Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada 9-12 Adv

27

Standards in this Framework

11

Standards Mapped

40%

Mapped to Course

Standard Lessons
A9-12.AP.A.1
Describe how artificial intelligence drives many software and physical systems.
A9-12.AP.A.2
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
A9-12.AP.A.3
Use and adapt classic algorithms to solve computational problems.
A9-12.AP.A.4
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 3.2 Challenge Problems
A9-12.AP.V.1
Compare and contrast fundamental data structures and their uses.
  1. 9.11 Intro to Lists/Arrays
  2. 9.12 Adding/Removing From an Array
  3. 9.13 Array Length and Looping Through Arrays
  4. 9.14 Iterating Over an Array
  5. 16.1 Indexing Into an Array
  6. 16.2 Finding an Element in a List
  7. 16.3 Removing an Element From an Array
  8. 17.1 Intro to Objects/Maps
  9. 17.2 Basics of Objects
  10. 17.3 Iterating Over an Object
  11. 17.4 When Do I Use an Object?
  12. 17.5 Intro to Sets
  13. 17.6 Intro to Grids
  14. 17.7 Looping Over a Grid
  15. 17.8 Grid Example: Get a Row
A9-12.AP.C.1
Illustrate the flow of execution of a recursive algorithm.
A9-12.AP.M.1
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 2.4 Functions in Karel
  2. 9.1 Functions and Parameters 1
  3. 9.2 Functions and Parameters 2
  4. 9.3 Functions and Parameters 3
  5. 9.4 Functions and Return Values 1
  6. 9.5 Functions and Return Values 2
A9-12.AP.M.2
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
A9-12.AP.M.3
Demonstrate code reuse by creating programming solutions using libraries and APIs.
A9-12.AP.PD.1
Plan and develop programs for broad audiences using a software life cycle process.
A9-12.AP.PD.2
Explain security issues that might lead to compromised computer programs.
  1. 1.6 Privacy & Security
A9-12.AP.PD.3
Develop programs for multiple computing platforms.
A9-12.AP.PD.4
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
A9-12.AP.PD.5
Develop and use a series of test cases to verify that a program performs according to its design specifications.
A9-12.AP.PD.6
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
A9-12.AP.PD.7
Evaluate key qualities of a program through a process such as a code review.
A9-12.CS.HS.1
Categorize the roles of operating system software.
A9-12.CS.T.1
Illustrate ways computing systems implement logic, input, and output through hardware components.
A9-12.DA.CVT.1
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
A9-12.DA.CVT.2
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 1.9 Data Collection & Limitations
A9-12.DA.IM.1
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. 1.9 Data Collection & Limitations
A9-12.IC.C.1
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 4.7 The Impact of the Internet
A9-12.IC.C.2
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 4.7 The Impact of the Internet
A9-12.IC.C.3
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 4.7 The Impact of the Internet
A9-12.IC.SLE.1
Debate laws and regulations that impact the development and use of software.
A9-12.NI.NCO.1
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
A9-12.NI.C.1
Compare ways software developers protect devices and information from unauthorized access.
  1. 1.6 Privacy & Security