Please enable JavaScript to use CodeHS

Standards Mapping

for New Jersey 9-12 Computer Science


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Design algorithms to solve computational problems using a combination of original and existing algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.9 Super Karel
  3. 1.16 Karel Algorithms
Create generalized computational solutions using collections instead of repeatedly using simple variables.
  1. 6.1 Intro to Lists/Arrays
  2. 6.2 Indexing Into an Array
  3. 6.3 Adding/Removing From an Array
  4. 6.4 Array Length and Looping Through Arrays
  5. 6.5 Iterating Over an Array
  6. 6.6 Finding an Element in a List
  7. 6.7 Removing an Element From an Array
Select and combine control structures for a specific application based upon performance and readability, and identify trade-offs to justify the choice.
  1. 6.6 Finding an Element in a List
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 5.1 Project: Tell a Story
  2. 11.1 Present a Data-Driven Insight
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 4.7 JavaScript vs Karel
  3. 4.8 Basic JavaScript and Graphics Challenges
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 5.1 Project: Tell a Story
Collaboratively design and develop programs and artifacts for broad audiences by incorporating feedback from users.
  1. 12.1 Intro to Design Thinking
  2. 12.3 Prototype
  3. 12.4 Test
  4. 12.5 Project Prep and Development
Evaluate and refine computational artifacts to make them more usable and accessible.
  1. 12.2 Empathy
Collaboratively document and present design decisions in the development of complex programs.
  1. 12.5 Project Prep and Development
Describe ways in which integrated systems hide underlying implementation details to simplify user experiences.
  1. 4.7 JavaScript vs Karel
Model interactions between application software, system software, and hardware.
  1. 8.2 Software and Applications
Compare the functions of application software, system software, and hardware.
  1. 8.1 Operating Systems
  2. 8.2 Software and Applications
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 1.15 Debugging Strategies
Create interactive data visualizations using software tools to help others better understand real world phenomena, including climate change.
  1. 10.2 Visualizing and Interpreting Data
Describe the trade-offs in how and where data is organized and stored
  1. 7.1 Intro to Digital Information
Translate between decimal numbers and binary numbers.
  1. 7.2 Number Systems
Explain the relationship between binary numbers and the storage and use of data in a computing device.
  1. 7.3 Encoding Text with Binary
Create data visualizations from large data sets to summarize, communicate, and support different interpretations of real-world phenomena.
  1. 10.2 Visualizing and Interpreting Data
Create and refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
  1. 11.1 Present a Data-Driven Insight
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 9.1 The Effects of the Internet
Test and refine computational artifacts to reduce bias and equity deficits.
  1. 12.2 Empathy
Predict the potential impacts and implications of emerging technologies on larger social, economic, and political structures, using evidence from credible sources.
  1. 9.1 The Effects of the Internet
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 8.4 Internet Hardware
Evaluate security measures to address various common security threats
  1. 8.10 Cybersecurity
Explain how the needs of users and the sensitivity of data determine the level of security implemented
  1. 8.10 Cybersecurity
Explain how decisions on methods to protect data are influenced by whether the data is at rest, in transit, or in use.
  1. 8.10 Cybersecurity