Please enable JavaScript to use CodeHS

New Jersey 9-12 Computer Science Standards Mapping

to

Computing Ideas (Lovelace)

26 Standards in this Framework 13 Standards Mapped 50% Mapped to Course


Standard Lessons
8.1.12.AP.1 Design algorithms to solve computational problems using a combination of original and existing algorithms.
8.1.12.AP.2 Create generalized computational solutions using collections instead of repeatedly using simple variables.
8.1.12.AP.3 Select and combine control structures for a specific application based upon performance and readability, and identify trade-offs to justify the choice.
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
8.1.12.AP.4 Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 5.1 Project: Your First Website
  2. 8.1 Project: The Effects of the Internet
  3. 10.1 Project: Public Service Announcement
  4. 14.19 Putting Together Control Structures
8.1.12.AP.5 Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 14.8 Functions
  2. 14.10 Top Down Design
  3. 14.13 Parameters
  4. 14.19 Putting Together Control Structures
8.1.12.AP.6 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
  1. 14.8 Functions
  2. 14.10 Top Down Design
  3. 14.13 Parameters
  4. 14.19 Putting Together Control Structures
8.1.12.AP.7 Collaboratively design and develop programs and artifacts for broad audiences by incorporating feedback from users.
8.1.12.AP.8 Evaluate and refine computational artifacts to make them more usable and accessible.
8.1.12.AP.9 Collaboratively document and present design decisions in the development of complex programs.
8.1.12.CS.1 Describe ways in which integrated systems hide underlying implementation details to simplify user experiences.
  1. 6.1 Intro to Digital Information
  2. 6.2 Number Systems
8.1.12.CS.2 Model interactions between application software, system software, and hardware.
  1. 2.2 Computer Organization
  2. 2.4 Hardware
8.1.12.CS.3 Compare the functions of application software, system software, and hardware.
  1. 2.3 Software
  2. 2.4 Hardware
8.1.12.CS.4 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
8.1.12.DA.1 Create interactive data visualizations using software tools to help others better understand real world phenomena, including climate change.
8.1.12.DA.2 Describe the trade-offs in how and where data is organized and stored
8.1.12.DA.3 Translate between decimal numbers and binary numbers.
  1. 6.2 Number Systems
8.1.12.DA.4 Explain the relationship between binary numbers and the storage and use of data in a computing device.
  1. 6.2 Number Systems
  2. 6.3 Encoding Text with Binary
8.1.12.DA.5 Create data visualizations from large data sets to summarize, communicate, and support different interpretations of real-world phenomena.
8.1.12.DA.6 Create and refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
8.1.12.IC.1 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 7.7 The Impact of the Internet
8.1.12.IC.2 Test and refine computational artifacts to reduce bias and equity deficits.
8.1.12.IC.3 Predict the potential impacts and implications of emerging technologies on larger social, economic, and political structures, using evidence from credible sources.
8.1.12.NI.1 Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 7.2 Internet Hardware
  2. 7.3 Internet Addresses
  3. 7.5 Routing
8.1.12.NI.2 Evaluate security measures to address various common security threats
  1. 9.4 Privacy & Security
8.1.12.NI.3 Explain how the needs of users and the sensitivity of data determine the level of security implemented
  1. 9.4 Privacy & Security
8.1.12.NI.4 Explain how decisions on methods to protect data are influenced by whether the data is at rest, in transit, or in use.