Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Fundamentals of Computing

91

Standards in this Framework

65

Standards Mapped

71%

Mapped to Course

Standard Lessons
A.1
Identify major causes of work-related accidents in offices.
A.2
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
  1. 3.7 Identifying Risks
  2. 3.8 Assessing Risk
A.3
Identify potential abuse and unethical uses of computers and networks.
  1. 3.6 Hacking Ethics
  2. 6.7 The Impact of the Internet
A.4
Explain the consequences of illegal, social, and unethical uses of information technologies, e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices.
  1. 3.5 Creative Credit & Copyright
  2. 14.5 Software Licenses
A.5
Differentiate between freeware, shareware, and public domain software copyrights.
A.6
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.
  1. 3.5 Creative Credit & Copyright
  2. 14.5 Software Licenses
A.7
Identify netiquette including the use of email, social networking, blogs, texting, and chatting.
  1. 3.2 Digital Footprint and Reputation
A.8
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information.
  1. 3.5 Creative Credit & Copyright
  2. 14.5 Software Licenses
A.9
Discuss the importance of cyber safety and the impact of cyber bullying.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 1.17 Computer Science Careers
  4. 8.1 Intro to Integrated Development Environments
  5. 9.1 Collaborative Programming
  6. 14.2 Operating Systems
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. 3.2 Digital Footprint and Reputation
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. 3.3 Privacy & Security
  2. 3.6 Hacking Ethics
  3. 3.7 Identifying Risks
  4. 3.8 Assessing Risk
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
  3. 3.5 Creative Credit & Copyright
  4. 3.6 Hacking Ethics
  5. 14.5 Software Licenses
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
  1. 3.5 Creative Credit & Copyright
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information.
  1. 3.3 Privacy & Security
  2. 14.5 Software Licenses
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. 3.3 Privacy & Security
  2. 3.7 Identifying Risks
  3. 3.8 Assessing Risk
C.8
Evaluate various solutions to common hardware and software problems.
  1. 4.3 Software
  2. 4.4 Hardware
D.1
Demonstrate creativity and innovation.
  1. 1.14 More Karel Examples and Testing
  2. 2.1 Challenge Problems
  3. 5.6 Pixel Colors!
  4. 9.2 Graphics Challenges
  5. 17.1 Project Prep and Development
D.2
Demonstrate critical thinking and problem-solving skills.
  1. 1.14 More Karel Examples and Testing
  2. 1.16 Debugging Strategies
  3. 2.1 Challenge Problems
  4. 3.8 Assessing Risk
  5. 9.1 Collaborative Programming
  6. 9.2 Graphics Challenges
  7. 11.1 Control Structures Challenges
  8. 13.1 Functions Challenges
  9. 17.1 Project Prep and Development
D.3
Demonstrate initiative and self-direction.
  1. 1.14 More Karel Examples and Testing
  2. 9.1 Collaborative Programming
  3. 17.1 Project Prep and Development
D.4
Demonstrate integrity.
  1. 9.1 Collaborative Programming
  2. 17.1 Project Prep and Development
D.5
Demonstrate work ethic.
  1. 1.14 More Karel Examples and Testing
  2. 9.1 Collaborative Programming
  3. 17.1 Project Prep and Development
D.6
Demonstrate conflict resolution skills.
  1. 9.1 Collaborative Programming
  2. 17.1 Project Prep and Development
D.7
Demonstrate listening and speaking skills.
  1. 3.8 Assessing Risk
  2. 4.7 Different Types of Cloud Computing
  3. 7.1 Project: The Effects of the Internet
  4. 9.1 Collaborative Programming
  5. 17.1 Project Prep and Development
D.8
Demonstrate respect for diversity.
  1. 1.17 Computer Science Careers
  2. 9.1 Collaborative Programming
D.9
Demonstrate customer service orientation.
D.10
Demonstrate teamwork.
  1. 9.1 Collaborative Programming
  2. 17.1 Project Prep and Development
E.1
Demonstrate global or “big picture” thinking.
  1. 7.1 Project: The Effects of the Internet
  2. 16.3 Present a Data-Driven Insight
  3. 17.1 Project Prep and Development
E.2
Demonstrate career and life management skills and goal-making.
  1. 1.17 Computer Science Careers
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
  1. 4.5 Future of Computing
  2. 6.7 The Impact of the Internet
E.4
Demonstrate time and resource management skills.
  1. 9.1 Collaborative Programming
  2. 14.6 Software Development
  3. 17.1 Project Prep and Development
E.5
Demonstrates information literacy skills.
  1. 3.4 Information Literacy
E.6
Demonstrates information security skills.
  1. 3.4 Information Literacy
  2. 3.7 Identifying Risks
  3. 3.8 Assessing Risk
E.7
Demonstrates information technology skills.
  1. 14.2 Operating Systems
  2. 14.3 Comparing Operating Systems
  3. 14.4 Software and Applications
  4. 15.1 Internal Components
  5. 15.2 Peripheral Devices
  6. 15.3 Network Devices
