Please enable JavaScript to use CodeHS

Standards Mapping

for Alabama 9-12

46

Standards in this Framework

43

Standards Mapped

93%

Mapped to Course

Standard Lessons
R1
R1) Identify, demonstrate, and apply personal safe use of digital devices.
  1. Computing Ideas (Lovelace)
  2. 9.1 Digital Footprint and Reputation
  3. 9.3 Internet Safety
  4. 9.4 Privacy & Security
  5. Introduction to Cybersecurity (Vigenere)
  6. 2.1 Digital Footprint and Reputation
  7. 2.3 Internet Safety
  8. 2.4 Privacy & Security
  9. Foundations of Computer Science
  10. 1.3 Digital Footprint and Reputation
  11. 1.5 Internet Safety
  12. 1.6 Privacy & Security
  13. Fundamentals of Cybersecurity (2020)
  14. 2.1 Digital Footprint and Reputation
  15. 2.3 Internet Safety
  16. 2.4 Privacy & Security
  17. 7.6 Application Security
R2
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
  1. Computing Ideas (Lovelace)
  2. 9.1 Digital Footprint and Reputation
  3. 9.3 Internet Safety
  4. 9.4 Privacy & Security
  5. Introduction to Cybersecurity (Vigenere)
  6. 2.1 Digital Footprint and Reputation
  7. 2.3 Internet Safety
  8. 2.4 Privacy & Security
  9. Foundations of Computer Science
  10. 1.3 Digital Footprint and Reputation
  11. 1.5 Internet Safety
  12. 1.6 Privacy & Security
  13. Fundamentals of Cybersecurity (2020)
  14. 2.1 Digital Footprint and Reputation
  15. 2.3 Internet Safety
  16. 2.4 Privacy & Security
  17. 7.6 Application Security
R3
R3) Assess the validity and identify the purpose of digital content.
  1. Computing Ideas (Lovelace)
  2. 9.6 Creative Credit & Copyright
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.6 Creative Credit & Copyright
  5. Foundations of Computer Science
  6. 1.10 Creative Credit & Copyright
  7. Fundamentals of Cybersecurity (2020)
  8. 2.6 Creative Credit & Copyright
  9. AP Computer Science Principles in JavaScript
  10. 11.11 Creative Credit & Copyright
R4
R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. Computing Ideas (Lovelace)
  2. 2.4 Hardware
  3. 7.2 Internet Hardware
  4. Introduction to Cybersecurity (Vigenere)
  5. 7.2 Internet Hardware and Sending Information
  6. Foundations of Computer Science
  7. 4.2 Internet Hardware
  8. Fundamentals of Cybersecurity (2020)
  9. 9.4 Internet Hardware and Sending Information
  10. 11.1 Methodology
  11. 11.2 Support Practice
  12. AP Computer Science Principles in JavaScript
  13. 11.2 Internet Hardware
R5
R5) Locate and curate information from digital sources to answer research questions.
  1. Computing Ideas (Lovelace)
  2. 9.5 Information Literacy
  3. 9.6 Creative Credit & Copyright
  4. Introduction to Cybersecurity (Vigenere)
  5. 2.5 Information Literacy
  6. 2.6 Creative Credit & Copyright
  7. Foundations of Computer Science
  8. 1.7 Information Literacy
  9. 1.10 Creative Credit & Copyright
  10. Fundamentals of Cybersecurity (2020)
  11. 2.5 Information Literacy
  12. 2.6 Creative Credit & Copyright
  13. AP Computer Science Principles in JavaScript
  14. 11.11 Creative Credit & Copyright
R6
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
  1. Computing Ideas (Lovelace)
  2. 5.1 Project: Your First Website
  3. 8.1 Project: The Effects of the Internet
  4. 10.1 Project: Public Service Announcement
  5. Introduction to Cybersecurity (Vigenere)
  6. 3.1 Project: Public Service Announcement
  7. 5.1 Project: Classic Cipher Newscast
  8. 8.1 Project: Secure the Company's Network
  9. 14.15 Your First Website
  10. Foundations of Computer Science
  11. 1.12 Project: Public Service Announcement
  12. Fundamentals of Cybersecurity (2020)
  13. 3.1 Project: Public Service Announcement
  14. 6.1 Project: Classic Cipher Newscast
  15. 14.1 Project: Security Assessment Report
  16. 19.15 Your First Website
  17. AP Computer Science Principles in JavaScript
  18. 2.1 Practice PT: Pair-Programming Paint!
