Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Fundamentals of Computing (Outdated)

84

Standards in this Framework

28

Standards Mapped

33%

Mapped to Course

Standard Lessons
A.1
Review school safety policies and procedures.
A.2
Review classroom safety rules and procedures.
A.3
Review safety procedures for using equipment in the classroom.
A.4
Identify major causes of work-related accidents in office environments.
A.5
Demonstrate safety skills in an office/work environment.
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 3.5 Collaborative Programming
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use.
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information.
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
C.8
Evaluate various solutions to common hardware and software problems.
D.1
Demonstrate punctuality.
D.2
Demonstrate self-representation.
  1. 3.5 Collaborative Programming
D.3
Demonstrate work ethic.
  1. 1.15 More Karel Examples and Testing
  2. 3.5 Collaborative Programming
D.4
Demonstrate respect.
  1. 3.5 Collaborative Programming
D.5
Demonstrate time management.
  1. 3.5 Collaborative Programming
D.6
Demonstrate integrity.
  1. 3.5 Collaborative Programming
D.7
Demonstrate leadership.
  1. 3.5 Collaborative Programming
D.8
Demonstrate teamwork and collaboration.
  1. 3.5 Collaborative Programming
D.9
Demonstrate conflict resolution.
  1. 3.5 Collaborative Programming
D.10
Demonstrate perseverance.
  1. 1.15 More Karel Examples and Testing
  2. 2.1 Challenge Problems
  3. 3.5 Collaborative Programming
D.11
Demonstrate commitment.
  1. 3.5 Collaborative Programming
D.12
Demonstrate a healthy view of competition.
D.13
Demonstrate a global perspective.
D.14
Demonstrate health and fitness.
D.15
Demonstrate self-direction.
  1. 1.15 More Karel Examples and Testing
  2. 3.5 Collaborative Programming
D.16
Demonstrate lifelong learning
E.1
Demonstrate effective speaking and listening skills.
  1. 3.5 Collaborative Programming
E.2
Demonstrate effective reading and writing skills.
  1. 1.7 Commenting Your Code
  2. 3.5 Collaborative Programming
E.3
Demonstrate mathematical reasoning.
  1. 1.15 More Karel Examples and Testing
  2. 3.4 Basic Math
E.4
Demonstrate job-specific mathematics skills.
  1. 3.4 Basic Math
E.5
Demonstrate critical-thinking and problem-solving skills.
  1. 1.15 More Karel Examples and Testing
  2. 2.1 Challenge Problems
  3. 3.5 Collaborative Programming
E.6
Demonstrate creativity and resourcefulness.
  1. 1.15 More Karel Examples and Testing
  2. 2.1 Challenge Problems
E.7
Demonstrate an understanding of business ethics.
E.8
Demonstrate confidentiality.
E.9
Demonstrate an understanding of workplace structures, organizations, systems, and climates.
E.10
Demonstrate diversity awareness.
E.11
Demonstrate job acquisition and advancement skills.
E.12
Demonstrate task management skills.
E.13
Demonstrate customer-service skills
F.1
Define key computing terms (e.g. hardware, software, data, etc.).
F.2
Identify key individuals and their impact on the field of computing.
F.3
Discuss the progression of computing and explain its impact on society (e.g. hardware, programming languages, applications, Internet, emerging technologies, etc.).
F.4
Explain Moore’s Law.
G.1
Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.).
G.2
Understand the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.).
G.3
Describe how software and hardware interact.
G.4
Discuss how and why binary is used to represent data in a computer.
G.5
Describe how a picture, sound/song, and video are digitized and represented in a computer.
G.6
Compare and contrast operating systems (e.g., Mac, Windows, Linux, ChromeOS, iOS, Android).
G.7
Evaluate hardware and software configuration to meet situational and budgetary requirements (e.g. gaming, Internet browsing, student, graphic designer, etc.).
G.8
Make hardware and software recommendations to improve a computer system.
H.1
Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise).
H.2
Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss).
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.9 For Loops
  3. 1.10 If Statements and Conditionals
  4. 1.11 If/Else Statements
  5. 1.12 While Loops
  6. 1.14 Control Structures Example
  7. 1.15 More Karel Examples and Testing
  8. 2.1 Challenge Problems
H.3
Define algorithm (a set of clearly defined, logical steps to solve a problem).
  1. 1.1 Introduction to Programming With Karel
  2. 1.2 More About Karel
  3. 1.6 Top Down Design and Decomposition in Karel
  4. 3.1 Hello World
H.4
Demonstrate an understanding of algorithms and their practical applications.
  1. 1.11 If/Else Statements
  2. 1.14 Control Structures Example
  3. 1.15 More Karel Examples and Testing
  4. 3.1 Hello World
H.5
Create, evaluate, and adjust algorithms to solve a variety of problems.
  1. 1.9 For Loops
  2. 1.10 If Statements and Conditionals
  3. 1.11 If/Else Statements
  4. 1.14 Control Structures Example
  5. 1.15 More Karel Examples and Testing
  6. 2.1 Challenge Problems
  7. 3.3 User Input
  8. 3.4 Basic Math
  9. 3.6 Random Numbers
  10. 6.2 If/Else Statements
  11. 6.3 Logical Operators
  12. 6.4 Comparison Operators
  13. 6.6 While Loops
  14. 6.7 The Break Statement
  15. 6.9 For Loops
I.1
Express the design of a program using representations such as flowcharts and pseudocode.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
I.2
Analyze and explain how a particular program functions.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
I.3
Solve problems of increasing complexity using visual block-based programming individually and collaboratively.
  1. 1.9 For Loops
  2. 1.10 If Statements and Conditionals
  3. 1.11 If/Else Statements
  4. 1.12 While Loops
  5. 1.14 Control Structures Example
  6. 1.15 More Karel Examples and Testing
  7. 2.1 Challenge Problems
I.4
Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for).
  1. 1.9 For Loops
  2. 1.10 If Statements and Conditionals
  3. 1.11 If/Else Statements
  4. 1.12 While Loops
  5. 1.14 Control Structures Example
  6. 2.1 Challenge Problems
  7. 3.2 Variables
  8. 3.4 Basic Math
  9. 3.6 Random Numbers
  10. 6.1 Booleans
  11. 6.2 If/Else Statements
  12. 6.3 Logical Operators
  13. 6.4 Comparison Operators
  14. 6.6 While Loops
  15. 6.7 The Break Statement
  16. 6.9 For Loops
  17. 10.4 Mouse Click Events
I.5
Differentiate between text and numerical data.
  1. 3.2 Variables
  2. 3.4 Basic Math
I.6
Edit, compile/run, test, and debug a program.
  1. 1.14 Control Structures Example
  2. 1.15 More Karel Examples and Testing
  3. 2.1 Challenge Problems
  4. 10.2 Stopping Timers
  5. 10.3 Collisions
  6. 10.4 Mouse Click Events
  7. 24.3 Animation Practice
J.1
Evaluate the results of Internet searches and the reliability of information found on Web sites.
J.2
Describe how Web sites are used to communicate and exchange data.
J.3
Plan a web page considering subject, devices, audience, layout, color, links and graphics.
J.4
Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph) and CSS styles.
K.1
Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing.
K.2
Explain the importance of Acceptable Use Policies.
K.3
Explain the importance of data security and physical security.
K.4
Explain the concepts of confidentiality, integrity, and availability (CIA).
K.5
Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.
K.6
Explain the concept of encryption and how it is used on a daily basis.
L.1
Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
L.2
Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges.
L.3
Identify gender, diversity and geographic related issues in computing.
L.4
Describe how computing enhances other career fields.