Please enable JavaScript to use CodeHS

Standards Framework

for Arkansas KeyCode

41

Standards in this Framework

Standard Description
1.1.1 Discuss Career and Technical Student Organizations (CTSO) such as FBLA and DECA.
1.1.2 Investigate CTSO competitive events and identify sources to help prepare for success in competitive events. (If you have an active middle level chapter).
1.1.3 Understand the importance of professional dress and evaluate appropriate dress for CTSO conferences.
1.2.1 Identify effective communication skills by comparing personal vs. business communication. (e.g., text messages, emails).
1.2.2 Comprehend and explain the importance of punctuality and attendance.
1.2.3 Identify traits important to success. (e.g., initiative, positive attitude, enthusiasm, self-confidence).
1.2.4 Discuss integrity and ethical leadership.
1.2.5 Identify and practice fundamental etiquette skills. (e.g., introductions, handshakes, and eye contact)
1.2.6 Participate in soft skill evaluations.
1.3.1 Compare and contrast positive and negative social media presence.
1.3.2 Critique one’s own digital presence.
2.1.1 Practice proper care of computer equipment. (e.g., headphones, mouse, keyboard, etc.).
2.1.2 Demonstrate and maintain proper use of computer equipment.
2.1.3 Identify computer hardware and software. (e.g., peripherals, computer and audio settings, etc.).
2.2.1 Establish effective file and password management. (e.g., Cloud Storage, Networks, etc.).
2.2.2 Access a gradebook program to develop accountability.
3.1.1 Demonstrate the proper techniques necessary for operation of the keyboard (e.g., seating, body posture, finger placement, etc.).
3.1.2 Demonstrate correct touch typing techniques and spacing rules (e.g., punctuation marks, one space after a period, etc.).
3.1.3 Key documents while applying proper keyboarding techniques.
3.2.1 Understand proper 10-key techniques using numeric keypad on a keyboard.
3.2.2 Identify careers utilizing the 10-key techniques.
4.1.1 Determine and utilize the proper text formatting features. (e.g., font type, font style, color and case).
4.1.2 Utilize paragraph formatting functions. (e.g., line spacing, tabs, paragraph spacing, and columns).
4.1.3 Apply page formatting features. (e.g., borders, numbering, bullets, etc.).
4.2.1 Key business documents using appropriate formatting guidelines. (e.g., memo, email, letters, reports).
4.2.2 Edit documents using appropriate proofreaders’ marks.
4.2.3 Key documents from handwritten samples.
5.1.1 Examine traditional programming algorithms, including searches and sorts.
5.1.2 Describe the steps needed to efficiently solve a problem.
5.1.3 Manually test algorithms with simple data to observe accuracy of anticipated output.
5.1.4 Demonstrate appropriate collaborative behaviors (e.g., integrating feedback, providing useful feedback, understanding and accepting multiple perspectives) when solving problems
5.2.1 Apply strategies to protect personal digital footprints (e.g., game profiles, shares on social media, other online accounts) and the responsibilities and opportunities of living, learning, and working in a digitally connected world
5.2.2 Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity, and how to apply digital and physical methods for protecting and securing personal information
5.3.1 Explain the logic involved in how a computer program executes (e.g., flow charts, program flow)
5.3.2 Discuss and apply best practices of backend program design (e.g., comments, documentation, whitespace)
5.3.3 Test a computer program with data and evaluate output for accuracy
5.3.4 Find and debug errors in a computer program
5.4.1 Implement the following programming concepts: data types, variables creation, variable assignment, conditional branching (e.g., if, if-else, multi-branch), iteration (e.g., for, while), functions
5.4.2 Create a program using a text-based programming language.
5.5.1 Identify major components and functions of computer systems (e.g., hardware, software) and networks (e.g., network components, wired, wireless) and recommend methods to secure computer systems and networks.
5.6.1 Research diverse careers and career opportunities that are influence by computer science and the technical and soft skills needed for each.