your Code
  15. 2.8 Super Karel
  16. 2.8 Super Karel
  17. 2.9 For Loops
  18. 2.9 For Loops
  19. 2.10 If Statements
  20. 2.10 If Statements
  21. 2.11 If/Else Statements
  22. 2.11 If/Else Statements
  23. 2.12 While Loops in Karel
  24. 2.12 While Loops in Karel
  25. 2.13 Control Structures Example
  26. 2.13 Control Structures Example
  27. 2.14 More Karel Examples and Testing
  28. 2.14 More Karel Examples and Testing
  29. 2.15 How to Indent Your Code
  30. 2.15 How to Indent Your Code
  31. 3.1 Hello World
  32. 3.1 Hello World
  33. 3.2 Variables
  34. 3.2 Variables
  35. 3.3 User Input
  36. 3.3 User Input
  37. 3.4 Basic Math in JavaScript
  38. 3.4 Basic Math in JavaScript
  39. 3.5 Using Graphics in JavaScript
  40. 3.5 Using Graphics in JavaScript
  41. 4.1 Extra Karel Practice
  42. 4.1 Extra Karel Practice
  43. 5.1 Extra Karel Puzzles
  44. 5.1 Extra Karel Puzzles
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
  1. 13.7 Network Attacks
  2. 13.7 Network Attacks
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
3B-CS-01
Categorize the roles of operating system software.
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 13.2 Internet Hardware and Sending Information
  2. 13.2 Internet Hardware and Sending Information
  3. 13.5 Routing
  4. 13.5 Routing
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 13.9 Impact of Cybersecurity
  2. 13.9 Impact of Cybersecurity
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 13.8 The CIA Triad
  2. 13.8 The CIA Triad
  3. 13.9 Impact of Cybersecurity
  4. 13.9 Impact of Cybersecurity
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 10.5 Future of Computing
  2. 10.5 Future of Computing
  3. 10.6 Computer Model
  4. 10.6 Computer Model
  5. 13.1 What is Cybersecurity?
  6. 13.1 What is Cybersecurity?
  7. 13.8 The CIA Triad
  8. 13.8 The CIA Triad
  9. 13.9 Impact of Cybersecurity
  10. 13.9 Impact of Cybersecurity
3B-IC-28
Debate laws and regulations that impact the development and use of software.
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 13.2 Internet Hardware and Sending Information
  2. 13.2 Internet Hardware and Sending Information
  3. 13.7 Network Attacks
  4. 13.7 Network Attacks
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.
  1. 13.6 Packets & Protocols
  2. 13.6 Packets & Protocols
  3. 13.8 The CIA Triad
  4. 13.8 The CIA Triad