Please enable JavaScript to use CodeHS

Standards Mapping

for New Jersey 9-12 Computer Science

26

Standards in this Framework

26

Standards Mapped

100%

Mapped to Course

Standard Lessons
8.1.12.AP.1
Design algorithms to solve computational problems using a combination of original and existing algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.9 Super Karel
  3. 1.16 Karel Algorithms
8.1.12.AP.2
Create generalized computational solutions using collections instead of repeatedly using simple variables.
  1. 6.1 Intro to Lists/Arrays
  2. 6.2 Indexing Into an Array
  3. 6.3 Adding/Removing From an Array
  4. 6.4 Array Length and Looping Through Arrays
  5. 6.5 Iterating Over an Array
  6. 6.6 Finding an Element in a List
  7. 6.7 Removing an Element From an Array
8.1.12.AP.3
Select and combine control structures for a specific application based upon performance and readability, and identify trade-offs to justify the choice.
  1. 6.6 Finding an Element in a List
8.1.12.AP.4
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 5.1 Project: Tell a Story
  2. 11.1 Present a Data-Driven Insight
8.1.12.AP.5
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 4.7 JavaScript vs Karel
  3. 4.8 Basic JavaScript and Graphics Challenges
8.1.12.AP.6
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 5.1 Project: Tell a Story
8.1.12.AP.7
Collaboratively design and develop programs and artifacts for broad audiences by incorporating feedback from users.
  1. 12.1 Intro to Design Thinking
  2. 12.3 Prototype
  3. 12.4 Test
  4. 12.5 Project Prep and Development
8.1.12.AP.8
Evaluate and refine computational artifacts to make them more usable and accessible.
  1. 12.2 Empathy
8.1.12.AP.9
Collaboratively document and present design decisions in the development of complex programs.
  1. 12.5 Project Prep and Development
8.1.12.CS.1
Describe ways in which integrated systems hide underlying implementation details to simplify user experiences.
  1. 4.7 JavaScript vs Karel
8.1.12.CS.2
Model interactions between application software, system software, and hardware.
  1. 8.2 Software and Applications
8.1.12.CS.3
Compare the functions of application software, system software, and hardware.
  1. 8.1 Operating Systems
  2. 8.2 Software and Applications
8.1.12.CS.4
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 1.15 Debugging Strategies
8.1.12.DA.1
Create interactive data visualizations using software tools to help others better understand real world phenomena, including climate change.
  1. 10.2 Visualizing and Interpreting Data
8.1.12.DA.2
Describe the trade-offs in how and where data is organized and stored
  1. 7.1 Intro to Digital Information
8.1.12.DA.3
Translate between decimal numbers and binary numbers.
  1. 7.2 Number Systems
8.1.12.DA.4
Explain the relationship between binary numbers and the storage and use of data in a computing device.
  1. 7.3 Encoding Text with Binary
8.1.12.DA.5
Create data visualizations from large data sets to summarize, communicate, and support different interpretations of real-world phenomena.
  1. 10.2 Visualizing and Interpreting Data
8.1.12.DA.6
Create and refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
  1. 11.1 Present a Data-Driven Insight
8.1.12.IC.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 9.1 The Effects of the Internet
8.1.12.IC.2
Test and refine computational artifacts to reduce bias and equity deficits.
  1. 12.2 Empathy
8.1.12.IC.3
Predict the potential impacts and implications of emerging technologies on larger social, economic, and political structures, using evidence from credible sources.
  1. 9.1 The Effects of the Internet
8.1.12.NI.1
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 8.4 Internet Hardware
8.1.12.NI.2
Evaluate security measures to address various common security threats
  1. 8.10 Cybersecurity
8.1.12.NI.3
Explain how the needs of users and the sensitivity of data determine the level of security implemented
  1. 8.10 Cybersecurity
8.1.12.NI.4
Explain how decisions on methods to protect data are influenced by whether the data is at rest, in transit, or in use.
  1. 8.10 Cybersecurity