Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Fundamentals of Computing

91

Standards in this Framework

83

Standards Mapped

91%

Mapped to Course

Standard Lessons
A.1
Identify major causes of work-related accidents in offices.
  1. 1.1 Welcome to Fundamentals of Computing!
A.2
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
  3. 1.12 Hacking Ethics
A.3
Identify potential abuse and unethical uses of computers and networks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
  3. 1.4 Digital Footprint and Reputation
  4. 1.5 Cyberbullying
  5. 1.6 Internet Safety
  6. 1.7 Privacy & Security
  7. 1.11 Creative Credit & Copyright
  8. 1.12 Hacking Ethics
  9. 5.7 The Impact of the Internet
A.4
Explain the consequences of illegal, social, and unethical uses of information technologies, e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices.
  1. 1.11 Creative Credit & Copyright
A.5
Differentiate between freeware, shareware, and public domain software copyrights.
A.6
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.
  1. 1.11 Creative Credit & Copyright
A.7
Identify netiquette including the use of email, social networking, blogs, texting, and chatting.
  1. 1.4 Digital Footprint and Reputation
  2. 1.6 Internet Safety
  3. 1.7 Privacy & Security
  4. 1.8 Information Literacy
  5. 5.7 The Impact of the Internet
A.8
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 23.1 Communication is Key!
A.9
Discuss the importance of cyber safety and the impact of cyber bullying.
  1. 1.4 Digital Footprint and Reputation
  2. 1.5 Cyberbullying
  3. 1.6 Internet Safety
  4. 1.7 Privacy & Security
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
  1. 1.1 Welcome to Fundamentals of Computing!
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
  1. 1.1 Welcome to Fundamentals of Computing!
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
  1. 1.1 Welcome to Fundamentals of Computing!
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
  1. 1.1 Welcome to Fundamentals of Computing!
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
  1. 1.1 Welcome to Fundamentals of Computing!
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.7 Commenting Your Code
  3. 4.1 Collaborative Programming
  4. 8.14 Project: Your First Website
  5. 9.1 Computer Science Careers
  6. 13.1 Intro to Design Thinking
  7. 13.2 Prototype
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. 1.4 Digital Footprint and Reputation
  2. 1.6 Internet Safety
  3. 1.7 Privacy & Security
  4. 1.8 Information Literacy
  5. 5.7 The Impact of the Internet
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
  3. 1.4 Digital Footprint and Reputation
  4. 1.5 Cyberbullying
  5. 1.6 Internet Safety
  6. 1.7 Privacy & Security
  7. 1.11 Creative Credit & Copyright
  8. 1.12 Hacking Ethics
  9. 5.7 The Impact of the Internet
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
  3. 1.4 Digital Footprint and Reputation
  4. 1.5 Cyberbullying
  5. 1.11 Creative Credit & Copyright
  6. 1.12 Hacking Ethics
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
  1. 1.11 Creative Credit & Copyright
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information.
  1. 1.3 The CIA Triad
  2. 1.7 Privacy & Security
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
  3. 1.12 Hacking Ethics
C.8
Evaluate various solutions to common hardware and software problems.
  1. 2.3 Software
  2. 2.4 Hardware
D.1
Demonstrate creativity and innovation.
  1. 1.13 Project: Public Service Announcement
  2. 3.15 More Karel Examples and Testing
  3. 4.2 Challenge Problems
  4. 7.1 Graphics Challenges
  5. 8.14 Project: Your First Website
  6. 13.1 Intro to Design Thinking
  7. 13.2 Prototype
  8. 13.3 Test
  9. 13.4 Project Prep and Development
D.2
Demonstrate critical thinking and problem-solving skills.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 3.15 More Karel Examples and Testing
  3. 3.17 Debugging Strategies
  4. 4.1 Collaborative Programming
  5. 4.2 Challenge Problems
  6. 7.1 Graphics Challenges
  7. 11.1 Control Structures Challenges
D.3
Demonstrate initiative and self-direction.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 3.15 More Karel Examples and Testing
  4. 4.1 Collaborative Programming
  5. 8.14 Project: Your First Website
  6. 13.2 Prototype
  7. 13.3 Test
  8. 13.4 Project Prep and Development
