Please enable JavaScript to use CodeHS

Standards Mapping

for New Jersey 9-12 Computer Science

26

Standards in this Framework

20

Standards Mapped

76%

Mapped to Course

Standard Lessons
8.1.12.AP.1
Design algorithms to solve computational problems using a combination of original and existing algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.9 Super Karel
  3. 1.16 Algorithms
8.1.12.AP.2
Create generalized computational solutions using collections instead of repeatedly using simple variables.
  1. 7.1 Tuples
  2. 7.2 Lists
  3. 7.3 For Loops and Lists
  4. 7.4 List Methods
8.1.12.AP.3
Select and combine control structures for a specific application based upon performance and readability, and identify trade-offs to justify the choice.
  1. 7.3 For Loops and Lists
8.1.12.AP.4
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 2.1 Practice PT: Pair-Programming Paint!
  2. 6.1 Practice PT: Tell a Story
  3. 9.1 Practice PT: Steganography
  4. 10.1 Practice PT: Create an Image Filter!
  5. 12.1 The Effects of the Internet
  6. 14.1 Present a Data-Driven Insight
  7. 15.1 The Impacts of Computing
  8. 16.1 Create Performance Task
8.1.12.AP.5
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 5.8 Python vs Karel
  3. 5.9 Basic Python and Graphics Challenges
8.1.12.AP.6
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 2.1 Practice PT: Pair-Programming Paint!
  2. 6.1 Practice PT: Tell a Story
  3. 9.1 Practice PT: Steganography
  4. 10.1 Practice PT: Create an Image Filter!
8.1.12.AP.7
Collaboratively design and develop programs and artifacts for broad audiences by incorporating feedback from users.
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
8.1.12.AP.8
Evaluate and refine computational artifacts to make them more usable and accessible.
8.1.12.AP.9
Collaboratively document and present design decisions in the development of complex programs.
8.1.12.CS.1
Describe ways in which integrated systems hide underlying implementation details to simplify user experiences.
  1. 5.8 Python vs Karel
8.1.12.CS.2
Model interactions between application software, system software, and hardware.
8.1.12.CS.3
Compare the functions of application software, system software, and hardware.
8.1.12.CS.4
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 1.15 Debugging Strategies
8.1.12.DA.1
Create interactive data visualizations using software tools to help others better understand real world phenomena, including climate change.
  1. 13.2 Visualizing and Interpreting Data
8.1.12.DA.2
Describe the trade-offs in how and where data is organized and stored
  1. 8.1 Intro to Digital Information
8.1.12.DA.3
Translate between decimal numbers and binary numbers.
  1. 8.2 Number Systems
8.1.12.DA.4
Explain the relationship between binary numbers and the storage and use of data in a computing device.
  1. 8.3 Encoding Text with Binary
8.1.12.DA.5
Create data visualizations from large data sets to summarize, communicate, and support different interpretations of real-world phenomena.
  1. 13.2 Visualizing and Interpreting Data
8.1.12.DA.6
Create and refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
  1. 14.1 Present a Data-Driven Insight
8.1.12.IC.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 15.1 The Impacts of Computing
8.1.12.IC.2
Test and refine computational artifacts to reduce bias and equity deficits.
8.1.12.IC.3
Predict the potential impacts and implications of emerging technologies on larger social, economic, and political structures, using evidence from credible sources.
  1. 12.1 The Effects of the Internet
  2. 15.1 The Impacts of Computing
8.1.12.NI.1
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 11.2 Internet Hardware
8.1.12.NI.2
Evaluate security measures to address various common security threats
  1. 11.9 Cybersecurity
8.1.12.NI.3
Explain how the needs of users and the sensitivity of data determine the level of security implemented
  1. 11.9 Cybersecurity
8.1.12.NI.4
Explain how decisions on methods to protect data are influenced by whether the data is at rest, in transit, or in use.