Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming L1

35

Standards in this Framework

31

Standards Mapped

88%

Mapped to Course

Standard Lessons
L1.CS.D.01
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 1.9 Abstraction
  2. 5.7 JavaScript vs Karel
L1.CS.HS.01
Explain the interactions between application software, system software, and hardware layers.
  1. 13.2 Internet Hardware
L1.CS.T.01
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and resolve errors.
  1. 1.16 Debugging Strategies
L1.NI.NCO.01
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 13.2 Internet Hardware
  2. 13.3 Internet Addresses
  3. 13.4 Viewing Websites
  4. 13.5 DNS
  5. 13.6 Routing
  6. 13.7 Packets and Protocols
L1.NI.C.01
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 14.1 Introduction to Cybersecurity
  2. 14.3 Identity Crisis
  3. 14.4 Let Me In
  4. 14.5 Introduction to Networking
  5. 14.7 Network Attacks
  6. 14.8 Basic Cybersecurity Risk Concepts
  7. 14.9 Cybersecurity Risk Model-Assessing Risk
  8. 14.10 Cybersecurity Risk Model-Vulnerabilities
  9. 14.11 Cybersecurity Risk Model-Security Controls
L1.NI.C.02
Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  1. 14.1 Introduction to Cybersecurity
  2. 14.2 CIA Triad
  3. 14.3 Identity Crisis
  4. 14.4 Let Me In
  5. 14.5 Introduction to Networking
  6. 14.6 OSI model activity
  7. 14.7 Network Attacks
  8. 14.8 Basic Cybersecurity Risk Concepts
  9. 14.9 Cybersecurity Risk Model-Assessing Risk
  10. 14.10 Cybersecurity Risk Model-Vulnerabilities
  11. 14.11 Cybersecurity Risk Model-Security Controls
L1.NI.C.03
Compare various security measures, considering trade-offs between the usability and security of a computing system.
  1. 14.1 Introduction to Cybersecurity
  2. 14.2 CIA Triad
  3. 14.3 Identity Crisis
  4. 14.4 Let Me In
  5. 14.5 Introduction to Networking
  6. 14.6 OSI model activity
  7. 14.7 Network Attacks
  8. 14.8 Basic Cybersecurity Risk Concepts
  9. 14.10 Cybersecurity Risk Model-Vulnerabilities
  10. 14.11 Cybersecurity Risk Model-Security Controls
L1.NI.C.04
Explain trade-offs when selecting and implementing cybersecurity recommendations.
  1. 14.2 CIA Triad
  2. 14.6 OSI model activity
  3. 14.8 Basic Cybersecurity Risk Concepts
  4. 14.10 Cybersecurity Risk Model-Vulnerabilities
  5. 14.11 Cybersecurity Risk Model-Security Controls
L1.DA.S.01
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images.
  1. 8.3 Encoding Text with Binary
  2. 8.4 Pixel Images
  3. 8.6 Pixel Colors!
L1.DA.S.02
Evaluate the trade-offs in how data elements are organized and where data is stored.
L1.DA.CVT.01
Create interactive data representations using software tools to help others better understand real-world phenomena (e.g., paper surveys and online data sets).
  1. 16.1 Getting Started with Data
  2. 16.2 Visualizing and Interpreting Data
  3. 16.3 Data Collection & Limitations
L1.DA.IM.01
Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
  1. 16.2 Visualizing and Interpreting Data
L1.AP.A.01
Create a prototype that uses algorithms (e.g., searching, sorting, finding shortest distance) to provide a possible solution for a real-world problem relevant to the student.
  1. 7.5 Iterating Over an Array
  2. 7.6 Finding an Element in a List
  3. 7.7 Removing an Element From an Array
  4. 7.9 Simulation
  5. 37.7 Looping Over a Grid
L1.AP.A.02
Describe how artificial intelligence algorithms drive many software and physical systems.
L1.AP.V.01
Use lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
  1. 7.1 Intro to Lists/Arrays
  2. 7.2 Indexing Into an Array
L1.AP.C.01
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made.
  1. 7.1 Intro to Lists/Arrays
L1.AP.C.02
Trace the execution of loops and conditional statements, illustrating output and changes in values of named variables.
  1. 1.11 For Loops
  2. 1.12 If Statements
L1.AP.C.03
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 3.8 Mouse Events: Mouse Clicked
  2. 4.6 Key Events
L1.AP.M.01
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.7 Top Down Design and Decomposition in Karel
  2. 5.1 Functions and Parameters 1
  3. 5.2 Functions and Parameters 2
  4. 5.3 Functions and Parameters 3
  5. 5.4 Functions and Return Values 1
  6. 5.5 Functions and Return Values 2
L1.AP.M.02
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 5.1 Functions and Parameters 1
  2. 5.2 Functions and Parameters 2
  3. 5.3 Functions and Parameters 3
  4. 5.4 Functions and Return Values 1
  5. 5.5 Functions and Return Values 2
L1.AP.PD.01
Plan and develop programs by analyzing a problem and/or process, developing and documenting a solution, testing outcomes, and adapting the program for a variety of users.
  1. 21.1 Intro to Design Thinking
  2. 21.2 Prototype
  3. 21.3 Test
  4. 21.4 Project Prep and Development
L1.AP.PD.02
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 13.10 Creative Credit & Copyright
L1.AP.PD.03
Use debugging tools to identify and fix errors in a program.
  1. 1.16 Debugging Strategies
L1.AP.PD.04
Design and develop computational artifacts, working in team roles, using collaborative tools.
  1. 2.1 Practice PT: Pair-Programming Paint!
L1.AP.PD.05
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs.
  1. 1.8 Commenting Your Code
  2. 2.1 Practice PT: Pair-Programming Paint!
  3. 6.1 Project: Tell a Story
  4. 19.1 Create Performance Task
  5. 42.1 Practice PT: The Shopping List
  6. 43.1 Practice PT: Testing 1, 2, 3 ...
L1.AP.PD.06
Evaluate and refine computational artifacts to make them more usable and accessible.
  1. 21.1 Intro to Design Thinking
  2. 21.2 Prototype
  3. 21.3 Test
L1.IC.C.01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 13.9 The Impact of the Internet
  2. 32.1 The Effects of the Internet
L1.IC.C.02
Test and refine computational artifacts to reduce bias and equity deficits.
L1.IC.C.03
Demonstrate how a given algorithm applies to problems across disciplines.
  1. 12.1 Practice PT: Create an Image Filter!
  2. 31.1 Practice PT: Steganography
  3. 42.1 Practice PT: The Shopping List
  4. 43.1 Practice PT: Testing 1, 2, 3 ...
L1.IC.SI.01
Use tools and methods for collaboration.
  1. 2.1 Practice PT: Pair-Programming Paint!
L1.IC.SI.02
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
L1.IC.SLE.01
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 13.10 Creative Credit & Copyright
L1.IC.SLE.02
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  1. 14.8 Basic Cybersecurity Risk Concepts
  2. 16.3 Data Collection & Limitations
L1.IC.SLE.03
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 14.8 Basic Cybersecurity Risk Concepts
  2. 16.3 Data Collection & Limitations
  3. 32.1 The Effects of the Internet
L1.IC.SLE.04
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 13.9 The Impact of the Internet
  2. 13.10 Creative Credit & Copyright
  3. 32.1 The Effects of the Internet