Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada Advanced Computer Science 1

59

Standards in this Framework

32

Standards Mapped

54%

Mapped to Course

Standard Lessons
1.1.1
Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law
1.1.2
Research nationally recognized CTSOs
1.1.3
Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS])
1.2.1
Discuss the purpose of parliamentary procedure
1.2.2
Demonstrate the proper use of parliamentary procedure
1.2.3
Differentiate between an office and a committee
1.2.4
Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions
1.2.5
Participate in local, regional, state, or national conferences, events, or competitions
1.2.6
Describe the importance of a constitution and bylaws to the operation of a CTSO chapter
1.3.1
Explore opportunities in community service-related work-based learning (WBL)
1.3.2
Participate in a service learning (program related) and/or community service project or activity
1.3.3
Engage with business and industry partners for community service
1.4.1
Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills)
  1. 1.12 Project: Public Service Announcement
1.4.2
Describe the appropriate professional/workplace attire and its importance
1.4.3
Investigate industry-standard credentials/certifications available within this Career Cluster™
1.4.4
Participate in authentic contextualized instructional activities
  1. 1.12 Project: Public Service Announcement
1.4.5
Demonstrate technical skills in various student organization activities/events
1.5.1
Make a connection between program standards to career pathway(s)
  1. 11.1 Computer Science Careers
1.5.2
Explain the importance of participation and completion of a program of study
  1. 11.1 Computer Science Careers
1.5.3
Promote community awareness of local student organizations associated with CTE programs
2.1.1
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests
  1. 10.2 Prototype
  2. 10.3 Test
  3. 10.4 Project Prep and Development
2.1.2
Describe how artificial intelligence drives many software and physical systems
2.1.4
Use and adapt classic algorithms to solve computational problems
2.2.1
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made
  1. 7.10 Loop and a Half
  2. 8.1 Control Structures Challenges
2.2.2
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions
  1. 9.10 Mouse Events: Mouse Clicked
2.3.1
Demonstrate the use of both LinkedLists and ArrayLists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables
  1. 9.11 Intro to Lists/Arrays
  2. 9.12 Adding/Removing From an Array
  3. 9.13 Array Length and Looping Through Arrays
  4. 16.1 Indexing Into an Array
2.3.2
Compare and contrast fundamental data structures and their uses
  1. 9.11 Intro to Lists/Arrays
  2. 17.1 Intro to Objects/Maps
  3. 17.4 When Do I Use an Object?
2.3.3
Implement arrays in code
  1. 9.11 Intro to Lists/Arrays
  2. 16.1 Indexing Into an Array
2.3.4
Implement ArrayLists and LinkedLists in code
  1. 9.12 Adding/Removing From an Array
  2. 9.13 Array Length and Looping Through Arrays
  3. 16.1 Indexing Into an Array
2.3.5
Implement type-safe variables
2.4.1
Decompose problems into smaller components through systematic analysis using constructs such as procedures, modules, and/or objects
  1. 2.4 Functions in Karel
  2. 2.6 Top Down Design and Decomposition in Karel
  3. 9.1 Functions and Parameters 1
  4. 9.4 Functions and Return Values 1
2.4.2
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs
  1. 2.4 Functions in Karel
  2. 9.4 Functions and Return Values 1
  3. 9.6 Timers
2.5.1
Systematically design and develop programs for broad audiences by incorporating feedback from users
  1. 10.1 Intro to Design Thinking
  2. 10.2 Prototype
  3. 10.3 Test
  4. 10.4 Project Prep and Development
2.5.2
Evaluate software licenses that limit or restrict the use of computational artifacts when using resources such as libraries
  1. 1.10 Creative Credit & Copyright
2.5.3
Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities
  1. 10.3 Test
2.5.4
Design and develop computational artifacts while working in team roles and using collaborative tools
  1. 10.1 Intro to Design Thinking
  2. 10.2 Prototype
  3. 10.3 Test
  4. 10.4 Project Prep and Development
2.5.5
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs
  1. 2.7 Commenting Your Code
3.1.1
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects
  1. 2.8 Abstraction
3.2.1
Compare levels of abstraction and interactions between application software, system software, and hardware layers
3.2.2
Categorize the roles of operating system software
3.3.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors
  1. 2.17 Debugging Strategies
3.3.2
Illustrate ways computing systems implement logic, input, and output through hardware components
4.1.1
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation)
4.1.2
Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images
  1. 4.3 Internet Addresses
  2. 5.6 Using RGB to Create Colors
4.2.1
Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena
  1. 1.8 Visualizing and Interpreting Data
  2. 1.9 Data Collection & Limitations
  3. 10.4 Project Prep and Development
4.2.2
Use data analysis tools and techniques to identify patterns in data representing complex systems
  1. 1.9 Data Collection & Limitations
5.1.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices
  1. 1.3 Digital Footprint and Reputation
  2. 1.4 Cyberbullying
  3. 1.10 Creative Credit & Copyright
5.1.2
Test and refine computational artifacts to reduce bias and equity deficits
  1. 10.3 Test
5.1.3
Demonstrate ways a given algorithm applies to problems across disciplines
  1. 4.7 The Impact of the Internet
  2. 11.1 Computer Science Careers
5.1.4
Explain the potential impacts of artificial intelligence on society
5.2.1
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields
  1. 10.1 Intro to Design Thinking
  2. 10.2 Prototype
  3. 10.3 Test
  4. 10.4 Project Prep and Development
5.2.2
Use tools and methods for collaboration to increase the productivity of a team
  1. 10.1 Intro to Design Thinking
  2. 10.2 Prototype
  3. 10.3 Test
  4. 10.4 Project Prep and Development
5.3.1
Explain the beneficial and harmful effects that intellectual property laws can have on innovation
  1. 1.10 Creative Credit & Copyright
5.3.2
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users
  1. 1.6 Privacy & Security
  2. 1.10 Creative Credit & Copyright
5.3.3
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics
  1. 1.6 Privacy & Security
6.2.1
Illustrate how sensitive data can be affected by malware and other attacks
  1. 1.1 What is Cybersecurity?
  2. 1.5 Internet Safety
  3. 1.6 Privacy & Security
6.2.2
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts
6.2.3
Compare various security measures, considering tradeoffs between the usability and security of a computing system
6.2.4
Explain tradeoffs when selecting and implementing cybersecurity recommendations