  19. 6.1 Project: Tell a Story
  20. 9.1 Practice PT: Steganography
  21. 10.1 Practice PT: Create an Image Filter!
  22. 12.1 The Effects of the Internet
  23. 14.1 Present a Data-Driven Insight
1
Decompose problems into component parts, extract key information, and develop descriptive models to understand the levels of abstractions in complex systems.
  1. Computing Ideas (Lovelace)
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 13.10 Top Down Design
  4. Foundations of Computer Science
  5. 2.6 Top Down Design and Decomposition in Karel
  6. 2.8 Abstraction
  7. AP Computer Science Principles in JavaScript
  8. 1.7 Top Down Design and Decomposition in Karel
  9. 1.9 Abstraction
2
Explain how computing systems are often integrated with other systems and embedded in ways that may not be apparent to the user. Examples: Millions of lines of code control the subsystems within an automobile (e.g., antilock braking systems, lane detection, and self-parking).
  1. Foundations of Computer Science
  2. 2.8 Abstraction
  3. AP Computer Science Principles in JavaScript
  4. 1.9 Abstraction
3
Differentiate between a generalized expression of an algorithm in pseudocode and its concrete implementation in a programming language. a. Explain that some algorithms do not lead to exact solutions in a reasonable amount of time and thus approximations are acceptable. b. Compare and contrast the difference between specific control structures such as sequential statements, conditional, iteration, and explain the benefits and drawbacks of choices made. Examples: Tradeoffs involving implementation, readability, and program performance. c. Distinguish when a problem solution requires decisions to be made among alternatives, such as selection constructs, or when a solution needs to be iteratively processed to arrive at a result, such as iterative “loop” constructs or recursion. d. Evaluate and select algorithms based on performance, reusability, and ease of implementation. e. Explain how more than one algorithm may solve the same problem and yet be characterized with different priorities. Examples: All self-driving cars have a common goal of taking a passenger to a designation but may have different priorities such as safety, speed, or conservation; web search engines have their own algorithms for search with their own priorities.
  1. Computing Ideas (Lovelace)
  2. 1.13 Control Structures Example
  3. 1.14 More Karel Examples and Testing
  4. 1.16 Karel Challenges
  5. 13.10 Top Down Design
  6. Foundations of Computer Science
  7. 2.6 Top Down Design and Decomposition in Karel
  8. 2.15 More Karel Examples and Testing
  9. 3.2 Challenge Problems
  10. Fundamentals of Cybersecurity (2020)
  11. 4.1 Programming Concepts
  12. 4.2 Programming with Karel
  13. 4.3 Looping
  14. 4.4 Branching
  15. 4.5 Arrays and Objects
  16. 21.1 Challenge Problems
  17. AP Computer Science Principles in JavaScript
  18. 1.15 Control Structures Example
  19. 1.17 Karel Algorithms
  20. 1.20 Karel Challenges
4
Use and adapt classic algorithms to solve computational problems. Examples: Sorting, searching, shortest path, and data compression.
  1. Foundations of Computer Science
  2. 9.13 Array Length and Looping Through Arrays
  3. 16.2 Finding an Element in a List
  4. AP Computer Science Principles in JavaScript
  5. 3.6 Basic Math in JavaScript
  6. 7.6 Finding an Element in a List
  7. 8.8 Data Compression
5
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using current events.
  1. Computing Ideas (Lovelace)
  2. 8.1 Project: The Effects of the Internet
  3. 10.1 Project: Public Service Announcement
  4. 13.19 Putting Together Control Structures
  5. Introduction to Cybersecurity (Vigenere)
  6. 3.1 Project: Public Service Announcement
  7. Foundations of Computer Science
  8. 1.12 Project: Public Service Announcement
  9. Fundamentals of Cybersecurity (2020)
  10. 3.1 Project: Public Service Announcement
  11. AP Computer Science Principles in JavaScript
  12. 12.1 The Effects of the Internet
  13. 14.1 Present a Data-Driven Insight
  14. 18.4 Project Prep and Development
6
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects, with parameters, and which return a result.