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. 4.3 Software
  2. 4.4 Hardware
  3. 6.1 Intro to the Internet
  4. 8.1 Intro to Integrated Development Environments
  5. 14.2 Operating Systems
E.9
Demonstrate job-specific mathematics skills.
  1. 1.17 Computer Science Careers
  2. 5.1 Intro to Digital Information
  3. 5.2 Number Systems
  4. 5.3 Encoding Text with Binary
  5. 5.5 Hexadecimal
  6. 8.5 Basic Math in JavaScript
  7. 10.2 Logical Operators
  8. 10.3 Comparison Operators
  9. 10.5 For Loops in JavaScript
  10. 10.8 Random Numbers
E.10
Demonstrates professionalism in the workplace.
  1. 1.17 Computer Science Careers
  2. 17.1 Project Prep and Development
E.11
Demonstrate reading and writing skills.
  1. 1.7 Commenting Your Code
  2. 1.17 Computer Science Careers
  3. 3.8 Assessing Risk
  4. 4.7 Different Types of Cloud Computing
  5. 7.1 Project: The Effects of the Internet
  6. 9.1 Collaborative Programming
  7. 17.1 Project Prep and Development
E.12
Demonstrates workplace safety.
F.1
Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing.
  1. 3.2 Digital Footprint and Reputation
  2. 3.3 Privacy & Security
  3. 3.5 Creative Credit & Copyright
  4. 3.6 Hacking Ethics
  5. 14.5 Software Licenses
F.2
Explain the importance of Acceptable Use Policies.
F.3
Explain the importance of data security and physical security.
  1. 3.7 Identifying Risks
  2. 3.8 Assessing Risk
F.4
Explain the concepts of confidentiality, integrity, and availability (CIA).
F.5
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.
  1. 3.3 Privacy & Security
  2. 3.4 Information Literacy
  3. 3.7 Identifying Risks
  4. 3.8 Assessing Risk
F.6
Explain the concept of encryption and how it is used on a daily basis.
F.7
Explain the social implications of constant data collection via Wi-Fi-enabled devices (Internet of Things [IoT]).
G.1
Identify and define the functional components of a computing device (input devices, output devices, processor, operating system, software applications, memory, storage, etc.)
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
  4. 4.8 Cloud Storage
  5. 14.2 Operating Systems
  6. 14.3 Comparing Operating Systems
  7. 14.4 Software and Applications
  8. 15.1 Internal Components
  9. 15.2 Peripheral Devices
  10. 15.3 Network Devices
G.2
Describe how software and hardware interact.
  1. 4.2 Computer Organization
  2. 4.3 Software
  3. 4.4 Hardware
  4. 14.4 Software and Applications
  5. 15.1 Internal Components
  6. 15.2 Peripheral Devices
G.3
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise).
  1. 14.4 Software and Applications
  2. 16.2 Visualizing and Interpreting Data
G.4
Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss).
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.9 For Loops
  3. 1.10 If Statements
  4. 1.11 If/Else Statements
  5. 1.12 While Loops in Karel
  6. 1.13 Control Structures Example
  7. 1.14 More Karel Examples and Testing
  8. 2.1 Challenge Problems
  9. 8.6 Using Graphics in JavaScript
  10. 14.6 Software Development
  11. 17.1 Project Prep and Development
H.1
Evaluate the results of Internet searches and the reliability of information found on Web sites.
  1. 3.4 Information Literacy
H.2
Describe how Web sites are used to communicate and exchange data.
  1. 6.1 Intro to the Internet
  2. 6.2 Internet Hardware
  3. 6.3 Internet Addresses
  4. 6.4 DNS
  5. 6.5 Routing
  6. 6.6 Packets and Protocols
H.3
Plan a web page considering subject, devices, audience, layout, color, links and graphics.
H.4
Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph).
H.5
Create and attach a stylesheet that includes a variety of CSS rule sets to format HTML elements used to organize web page content.
H.6
Incorporate digital media in accordance with copyright and fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
  1. 3.5 Creative Credit & Copyright
I.1
Classify application software according to its primary function (e.g., operating systems, productivity, entertainment, system).
  1. 4.3 Software
I.2
Demonstrate an understanding of algorithms and their practical applications.
  1. 1.1 Introduction to Programming With Karel
  2. 1.2 More Basic Karel
  3. 1.6 Top Down Design and Decomposition in Karel
  4. 1.11 If/Else Statements
  5. 1.13 Control Structures Example
  6. 1.14 More Karel Examples and Testing
  7. 8.2 Hello World
  8. 14.1 Programming Fundamentals
I.3
Create, evaluate, and adjust algorithms to solve a variety of problems using flowcharts and/or pseudocode.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 1.9 For Loops
  4. 1.10 If Statements
  5. 1.11 If/Else Statements
  6. 1.13 Control Structures Example
  7. 1.14 More Karel Examples and Testing
  8. 2.1 Challenge Problems
  9. 8.4 User Input
  10. 8.5 Basic Math in JavaScript
  11. 8.6 Using Graphics in JavaScript
  12. 10.2 Logical Operators
  13. 10.3 Comparison Operators
  14. 10.4 If Statements
  15. 10.5 For Loops in JavaScript
