Please enable JavaScript to use CodeHS

Standards Framework

for Nevada Advanced Computer Science 1

59

Standards in this Framework

Standard Description
1.1.1 Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law
1.1.2 Research nationally recognized CTSOs
1.1.3 Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS])
1.2.1 Discuss the purpose of parliamentary procedure
1.2.2 Demonstrate the proper use of parliamentary procedure
1.2.3 Differentiate between an office and a committee
1.2.4 Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions
1.2.5 Participate in local, regional, state, or national conferences, events, or competitions
1.2.6 Describe the importance of a constitution and bylaws to the operation of a CTSO chapter
1.3.1 Explore opportunities in community service-related work-based learning (WBL)
1.3.2 Participate in a service learning (program related) and/or community service project or activity
1.3.3 Engage with business and industry partners for community service
1.4.1 Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills)
1.4.2 Describe the appropriate professional/workplace attire and its importance
1.4.3 Investigate industry-standard credentials/certifications available within this Career Cluster™
1.4.4 Participate in authentic contextualized instructional activities
1.4.5 Demonstrate technical skills in various student organization activities/events
1.5.1 Make a connection between program standards to career pathway(s)
1.5.2 Explain the importance of participation and completion of a program of study
1.5.3 Promote community awareness of local student organizations associated with CTE programs
2.1.1 Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests
2.1.2 Describe how artificial intelligence drives many software and physical systems
2.1.4 Use and adapt classic algorithms to solve computational problems
2.2.1 Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made
2.2.2 Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions
2.3.1 Demonstrate the use of both LinkedLists and ArrayLists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables
2.3.2 Compare and contrast fundamental data structures and their uses
2.3.3 Implement arrays in code
2.3.4 Implement ArrayLists and LinkedLists in code
2.3.5 Implement type-safe variables
2.4.1 Decompose problems into smaller components through systematic analysis using constructs such as procedures, modules, and/or objects
2.4.2 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs
2.5.1 Systematically design and develop programs for broad audiences by incorporating feedback from users
2.5.2 Evaluate software licenses that limit or restrict the use of computational artifacts when using resources such as libraries
2.5.3 Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities
2.5.4 Design and develop computational artifacts while working in team roles and using collaborative tools
2.5.5 Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs
3.1.1 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects
3.2.1 Compare levels of abstraction and interactions between application software, system software, and hardware layers
3.2.2 Categorize the roles of operating system software
3.3.1 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors
3.3.2 Illustrate ways computing systems implement logic, input, and output through hardware components
4.1.1 Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation)
4.1.2 Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images
4.2.1 Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena
4.2.2 Use data analysis tools and techniques to identify patterns in data representing complex systems
5.1.1 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices
5.1.2 Test and refine computational artifacts to reduce bias and equity deficits
5.1.3 Demonstrate ways a given algorithm applies to problems across disciplines
5.1.4 Explain the potential impacts of artificial intelligence on society
5.2.1 Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields
5.2.2 Use tools and methods for collaboration to increase the productivity of a team
5.3.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation
5.3.2 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users
5.3.3 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics
6.2.1 Illustrate how sensitive data can be affected by malware and other attacks
6.2.2 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts
6.2.3 Compare various security measures, considering tradeoffs between the usability and security of a computing system
6.2.4 Explain tradeoffs when selecting and implementing cybersecurity recommendations