  1. Computing Ideas (Lovelace)
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.13 Control Structures Example
  4. 1.16 Karel Challenges
  5. 13.8 Functions
  6. 13.10 Top Down Design
  7. 13.13 Parameters
  8. Foundations of Computer Science
  9. 9.1 Functions and Parameters 1
  10. 9.2 Functions and Parameters 2
  11. 9.3 Functions and Parameters 3
  12. 9.4 Functions and Return Values 1
  13. 9.5 Functions and Return Values 2
  14. AP Computer Science Principles in JavaScript
  15. 1.7 Top Down Design and Decomposition in Karel
  16. 1.15 Control Structures Example
  17. 1.20 Karel Challenges
  18. 3.7 Using Graphics in JavaScript
  19. 5.1 Functions and Parameters 1
  20. 5.4 Functions and Return Values 1
7
Compare and contrast fundamental data structures and their uses. Examples: Strings, lists, arrays, stacks, queues.
  1. Foundations of Computer Science
  2. 9.11 Intro to Lists/Arrays
  3. 17.1 Intro to Objects/Maps
  4. 17.5 Intro to Sets
  5. 17.6 Intro to Grids
  6. Fundamentals of Cybersecurity (2020)
  7. 4.5 Arrays and Objects
  8. AP Computer Science Principles in JavaScript
  9. 7.1 Intro to Lists/Arrays
8
Demonstrate code reuse by creating programming solutions using libraries and Application Programming Interfaces.
  1. Computing Ideas (Lovelace)
  2. 1.8 Super Karel
  3. Foundations of Computer Science
  4. 5.4 Basic Math in JavaScript
  5. 5.5 Using Graphics in JavaScript
  6. AP Computer Science Principles in JavaScript
  7. 1.10 Super Karel
  8. 1.19 Ultra Karel
  9. 3.6 Basic Math in JavaScript
  10. 4.9 Random Numbers
  11. 5.7 JavaScript vs Karel
9
Demonstrate the ability to verify the correctness of a program. a. Develop and use a series of test cases to verify that a program performs according to its design specifications. b. Collaborate in a code review process to identify correctness, efficiency, scalability and readability of program code.
  1. Computing Ideas (Lovelace)
  2. 13.19 Putting Together Control Structures
  3. Foundations of Computer Science
  4. 3.1 Collaborative Programming
  5. AP Computer Science Principles in JavaScript
  6. 11.8 Sequential, Parallel & Distributed Computing
  7. 18.3 Test
10
Resolve or debug errors encountered during testing using iterative design process. Examples: Test for infinite loops, check for bad input, check edge-cases.
  1. Computing Ideas (Lovelace)
  2. 13.18 While Loops
  3. Foundations of Computer Science
  4. 2.15 More Karel Examples and Testing
  5. 2.17 Debugging Strategies
  6. AP Computer Science Principles in JavaScript
  7. 1.16 Debugging Strategies
11
Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world. a. Recognize user tracking methods and hazards. Examples: Cookies, WiFi packet sniffing. b. Understand how to apply techniques to mitigate effects of user tracking methods. c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities. d. Explain the relationship between online privacy and personal security. Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information. e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors. Examples: Cyberbullying/harassment, inappropriate sexual communications. f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.
  1. Computing Ideas (Lovelace)
  2. 9.2 Cyberbullying
  3. 9.3 Internet Safety
  4. 9.4 Privacy & Security
  5. Introduction to Cybersecurity (Vigenere)
  6. 2.2 Cyberbullying
  7. 2.3 Internet Safety
  8. 2.4 Privacy & Security
  9. Foundations of Computer Science
  10. 1.4 Cyberbullying
  11. 1.5 Internet Safety
  12. 1.6 Privacy & Security
  13. Fundamentals of Cybersecurity (2020)
  14. 2.2 Cyberbullying
  15. 2.3 Internet Safety
  16. 2.4 Privacy & Security
  17. 7.6 Application Security
  18. 7.7 Browser Configuration
  19. 7.8 System Administration
  20. AP Computer Science Principles in JavaScript
  21. 11.9 Cybersecurity
12
Describe how sensitive data can be affected by malware and other attacks.
