Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada Computer Science and Applications

64

Standards in this Framework

42

Standards Mapped

65%

Mapped to Course

Standard Lessons
6-8.AP.A.1
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.6 Organizational Techniques
9-12.AP.A.1
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
6-8.AP.PD.2
Incorporate existing code, media, and libraries into original programs, and give attribution.
6-8.AP.PD.4
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 3.1 Project: Public Service Announcement
9-12.AP.PD.2
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
  3. 10.10 Creative Credit & Copyright
9-12.AP.PD.4
Design and develop computational artifacts working in team roles using collaborative tools.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
6-8.AP.V.1
Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
6-8.AP.C.1
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
9-12.AP.C.1
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made.
9-12.AP.C.2
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
6-8.AP.M.2
Create procedures with parameters to organize code and make it easier to reuse.
9-12.AP.M.1
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
6-8.CS.HS.1
Design and evaluate projects that combine hardware and software components to collect and exchange data.
9-12.CS.HS.1
Compare levels of abstraction and interactions between application software, system software, and hardware layers.
  1. 7.1 Operating Systems
  2. 10.2 Notational Systems
  3. 11.1 Internal Components
6-8.CS.D.1
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices, noting that advantages may have disadvantages and unintended consequences.
9-12.CS.D.1
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 7.1 Operating Systems
  2. 10.2 Notational Systems
  3. 11.1 Internal Components
9-12.CS.T.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
9-12.DA.S.1
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation).
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
9-12.DA.S.2
Evaluate the tradeoffs in how data elements are organized and where data is stored.
  1. 2.4 Privacy & Security
  2. 8.5 Clients and Servers
  3. 11.4 Storage Options
6-8.DA.CVT.1
Collect data using computational tools and transform the data to make it more meaningful and useful.
9-12.DA.CVT.1
Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena.
6-8.IC.C.1
Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  1. 10.11 Impact of the Internet
6-8.IC.C.2
Discuss and evaluate issues of bias and accessibility in the design of existing technologies.
  1. 10.11 Impact of the Internet
9-12.IC.C.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 1.2 What is Cybersecurity?
  2. 2.1 Digital Footprint and Reputation
  3. 2.6 Creative Credit & Copyright
  4. 7.5 Software Licenses
  5. 10.10 Creative Credit & Copyright
  6. 10.11 Impact of the Internet
9-12.IC.C.2
Test and refine computational artifacts to reduce bias and equity deficits.
9-12.IC.SI.1
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  1. 3.1 Project: Public Service Announcement
6-8.IC.SLE.1
Identify risks associated with sharing information digitally (e.g., phishing, identity theft, hacking).
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 8.9 Common Security Problems
9-12.IC.SLE.2
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  1. 2.4 Privacy & Security
  2. 7.7 Browser Configuration
9-12.IC.SLE.3
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
6-8.NI.C.1
Explain how physical and digital security measures protect electronic information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 8.11 Types of SQLi and Prevention
  6. 11.6 Network Communication
  7. 11.7 Network Management
9-12.NI.C.1
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.3 Internet Safety
  4. 2.4 Privacy & Security
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
9-12.NI.NCO.1
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 10.1 Introduction to the Internet
  2. 10.4 Internet Hardware and Sending Information
  3. 10.5 Internet Addresses
  4. 10.6 Domain Name System (DNS)
  5. 10.7 Routing
  6. 10.8 Packets & Protocols
  7. 10.9 Viewing a Webpage
  8. 11.3 Network Devices
9-12.EL.A.1
Actively assimilate and revise personal and career goals, select and manage current and emerging technologies to achieve them, and reflect on their successes and areas of improvement in working toward their goals.
9-12.EL.B.1
Consistently engage in online social networks as a means to access and promote lifelong learning in collaboration with global peers.
  1. 3.1 Project: Public Service Announcement
9-12.EL.C.1
Regularly revise their work habits and attitudes based on feedback from others and from functionalities embedded in digital tools to improve their learning process, and they select or creatively use technologies to share their learning in ways that are useful to others.
  1. 3.1 Project: Public Service Announcement
9-12.EL.D.1
Successfully use a variety of existing technologies to develop criteria and identify new digital tools and resources from emerging technologies to accomplish a defined task with fluency and ease.
9-12.DC.A.1
Analyze their digital identities and reputations within school policy to consider social media's impact on society, including demonstrating an understanding of how digital actions may have positive or negative implications for their future.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 10.11 Impact of the Internet
9-12.DC.B.1
Demonstrate and advocate for positive, safe, legal, and ethical habits when using technology and when interacting with others online.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.4 Privacy & Security
  5. 2.6 Creative Credit & Copyright