D.4
Demonstrate integrity.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 4.1 Collaborative Programming
D.5
Demonstrate work ethic.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 3.15 More Karel Examples and Testing
  4. 4.1 Collaborative Programming
  5. 8.14 Project: Your First Website
  6. 13.4 Project Prep and Development
D.6
Demonstrate conflict resolution skills.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 4.1 Collaborative Programming
  4. 13.1 Intro to Design Thinking
  5. 13.2 Prototype
  6. 13.3 Test
  7. 13.4 Project Prep and Development
D.7
Demonstrate listening and speaking skills.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 4.1 Collaborative Programming
  4. 8.14 Project: Your First Website
  5. 13.2 Prototype
  6. 13.3 Test
  7. 13.4 Project Prep and Development
D.8
Demonstrate respect for diversity.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 4.1 Collaborative Programming
  4. 9.1 Computer Science Careers
  5. 13.3 Test
  6. 13.4 Project Prep and Development
D.9
Demonstrate customer service orientation.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 23.1 Communication is Key!
D.10
Demonstrate teamwork.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 4.1 Collaborative Programming
  4. 13.2 Prototype
  5. 13.3 Test
  6. 13.4 Project Prep and Development
E.1
Demonstrate global or “big picture” thinking.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 5.7 The Impact of the Internet
E.2
Demonstrate career and life management skills and goal-making.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 9.1 Computer Science Careers
  3. 23.1 Communication is Key!
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 2.5 Future of Computing
  4. 5.7 The Impact of the Internet
E.4
Demonstrate time and resource management skills.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 4.1 Collaborative Programming
  4. 8.14 Project: Your First Website
  5. 13.1 Intro to Design Thinking
  6. 13.2 Prototype
  7. 13.3 Test
  8. 13.4 Project Prep and Development
E.5
Demonstrates information literacy skills.
  1. 1.8 Information Literacy
E.6
Demonstrates information security skills.
  1. 1.7 Privacy & Security
  2. 1.8 Information Literacy
  3. 1.10 Data Collection & Limitations
E.7
Demonstrates information technology skills.
  1. 1.7 Privacy & Security
  2. 1.8 Information Literacy
  3. 1.10 Data Collection & Limitations
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. 2.3 Software
  2. 2.4 Hardware
  3. 2.6 Computer Model
E.9
Demonstrate job-specific mathematics skills.
  1. 6.4 Basic Math in JavaScript
  2. 6.6 Using RGB to Create Colors
  3. 9.1 Computer Science Careers
  4. 10.2 Logical Operators
  5. 10.3 Comparison Operators
  6. 10.5 For Loops in JavaScript
  7. 10.8 Random Numbers
E.10
Demonstrates professionalism in the workplace.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 9.1 Computer Science Careers
  3. 23.1 Communication is Key!
E.11
Demonstrate reading and writing skills.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.13 Project: Public Service Announcement
  3. 3.7 Commenting Your Code
  4. 4.1 Collaborative Programming
  5. 8.14 Project: Your First Website
  6. 9.1 Computer Science Careers
  7. 13.2 Prototype
  8. 13.3 Test
  9. 13.4 Project Prep and Development
E.12
Demonstrates workplace safety.
  1. 1.1 Welcome to Fundamentals of Computing!
F.1
Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing.
  1. 1.7 Privacy & Security
  2. 1.10 Data Collection & Limitations
  3. 1.11 Creative Credit & Copyright
F.2
Explain the importance of Acceptable Use Policies.
  1. 1.1 Welcome to Fundamentals of Computing!
  2. 1.11 Creative Credit & Copyright
F.3
Explain the importance of data security and physical security.
  1. 1.7 Privacy & Security
F.4
Explain the concepts of confidentiality, integrity, and availability (CIA).
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
F.5
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.
  1. 1.2 What is Cybersecurity?
  2. 1.7 Privacy & Security
F.6
Explain the concept of encryption and how it is used on a daily basis.
  1. 1.2 What is Cybersecurity?
  2. 1.3 The CIA Triad
  3. 1.7 Privacy & Security
F.7
Explain the social implications of constant data collection via Wi-Fi-enabled devices (Internet of Things [IoT]).
  1. 1.2 What is Cybersecurity?
G.1