  1. Computing Ideas (Lovelace)
  2. 15.3 Impact of Cybersecurity
  3. Introduction to Cybersecurity (Vigenere)
  4. 1.3 Impact of Cybersecurity
  5. 6.9 Common Security Problems
  6. Fundamentals of Cybersecurity (2020)
  7. 1.3 Impact of Cybersecurity
  8. 7.6 Application Security
  9. 7.7 Browser Configuration
  10. 8.9 Common Security Problems
13
Compare various security measures of a computer system. EExamples: Usability, security, portability, and scalability.
  1. Introduction to Cybersecurity (Vigenere)
  2. 6.9 Common Security Problems
  3. 7.9 Network Attacks
  4. Fundamentals of Cybersecurity (2020)
  5. 7.6 Application Security
  6. 8.9 Common Security Problems
14
Compare ways to protect devices, software, and data.
  1. Introduction to Cybersecurity (Vigenere)
  2. 6.9 Common Security Problems
  3. 7.9 Network Attacks
  4. 7.10 Network Administration
  5. 8.1 Project: Secure the Company's Network
  6. Fundamentals of Cybersecurity (2020)
  7. 7.6 Application Security
  8. 7.7 Browser Configuration
  9. 7.8 System Administration
  10. 8.9 Common Security Problems
15
Explain the necessity for the school’s Acceptable Use Policy.
  1. Computing Ideas (Lovelace)
  2. 9.6 Creative Credit & Copyright
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.6 Creative Credit & Copyright
  5. Foundations of Computer Science
  6. 1.10 Creative Credit & Copyright
  7. Fundamentals of Cybersecurity (2020)
  8. 2.6 Creative Credit & Copyright
  9. 7.5 Software Licenses
  10. AP Computer Science Principles in JavaScript
  11. 11.11 Creative Credit & Copyright
16
Identify laws regarding the use of technology and their consequences and implications. Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.
  1. Computing Ideas (Lovelace)
  2. 9.6 Creative Credit & Copyright
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.6 Creative Credit & Copyright
  5. 2.7 Hacking Ethics
  6. Foundations of Computer Science
  7. 1.10 Creative Credit & Copyright
  8. 1.11 Hacking Ethics
  9. Fundamentals of Cybersecurity (2020)
  10. 2.6 Creative Credit & Copyright
  11. 2.7 Hacking Ethics
  12. AP Computer Science Principles in JavaScript
  13. 11.11 Creative Credit & Copyright
17
Discuss the ethical ramifications of malicious hacking and its impact on society. Examples: Dissemination of privileged information, ransomware.
  1. Computing Ideas (Lovelace)
  2. 15.3 Impact of Cybersecurity
  3. Introduction to Cybersecurity (Vigenere)
  4. 1.3 Impact of Cybersecurity
  5. 2.7 Hacking Ethics
  6. Foundations of Computer Science
  7. 1.11 Hacking Ethics
  8. Fundamentals of Cybersecurity (2020)
  9. 1.3 Impact of Cybersecurity
  10. 2.7 Hacking Ethics
  11. AP Computer Science Principles in JavaScript
  12. 11.9 Cybersecurity
18
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. Computing Ideas (Lovelace)
  2. 9.6 Creative Credit & Copyright
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.6 Creative Credit & Copyright
  5. Foundations of Computer Science
  6. 1.10 Creative Credit & Copyright
  7. Fundamentals of Cybersecurity (2020)
  8. 2.6 Creative Credit & Copyright
  9. AP Computer Science Principles in JavaScript
  10. 11.11 Creative Credit & Copyright
19
Prove that digital identity is a reflection of persistent, publicly available artifacts.
  1. Computing Ideas (Lovelace)
  2. 9.1 Digital Footprint and Reputation
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.1 Digital Footprint and Reputation
  5. Foundations of Computer Science
  6. 1.3 Digital Footprint and Reputation
  7. Fundamentals of Cybersecurity (2020)
  8. 2.1 Digital Footprint and Reputation
20
Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.
