Please enable JavaScript to use CodeHS

Nevada 9-12 Adv Standards Mapping

to

Foundations of Computer Science

Clear
27 Standards in this Framework 11 Standards Mapped 40% Mapped to Course


Standard Lessons
A9-12.AP.A.1 Describe how artificial intelligence drives many software and physical systems.
A9-12.AP.A.2 Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
A9-12.AP.A.3 Use and adapt classic algorithms to solve computational problems.
A9-12.AP.A.4 Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 3.2 Challenge Problems
A9-12.AP.V.1 Compare and contrast fundamental data structures and their uses.
  1. 9.11 Intro to Lists/Arrays
  2. 9.12 Adding/Removing From an Array
  3. 9.13 Array Length and Looping Through Arrays
  4. 9.14 Iterating Over an Array
  5. 16.1 Indexing Into an Array
  6. 16.2 Finding an Element in a List
  7. 16.3 Removing an Element From an Array
  8. 17.1 Intro to Objects/Maps
  9. 17.2 Basics of Objects
  10. 17.3 Iterating Over an Object
  11. 17.4 When Do I Use an Object?
  12. 17.5 Intro to Sets
  13. 17.6 Intro to Grids
  14. 17.7 Looping Over a Grid
  15. 17.8 Grid Example: Get a Row
A9-12.AP.C.1 Illustrate the flow of execution of a recursive algorithm.
A9-12.AP.M.1 Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 2.4 Functions in Karel
  2. 9.1 Functions and Parameters 1
  3. 9.2 Functions and Parameters 2
  4. 9.3 Functions and Parameters 3
  5. 9.4 Functions and Return Values 1
  6. 9.5 Functions and Return Values 2
A9-12.AP.M.2 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
A9-12.AP.M.3 Demonstrate code reuse by creating programming solutions using libraries and APIs.
A9-12.AP.PD.1 Plan and develop programs for broad audiences using a software life cycle process.
A9-12.AP.PD.2 Explain security issues that might lead to compromised computer programs.
  1. 1.6 Privacy & Security
A9-12.AP.PD.3 Develop programs for multiple computing platforms.
A9-12.AP.PD.4 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
A9-12.AP.PD.5 Develop and use a series of test cases to verify that a program performs according to its design specifications.
A9-12.AP.PD.6 Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
A9-12.AP.PD.7 Evaluate key qualities of a program through a process such as a code review.
A9-12.CS.HS.1 Categorize the roles of operating system software.
A9-12.CS.T.1 Illustrate ways computing systems implement logic, input, and output through hardware components.
A9-12.DA.CVT.1 Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
A9-12.DA.CVT.2 Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 1.9 Data Collection & Limitations
A9-12.DA.IM.1 Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. 1.9 Data Collection & Limitations
A9-12.IC.C.1 Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 4.7 The Impact of the Internet
A9-12.IC.C.2 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 4.7 The Impact of the Internet
A9-12.IC.C.3 Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 4.7 The Impact of the Internet
A9-12.IC.SLE.1 Debate laws and regulations that impact the development and use of software.
A9-12.NI.NCO.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
A9-12.NI.C.1 Compare ways software developers protect devices and information from unauthorized access.
  1. 1.6 Privacy & Security