Identify and define the functional components of a computing device (input devices, output devices, processor, operating system, software applications, memory, storage, etc.)
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
G.2
Describe how software and hardware interact.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
G.3
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise).
  1. 5.7 The Impact of the Internet
G.4
Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss).
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.10 For Loops
  3. 3.11 If Statements
  4. 3.12 If/Else Statements
  5. 3.13 While Loops in Karel
  6. 3.14 Control Structures Example
  7. 3.15 More Karel Examples and Testing
  8. 4.2 Challenge Problems
  9. 6.5 Using Graphics in JavaScript
  10. 6.6 Using RGB to Create Colors
H.1
Evaluate the results of Internet searches and the reliability of information found on Web sites.
  1. 1.8 Information Literacy
H.2
Describe how Web sites are used to communicate and exchange data.
  1. 5.3 Internet Addresses
  2. 5.4 DNS
  3. 5.5 Routing
  4. 5.6 Packets and Protocols
H.3
Plan a web page considering subject, devices, audience, layout, color, links and graphics.
  1. 8.14 Project: Your First Website
H.4
Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph).
  1. 8.2 Structure of an HTML Page
  2. 8.3 Formatting Text
  3. 8.5 Images
  4. 8.6 HTML Lists
  5. 8.7 HTML Tables
  6. 8.8 HTML Styling
  7. 8.9 Introduction to CSS
  8. 8.10 CSS Select by Tag
  9. 8.11 CSS Select by Class
  10. 8.12 CSS Select by ID
  11. 8.14 Project: Your First Website
H.5
Create and attach a stylesheet that includes a variety of CSS rule sets to format HTML elements used to organize web page content.
  1. 8.9 Introduction to CSS
  2. 25.2 Multi-file Websites
H.6
Incorporate digital media in accordance with copyright and fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
  1. 1.11 Creative Credit & Copyright
  2. 25.3 Embedding iframes
I.1
Classify application software according to its primary function (e.g., operating systems, productivity, entertainment, system).
  1. 2.3 Software
I.2
Demonstrate an understanding of algorithms and their practical applications.
  1. 3.1 Introduction to Programming With Karel
  2. 3.2 More Basic Karel
  3. 3.6 Top Down Design and Decomposition in Karel
  4. 3.12 If/Else Statements
  5. 3.14 Control Structures Example
  6. 3.15 More Karel Examples and Testing
  7. 6.1 Hello World
I.3
Create, evaluate, and adjust algorithms to solve a variety of problems using flowcharts and/or pseudocode.
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.7 Commenting Your Code
  3. 3.10 For Loops
  4. 3.11 If Statements
  5. 3.12 If/Else Statements
  6. 3.14 Control Structures Example
  7. 3.15 More Karel Examples and Testing
  8. 4.2 Challenge Problems
  9. 6.3 User Input
  10. 6.4 Basic Math in JavaScript
  11. 6.5 Using Graphics in JavaScript
  12. 10.2 Logical Operators
  13. 10.3 Comparison Operators
  14. 10.4 If Statements
  15. 10.5 For Loops in JavaScript
  16. 10.6 General For Loops
  17. 10.7 For Loop Practice
  18. 10.8 Random Numbers
  19. 10.9 While Loops
  20. 10.10 Loop and a Half
I.4
Analyze and explain how a particular program functions.
  1. 3.6 Top Down Design and Decomposition in Karel
  2. 3.7 Commenting Your Code
  3. 3.16 How to Indent Your Code
  4. 3.17 Debugging Strategies
  5. 4.1 Collaborative Programming
I.5
Solve problems of increasing complexity using visual block-based programming individually and collaboratively.
  1. 3.2 More Basic Karel
  2. 3.6 Top Down Design and Decomposition in Karel
  3. 3.9 Super Karel
  4. 3.10 For Loops
  5. 3.11 If Statements
  6. 3.12 If/Else Statements
  7. 3.13 While Loops in Karel
  8. 3.14 Control Structures Example
  9. 3.15 More Karel Examples and Testing
  10. 4.2 Challenge Problems
I.6
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for).
  1. 3.10 For Loops
  2. 3.11 If Statements
  3. 3.12 If/Else Statements
  4. 3.13 While Loops in Karel
  5. 3.14 Control Structures Example
  6. 4.2 Challenge Problems
  7. 6.2 Variables
  8. 6.4 Basic Math in JavaScript
  9. 10.1 Booleans
  10. 10.2 Logical Operators
  11. 10.3 Comparison Operators
  12. 10.4 If Statements
  13. 10.5 For Loops in JavaScript
  14. 10.6 General For Loops
  15. 10.7 For Loop Practice
  16. 10.8 Random Numbers
