Please enable JavaScript to use CodeHS

Standards Mapping

for Utah 11-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Identify types of security threats, and then compare and contrast measures that can be used to address, resolve, and/or prevent identified threats.
  1. 7.6 Application Security
  2. 7.8 System Administration
Compare and contrast cryptographic techniques to model the secure transmission of information (data).
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
Refine or create computational artifacts to better represent the relationships among different elements of data collected from factual sources or other processes.
Iteratively design and develop computational artifacts for practical, personal, or societal expression that implements an algorithm based on the result of an evaluation or user input.
Systematically design and create programs for broad audiences by incorporating feedback from users.
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 3.1 Project: Public Service Announcement
Produce documentation to support the decisions made during the design and creation process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
Evaluate and discuss the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 9.10 Impact of the Internet
Identify impacts of bias and equity deficits on design and implementation of computational artifacts, while evaluating appropriate processes for identifying issues of bias.
Demonstrate computational thinking using algorithms to problem solving across multiple disciplines.
  1. 21.1 Challenge Problems