  16. 10.6 General For Loops
  17. 10.7 For Loop Practice
  18. 10.8 Random Numbers
  19. 10.9 While Loops
  20. 10.10 Loop and a Half
  21. 17.1 Project Prep and Development
I.4
Analyze and explain how a particular program functions.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 1.15 How to Indent Your Code
  4. 1.16 Debugging Strategies
  5. 9.1 Collaborative Programming
I.5
Solve problems of increasing complexity using visual block-based programming individually and collaboratively.
  1. 1.2 More Basic Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.8 Super Karel
  4. 1.9 For Loops
  5. 1.10 If Statements
  6. 1.11 If/Else Statements
  7. 1.12 While Loops in Karel
  8. 1.13 Control Structures Example
  9. 1.14 More Karel Examples and Testing
  10. 2.1 Challenge Problems
I.6
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for).
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
  6. 2.1 Challenge Problems
  7. 8.3 Variables
  8. 8.5 Basic Math in JavaScript
  9. 10.1 Booleans
  10. 10.2 Logical Operators
  11. 10.3 Comparison Operators
  12. 10.4 If Statements
  13. 10.5 For Loops in JavaScript
  14. 10.6 General For Loops
  15. 10.7 For Loop Practice
  16. 10.8 Random Numbers
  17. 10.9 While Loops
  18. 10.10 Loop and a Half
  19. 11.1 Control Structures Challenges
  20. 12.1 Functions and Parameters 1
  21. 12.2 Functions and Parameters 2
  22. 12.3 Functions and Parameters 3
  23. 12.4 Functions and Return Values 1
  24. 12.5 Functions and Return Values 2
  25. 12.6 Local Variables and Scope
  26. 13.1 Functions Challenges
  27. 21.5 Mouse Events: Mouse Clicked
I.7
Differentiate between text, numerical and Boolean variables.
  1. 8.3 Variables
  2. 8.5 Basic Math in JavaScript
  3. 10.1 Booleans
  4. 12.1 Functions and Parameters 1
  5. 12.2 Functions and Parameters 2
  6. 12.3 Functions and Parameters 3
  7. 12.4 Functions and Return Values 1
  8. 12.5 Functions and Return Values 2
I.8
Implement pattern recognition to edit, compile/run, test, and debug a program.
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Debugging Strategies
  4. 2.1 Challenge Problems
  5. 21.2 Random Circles
  6. 21.3 Random Ghosts
  7. 21.4 Bouncing Ball
  8. 21.5 Mouse Events: Mouse Clicked
J.1
Define and demonstrate how and why the binary system is used to represent data in a computer (e.g., RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.)
  1. 4.4 Hardware
  2. 5.1 Intro to Digital Information
  3. 5.2 Number Systems
  4. 5.3 Encoding Text with Binary
  5. 5.4 Pixel Images
  6. 5.5 Hexadecimal
  7. 5.6 Pixel Colors!
J.2
Describe how a picture, sound/song, and video are digitized and represented in a computer.
  1. 5.4 Pixel Images
  2. 5.6 Pixel Colors!
J.3
Analyze the importance of data security and physical security.
  1. 3.3 Privacy & Security
  2. 3.7 Identifying Risks
  3. 3.8 Assessing Risk
J.4
Evaluate the concepts of confidentiality, integrity, and availability (CIA).
J.5
Apply the concept of encryption and decryption and how it is used on a daily basis.
J.6
Collect data using various methods and transform it to make it more useful and reliable.
  1. 16.1 Getting Started with Data
  2. 16.2 Visualizing and Interpreting Data
J.7
Develop a visual representation of data that assists in making a decision or recommendation.
  1. 16.2 Visualizing and Interpreting Data
  2. 16.3 Present a Data-Driven Insight
K.1
Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
  1. 1.17 Computer Science Careers
K.2
Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges.
  1. 1.17 Computer Science Careers
K.3
Identify gender, diversity and geographic related issues in computing.
  1. 1.17 Computer Science Careers
K.4
Identify how computing is used in other career fields.
  1. 1.17 Computer Science Careers
K.5
Identify key individuals and their impact on the field of computing.
  1. 1.17 Computer Science Careers
  2. 4.1 History of Computers
L.1
Identify the role physical computing plays in the Internet of Things (IoT).
L.2
Identify and categorize physical sensors based on capability (e.g., light, sound, temperature, movement.)
  1. 4.2 Computer Organization
  2. 4.4 Hardware
L.3
Differentiate and apply inputs and outputs that are available on a physical device vs software development.
  1. 4.2 Computer Organization
  2. 4.4 Hardware
L.4
Use an API to develop code that controls a physical computing device.
L.5
Create prototypes that use a physical device to solve real-world problems.
M.1
Identify how machine learning impacts data-driven decision making.
M.2
Analyze patterns in data to determine the features that predict categorization.
M.3
Evaluate a dataset with features to illustrate how computers can learn to classify things.
M.4
Explain the importance of avoiding bias when creating machine learning models.
M.5
Contrast the unique characteristics of human learning with the ways machine learning operates.