  17. 10.9 While Loops
  18. 10.10 Loop and a Half
  19. 11.1 Control Structures Challenges
  20. 12.1 Functions and Parameters 1
  21. 12.2 Functions and Parameters 2
  22. 12.3 Functions and Parameters 3
  23. 12.4 Functions and Return Values 1
  24. 12.5 Functions and Return Values 2
  25. 12.10 Mouse Events: Mouse Clicked
  26. 24.1 Functions and Parameters 1
  27. 24.2 Functions and Parameters 2
  28. 24.3 Functions and Parameters 3
  29. 24.4 Functions and Return Values 1
  30. 24.5 Functions and Return Values 2
  31. 24.6 Local Variables and Scope
I.7
Differentiate between text, numerical and Boolean variables.
  1. 6.2 Variables
  2. 6.4 Basic Math in JavaScript
  3. 10.1 Booleans
  4. 12.1 Functions and Parameters 1
  5. 12.2 Functions and Parameters 2
  6. 12.3 Functions and Parameters 3
  7. 12.4 Functions and Return Values 1
  8. 12.5 Functions and Return Values 2
  9. 24.1 Functions and Parameters 1
  10. 24.2 Functions and Parameters 2
  11. 24.3 Functions and Parameters 3
  12. 24.4 Functions and Return Values 1
  13. 24.5 Functions and Return Values 2
I.8
Implement pattern recognition to edit, compile/run, test, and debug a program.
  1. 3.14 Control Structures Example
  2. 3.15 More Karel Examples and Testing
  3. 3.17 Debugging Strategies
  4. 4.2 Challenge Problems
  5. 12.7 Random Circles
  6. 12.8 Random Ghosts
  7. 12.9 Bouncing Ball
  8. 12.10 Mouse Events: Mouse Clicked
J.1
Define and demonstrate how and why the binary system is used to represent data in a computer (e.g., RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.)
  1. 2.4 Hardware
  2. 5.2 Internet Hardware
J.2
Describe how a picture, sound/song, and video are digitized and represented in a computer.
  1. 5.1 Intro to the Internet
  2. 5.5 Routing
  3. 5.6 Packets and Protocols
J.3
Analyze the importance of data security and physical security.
  1. 1.7 Privacy & Security
  2. 1.10 Data Collection & Limitations
  3. 1.13 Project: Public Service Announcement
J.4
Evaluate the concepts of confidentiality, integrity, and availability (CIA).
  1. 1.3 The CIA Triad
J.5
Apply the concept of encryption and decryption and how it is used on a daily basis.
  1. 1.7 Privacy & Security
  2. 1.13 Project: Public Service Announcement
J.6
Collect data using various methods and transform it to make it more useful and reliable.
  1. 1.9 Visualizing and Interpreting Data
J.7
Develop a visual representation of data that assists in making a decision or recommendation.
  1. 1.9 Visualizing and Interpreting Data
K.1
Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
  1. 9.1 Computer Science Careers
K.2
Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges.
  1. 9.1 Computer Science Careers
K.3
Identify gender, diversity and geographic related issues in computing.
  1. 1.13 Project: Public Service Announcement
  2. 5.7 The Impact of the Internet
  3. 9.1 Computer Science Careers
K.4
Identify how computing is used in other career fields.
  1. 5.7 The Impact of the Internet
  2. 9.1 Computer Science Careers
K.5
Identify key individuals and their impact on the field of computing.
  1. 2.1 History of Computers
  2. 9.1 Computer Science Careers
  3. 21.1 History of Computers
  4. 23.1 Communication is Key!
L.1
Identify the role physical computing plays in the Internet of Things (IoT).
  1. 1.2 What is Cybersecurity?
L.2
Identify and categorize physical sensors based on capability (e.g., light, sound, temperature, movement.)
  1. 1.10 Data Collection & Limitations
  2. 2.2 Computer Organization
  3. 2.4 Hardware
  4. 2.6 Computer Model
L.3
Differentiate and apply inputs and outputs that are available on a physical device vs software development.
  1. 1.10 Data Collection & Limitations
  2. 2.2 Computer Organization
  3. 2.4 Hardware
  4. 2.6 Computer Model
L.4
Use an API to develop code that controls a physical computing device.
L.5
Create prototypes that use a physical device to solve real-world problems.
M.1
Identify how machine learning impacts data-driven decision making.
M.2
Analyze patterns in data to determine the features that predict categorization.
M.3
Evaluate a dataset with features to illustrate how computers can learn to classify things.
M.4
Explain the importance of avoiding bias when creating machine learning models.
M.5
Contrast the unique characteristics of human learning with the ways machine learning operates.