  1. Computing Ideas (Lovelace)
  2. 9.1 Digital Footprint and Reputation
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.1 Digital Footprint and Reputation
  5. Foundations of Computer Science
  6. 1.3 Digital Footprint and Reputation
  7. Fundamentals of Cybersecurity (2020)
  8. 2.1 Digital Footprint and Reputation
21
Explain how technology facilitates the disruption of traditional institutions and services. Examples: Digital currencies, ridesharing, autonomous vehicles, retail, Internet of Things.
  1. Computing Ideas (Lovelace)
  2. 15.3 Impact of Cybersecurity
  3. Introduction to Cybersecurity (Vigenere)
  4. 1.3 Impact of Cybersecurity
  5. 11.1 What is Currency?
  6. Fundamentals of Cybersecurity (2020)
  7. 1.3 Impact of Cybersecurity
  8. 16.1 What is Currency?
22
Research the impact of computing technology on possible career pathways. Examples: Government, business, medicine, entertainment, education, transportation.
  1. Computing Ideas (Lovelace)
  2. 7.7 The Impact of the Internet
  3. 15.3 Impact of Cybersecurity
  4. Introduction to Cybersecurity (Vigenere)
  5. 1.3 Impact of Cybersecurity
  6. 7.8 Impact of the Internet
  7. Foundations of Computer Science
  8. 4.7 The Impact of the Internet
  9. Fundamentals of Cybersecurity (2020)
  10. 1.3 Impact of Cybersecurity
  11. 9.10 Impact of the Internet
  12. AP Computer Science Principles in JavaScript
  13. 11.10 The Impact of the Internet
23
Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres. Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.
  1. Computing Ideas (Lovelace)
  2. 7.7 The Impact of the Internet
  3. Introduction to Cybersecurity (Vigenere)
  4. 7.8 Impact of the Internet
  5. Fundamentals of Cybersecurity (2020)
  6. 9.10 Impact of the Internet
  7. AP Computer Science Principles in JavaScript
  8. 11.10 The Impact of the Internet
24
Compare and contrast Internet publishing platforms, including suitability for media types, target audience, and feedback mechanism. a. Apply version control capabilities within a digital tool to understand the importance of managing historical changes across suggestions made by a collaborative team.
  1. AP Computer Science Principles in JavaScript
  2. 18.4 Project Prep and Development
25
Utilize a variety of digital tools to create digital artifacts across content areas.
  1. AP Computer Science Principles in JavaScript
  2. 18.4 Project Prep and Development
26
Use collaborative technologies to work with others including peers, experts, or community members to examine local, national, and global issues and problems from multiple viewpoints.
  1. AP Computer Science Principles in JavaScript
  2. 2.1 Practice PT: Pair-Programming Paint!
  3. 18.4 Project Prep and Development
27
Apply tools and methods for collaboration on a project to increase connectivity among people in different cultures and career fields. Examples: Collaborative documents, webinars, teleconferencing, and virtual fieldtrips
28
Develop a model that reflects the methods, procedures and concepts used by computing devices in translating digital bits as real-world phenomena, such as print characters, sound, images, and video.
  1. Computing Ideas (Lovelace)
  2. 6.1 Intro to Digital Information
  3. Fundamentals of Cybersecurity (2020)
  4. 9.2 Notational Systems
  5. 9.3 Data Representation
  6. AP Computer Science Principles in JavaScript
  7. 8.1 Intro to Digital Information
29
Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.
  1. AP Computer Science Principles in JavaScript
  2. 8.8 Data Compression
  3. 8.9 Lossy Compression
30
Evaluate the tradeoffs involved in choosing methods for the organization of data elements and the location of data storage, including the advantages and disadvantages of networked computing. Examples: Client server, peer-to-peer, cloud computing.
  1. Fundamentals of Cybersecurity (2020)
  2. 10.4 Storage Options
31
Create interactive data visualizations using software tools to help others understand real-world phenomena.
