Please enable JavaScript to use CodeHS

Standards Mapping

for Nebraska Computer Science and Technology

31

Standards in this Framework

31

Standards Mapped

100%

Mapped to Course

Standard Lessons
CS.HS.1.a
Interpret potential beneficial and harmful effects of computing innovations and emerging technologies, including artificial intelligence.
  1. 1.2 Personal Data and Collection
  2. 1.3 Can All Information Be Trusted?
  3. 4.9 Impact of the Internet
CS.HS.1.b
Identify and explain how hardware components and software applications meet the needs of the end user.
  1. 3.4 Software and Applications
  2. 3.7 Browser Configuration
  3. 5.2 Peripheral Devices
  4. 5.7 Network Management
CS.HS.1.c
Demonstrate effective and efficient searches.
  1. 1.3 Can All Information Be Trusted?
CS.HS.1.d
Select and use appropriate software to complete tasks in a variety of educational and professional settings.
  1. 3.4 Software and Applications
CS.HS.1.e
Identify information technologies used in various industries and potential careers in those industries.
  1. 2.1 Cryptography: Then, Now, and Future
CS.HS.2.a
Examine and evaluate cultural, social, and ethical issues associated with information technology.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Personal Data and Collection
  3. 1.4 Cyber Ethics and Laws
  4. 1.5 Personal Data Security
CS.HS.2.b
Apply digital literacy by assessing the validity, accuracy, and appropriateness of information.
  1. 1.3 Can All Information Be Trusted?
  2. 1.4 Cyber Ethics and Laws
CS.HS.2.c
Describe how algorithms may result in both intentional and unintentional bias.
  1. 1.3 Can All Information Be Trusted?
CS.HS.2.d
Investigate how applications of computing can have legal implications.
  1. 1.4 Cyber Ethics and Laws
  2. 3.5 Software Licenses
CS.HS.2.e
Evaluate safety and security measures for protecting information and managing digital footprints.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
CS.HS.3.a
Identify and describe computing hardware components.
  1. 5.1 Internal Components
  2. 5.2 Peripheral Devices
  3. 5.4 Storage Options
  4. 5.5 Network Options
CS.HS.3.b
Perform operations on digital files stored on local devices and remote/cloud storage.
  1. 3.9 Command Line Interface
CS.HS.3.c
Compare and contrast the functions, features, and limitations of different operating systems and utilities.
  1. 3.1 Operating Systems
  2. 3.2 Comparing Operating Systems
  3. 3.3 Compatibility
CS.HS.3.d
Troubleshoot computer hardware and software.
  1. 4.8 OSI Model
  2. 5.8 Methodology
CS.HS.3.e
Define components of computer networks.
  1. 4.5 IP Addresses
  2. 4.6 Routing and Packets
  3. 4.8 OSI Model
  4. 5.5 Network Options
  5. 5.6 Network Communication
CS.HS.3.f
Explain how data is sent through the Internet.
  1. 4.6 Routing and Packets
  2. 4.7 How Do Websites Work?
  3. 4.8 OSI Model
CS.HS.3.g
Interpret and draw conclusions based on a data set.
  1. 1.1 Digital Footprint and Responsibility
CS.HS.4.a
Describe cryptography, encryption, and ciphers.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
CS.HS.4.b
Identify methods to protect personal devices, information, and systems.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
  3. 3.6 Application Security
CS.HS.4.c
Compare and contrast federal, state, local, and international cybersecurity policies.
  1. 1.4 Cyber Ethics and Laws
CS.HS.5.a
Define the term algorithm and explain its relationship to computational solutions.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
CS.HS.5.b
Decompose a complex problem into distinct parts.
  1. 7.7 If Statements
  2. 7.9 Logical Operators
  3. 7.11 While Loops
  4. 8.8 If/Else Statements
  5. 8.10 Comparison Operators
  6. 8.11 While Loops
CS.HS.5.c
Identify and develop computational solutions to problems.
  1. 7.7 If Statements
  2. 7.9 Logical Operators
  3. 7.11 While Loops
  4. 8.8 If/Else Statements
  5. 8.10 Comparison Operators
  6. 8.11 While Loops
CS.HS.5.d
Define abstraction in terms of computer science and explain how it is used to manage complexity.
  1. 6.9 Abstraction
  2. 7.13 Functions
  3. 8.6 Basic Functions
CS.HS.5.e
Represent equivalent data using different encoding schemes.
  1. 4.1 Computers Speak Binary
  2. 4.2 Bits, Text, and Numbers
  3. 4.3 Encoding Images in Binary
CS.HS.6.a
Predict the result or output of code execution.
  1. 6.7 Artistic Effects
  2. 7.1 Printing in Python
  3. 7.2 Variables and Types
  4. 8.2 Variables
  5. 8.12 For Loops
CS.HS.6.b
Develop programs that use sequences of statements, variables, loops, and conditionals.
  1. 6.10 Variables
  2. 6.13 If Statements
  3. 6.15 While Loops
  4. 8.2 Variables
  5. 8.6 Basic Functions
  6. 8.8 If/Else Statements
  7. 8.11 While Loops
  8. 8.12 For Loops
CS.HS.6.c
Design and develop computational artifacts that address personally- or socially relevant concerns.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
  3. 4.4 What is the Internet?
  4. 4.9 Impact of the Internet
CS.HS.6.d
Use abstraction to manage complexity or avoid duplication of effort.
  1. 6.6 Functions
  2. 6.8 Top Down Design
  3. 7.13 Functions
  4. 8.6 Basic Functions
CS.HS.6.e
Use existing procedures within a program or language based on documentation.
  1. 6.1 Intro to Python with Tracy the Turtle
  2. 6.2 Tracy's Grid World
  3. 7.3 User Input
  4. 7.4 Mathematical Operators
  5. 7.8 Comparison Operators
  6. 7.10 Floating Point Numbers and Rounding
  7. 8.4 Basic Math
  8. 8.5 Random Numbers
CS.HS.6.f
Write documentation describing the function of computational artifacts.
  1. 6.6 Functions
  2. 7.13 Functions
  3. 8.6 Basic Functions