  6. 2.7 Hacking Ethics
  7. 10.10 Creative Credit & Copyright
9-12.DC.B.2
Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.
  1. 1.3 Impact of Cybersecurity
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.7 Hacking Ethics
  5. 7.7 Browser Configuration
9-12.DC.C.1
Advocate and demonstrate a respect for intellectual property with both print and digital media—including copyright, permission and fair use—by creating a variety of media products that include appropriate citation and attribution elements.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 3.1 Project: Public Service Announcement
  4. 10.10 Creative Credit & Copyright
9-12.DC.D.1
Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work.
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 7.6 Application Security
  5. 8.4 Databases
  6. 8.5 Clients and Servers
  7. 11.6 Network Communication
9-12.KC.A.1
Plan and employ effective research strategies to locate information and other resources for their intellectual or creative pursuits.
  1. 2.5 Information Literacy
  2. 3.1 Project: Public Service Announcement
9-12.KC.B.1
Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources in the school and career setting.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 10.10 Creative Credit & Copyright
9-12.KC.C.1
Curate information from digital resources, including online databases and catalogs, for research using a variety of tools and methods to create collections of artifacts that support their learning and career goals.
  1. 3.1 Project: Public Service Announcement
9-12.KC.D.1
Explore real-world issues and problems through inquiry and analysis, develop ideas, actively create solutions for them, and evaluate and revise through the use of digital tools.
  1. 3.1 Project: Public Service Announcement
  2. 9.1 Project: Security Assessment Report
9-12.ID.A.1
Engage in a design process and employ it to inquire and analyze, generate ideas, create innovative products or solve authentic problems, and evaluate the process to revise if needed.
9-12.ID.B.1
Creatively use digital tools to support a design process and expand their understanding to identify constraints, trade-offs, and to weigh risks.
9-12.ID.C.1
Engage in a cyclical design process to inquire and analyze, develop ideas, test, and revise prototypes, presenting finished products and best practices learned during the development.
9-12.ID.D.1
Demonstrate an ability to persevere and handle greater ambiguity as they work to solve open-ended problems.
  1. 3.1 Project: Public Service Announcement
  2. 9.1 Project: Security Assessment Report
  3. 12.2 Support Practice
9-12.CT.A.1
Define complex issues, create a plan, and select appropriate technology-assisted methods such as data analysis, abstract models, and algorithmic thinking in exploring and finding solutions.
  1. 3.1 Project: Public Service Announcement
  2. 12.2 Support Practice
9-12.CT.B.1
Evaluate created or given data sets, use digital tools to analyze them, and represent data in various ways to facilitate problem-solving and decision-making.
  1. 3.1 Project: Public Service Announcement
9-12.CT.B.2
Evaluate and justify the formats for reporting results to a variety of audiences.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
9-12.CT.C.1
Collaborate to break problems into component parts, identify key pieces, and use that information to problem-solve.
9-12.CT.C.2
Use 3D design tools to create prototypes, models, and simulations to demonstrate solutions and ideas.
9-12.CT.D.1
Collaborate to develop an automated process by using algorithmic thinking to develop a sequence of steps to create and test automated solutions.
9-12.CC.A.1
Use digital learning tools and resources to identify communication needs considering goals, audience, content, access to tools or devices, and timing of communication, to involve teams in diverse locales for effective communication.
  1. 3.1 Project: Public Service Announcement
9-12.CC.B.1
Create an original work using multiple digital tools, including planning, research, editing, and production.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
9-12.CC.C.1
Create digital graphic visualizations, data driven models, and simulations to succinctly communicate complex ideas and problems; justify methods and tools used.
  1. 3.1 Project: Public Service Announcement
9-12.CC.D.1
Publish or present content designed for specific audiences using online meeting tools to asynchronous and synchronous audiences.
9-12.GC.A.1
Use digital tools to interact with others to develop a richer understanding of different perspectives and cultures; publish electronic artifacts that communicate to a culturally diverse and global community.
9-12.GC.B.1
Use collaborative technologies (live and recorded) to connect with global stakeholders including peers, not excluding other languages, experts, and community members, to learn about issues and problems or to gain a broader perspective; develop multiple viewpoints that may be electronically published and accessible to all audiences.
9-12.GC.C.1
Learn project management roles on a team to meet goals, based on their knowledge of technology and content, as well as personal preference; goals in project, timelines and milestones, will be monitored with tools and shared globally.
9-12.GC.D.1
Select and justify the effective collaborative technologies (live video conference, online forums, social media and other emerging communication methods) to investigate, develop, and publish solutions related to local and global issues.
  1. 3.1 Project: Public Service Announcement
9-12.GC.D.2
Understand that digital tools such as blogs and social media can be used to crowd source, crowd fund, and mobilize a community toward a goal.
  1. 10.11 Impact of the Internet