  1. Foundations of Computer Science
  2. 1.8 Visualizing and Interpreting Data
  3. 1.9 Data Collection & Limitations
  4. Fundamentals of Cybersecurity (2020)
  5. 8.3 The Value of Data
  6. AP Computer Science Principles in JavaScript
  7. 13.2 Visualizing and Interpreting Data
  8. 13.3 Data Collection & Limitations
  9. 14.1 Present a Data-Driven Insight
32
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. Foundations of Computer Science
  2. 1.8 Visualizing and Interpreting Data
  3. 1.9 Data Collection & Limitations
  4. Fundamentals of Cybersecurity (2020)
  5. 8.3 The Value of Data
  6. AP Computer Science Principles in JavaScript
  7. 13.2 Visualizing and Interpreting Data
  8. 13.3 Data Collection & Limitations
  9. 14.1 Present a Data-Driven Insight
33
Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, packets, or addressing, as well as the issues that impact network functionality. Examples: Bandwidth, load, delay. a. Explain the purpose of Internet Protocol addresses and how domain names are resolved to IP addresses through a Domain Name System server. b. Understand the need for networking protocols and examples of common protocols. Examples: HTTP, SMTP, and FTP
  1. Computing Ideas (Lovelace)
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
  6. Introduction to Cybersecurity (Vigenere)
  7. 7.3 Internet Addresses
  8. 7.4 Domain Name System (DNS)
  9. 7.5 Routing
  10. 7.6 Packets & Protocols
  11. Foundations of Computer Science
  12. 4.3 Internet Addresses
  13. 4.4 DNS
  14. 4.5 Routing
  15. 4.6 Packets and Protocols
  16. Fundamentals of Cybersecurity (2020)
  17. 9.5 Internet Addresses
  18. 9.6 Domain Name System (DNS)
  19. 9.7 Routing
  20. 9.8 Packets & Protocols
  21. 10.5 Network Options
  22. AP Computer Science Principles in JavaScript
  23. 11.3 Internet Addresses
  24. 11.5 DNS
  25. 11.7 Packets and Protocols
34
Categorize the roles of operating system software.
  1. Computing Ideas (Lovelace)
  2. 2.2 Computer Organization
  3. 2.3 Software
  4. Fundamentals of Cybersecurity (2020)
  5. 7.1 Operating Systems
35
Appraise the role of artificial intelligence in guiding software and physical systems. Examples: predictive modeling, self-driving cars.
36
Explain the tradeoffs when selecting and implementing cybersecurity recommendations. Examples: Two-factor authentication, password requirements, geolocation requirements.
  1. Computing Ideas (Lovelace)
  2. 9.4 Privacy & Security
  3. Introduction to Cybersecurity (Vigenere)
  4. 2.4 Privacy & Security
  5. Foundations of Computer Science
  6. 1.6 Privacy & Security
  7. Fundamentals of Cybersecurity (2020)
  8. 2.4 Privacy & Security
  9. 7.6 Application Security
  10. 7.7 Browser Configuration
  11. 7.8 System Administration
  12. AP Computer Science Principles in JavaScript
  13. 11.9 Cybersecurity
37
Evaluate the ability of models and simulations to test and support the refinement of hypotheses. a. Create and utilize models and simulations to help formulate, test, and refine a hypothesis. b. Form a model of a hypothesis, testing the hypothesis by the collection and analysis of data generated by simulations. Examples: Science lab, robotics lab, manufacturing, space exploration. c. Explore situations where a flawed model provided an incorrect answer.
  1. AP Computer Science Principles in JavaScript
  2. 7.8 Simulation
38
Systematically design and develop programs for broad audiences by incorporating feedback from users. Examples: Games, utilities, mobile applications.
  1. AP Computer Science Principles in JavaScript
  2. 18.3 Test
39
Identify a problem that cannot be solved by either humans or machines alone and discuss a solution for it by decomposing the task into sub-problems suited for a human or machine to accomplish. Examples: Forecasting weather, piloting airplanes.
40
Use an iterative design process, including learning from mistakes, to gain a better understanding of a problem domain.
  1. Foundations of Computer Science
  2. 3.1 Collaborative Programming
  3. AP Computer Science Principles in JavaScript
  4. 18.4 Project Prep and Development