Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada Advanced Computer Science 1

59

Standards in this Framework

34

Standards Mapped

57%

Mapped to Course

Standard Lessons
1.1.1
Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law
1.1.2
Research nationally recognized CTSOs
1.1.3
Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS])
1.2.1
Discuss the purpose of parliamentary procedure
1.2.2
Demonstrate the proper use of parliamentary procedure
1.2.3
Differentiate between an office and a committee
1.2.4
Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions
1.2.5
Participate in local, regional, state, or national conferences, events, or competitions
1.2.6
Describe the importance of a constitution and bylaws to the operation of a CTSO chapter
1.3.1
Explore opportunities in community service-related work-based learning (WBL)
1.3.2
Participate in a service learning (program related) and/or community service project or activity
1.3.3
Engage with business and industry partners for community service
1.4.1
Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills)
1.4.2
Describe the appropriate professional/workplace attire and its importance
1.4.3
Investigate industry-standard credentials/certifications available within this Career Clusterâ„¢
1.4.4
Participate in authentic contextualized instructional activities
1.4.5
Demonstrate technical skills in various student organization activities/events
1.5.1
Make a connection between program standards to career pathway(s)
1.5.2
Explain the importance of participation and completion of a program of study
1.5.3
Promote community awareness of local student organizations associated with CTE programs
2.1.1
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests
  1. 18.4 Project Prep and Development
  2. 29.1 Project: Who Said It?
2.1.2
Describe how artificial intelligence drives many software and physical systems
2.1.4
Use and adapt classic algorithms to solve computational problems
  1. 7.1 Tuples
  2. 7.2 Lists
  3. 7.3 For Loops and Lists
  4. 7.4 List Methods
2.2.1
Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance, and explain the benefits and drawbacks of choices made
  1. 4.4 If Statements
  2. 4.5 Key Events
  3. 4.6 For Loops in Python
  4. 4.7 General For Loops
  5. 4.9 Random Numbers
  6. 4.10 While Loops
  7. 4.11 Loop and a Half
2.2.2
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
2.3.1
Demonstrate the use of both LinkedLists and ArrayLists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables
  1. 7.1 Tuples
  2. 7.2 Lists
  3. 7.3 For Loops and Lists
  4. 7.4 List Methods
2.3.2
Compare and contrast fundamental data structures and their uses
  1. 7.1 Tuples
  2. 7.2 Lists
  3. 34.1 2d Lists
  4. 34.4 Dictionaries
2.3.3
Implement arrays in code
  1. 7.2 Lists
  2. 34.1 2d Lists
  3. 34.2 List Comprehensions
2.3.4
Implement ArrayLists and LinkedLists in code
  1. 7.4 List Methods
2.3.5
Implement type-safe variables
  1. 3.4 Variables
2.4.1
Decompose problems into smaller components through systematic analysis using constructs such as procedures, modules, and/or objects
  1. 1.6 Top Down Design and Decomposition in Karel
2.4.2
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs
  1. 31.1 Practice PT: Testing 1, 2, 3 ...
  2. 32.1 Practice PT: The Shopping List
2.5.1
Systematically design and develop programs for broad audiences by incorporating feedback from users
  1. 18.1 Intro to Design Thinking
  2. 18.3 Test
2.5.2
Evaluate software licenses that limit or restrict the use of computational artifacts when using resources such as libraries
  1. 11.11 Creative Credit & Copyright
2.5.3
Evaluate and refine computational artifacts to make them more usable by all and accessible to people with disabilities
  1. 18.1 Intro to Design Thinking
  2. 18.3 Test
2.5.4
Design and develop computational artifacts while working in team roles and using collaborative tools
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
2.5.5
Document design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
3.1.1
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects
  1. 1.8 Abstraction
3.2.1
Compare levels of abstraction and interactions between application software, system software, and hardware layers
  1. 11.2 Internet Hardware
  2. 11.3 Internet Addresses
  3. 11.4 Viewing Websites
  4. 11.5 DNS
  5. 11.6 Routing
  6. 11.7 Packets and Protocols
3.2.2
Categorize the roles of operating system software
3.3.1
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
3.3.2
Illustrate ways computing systems implement logic, input, and output through hardware components
  1. 3.5 User Input
  2. 3.8 Mouse Events: Mouse Clicked
  3. 4.5 Key Events
4.1.1
Translate between different bit representations of real-world phenomena, such as characters, numbers, and images (e.g., convert hexadecimal colors to decimal percentages, ASCII/Unicode representation)
  1. 8.1 Intro to Digital Information
  2. 8.2 Number Systems
  3. 8.3 Encoding Text with Binary
  4. 8.5 Hexadecimal
4.1.2
Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images
  1. 8.3 Encoding Text with Binary
  2. 8.6 Pixel Colors!
  3. 8.7 Image Manipulation
4.2.1
Create interactive data visualizations or alternative representations using software tools to help others better understand real-world phenomena
  1. 13.1 Getting Started with Data
  2. 13.2 Visualizing and Interpreting Data
  3. 13.3 Data Collection & Limitations
  4. 14.1 Present a Data-Driven Insight
4.2.2
Use data analysis tools and techniques to identify patterns in data representing complex systems
  1. 13.1 Getting Started with Data
  2. 13.2 Visualizing and Interpreting Data
  3. 13.3 Data Collection & Limitations
5.1.1
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices
  1. 11.11 Creative Credit & Copyright
  2. 15.1 The Impacts of Computing
5.1.2
Test and refine computational artifacts to reduce bias and equity deficits
  1. 18.3 Test
5.1.3
Demonstrate ways a given algorithm applies to problems across disciplines
5.1.4
Explain the potential impacts of artificial intelligence on society
5.2.1
Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields
  1. 2.1 Practice PT: Pair-Programming Paint!
  2. 18.1 Intro to Design Thinking
  3. 18.2 Prototype
5.2.2
Use tools and methods for collaboration to increase the productivity of a team
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
5.3.1
Explain the beneficial and harmful effects that intellectual property laws can have on innovation
  1. 11.11 Creative Credit & Copyright
5.3.2
Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users
5.3.3
Evaluate the social and economic implications of privacy in the context of safety, law, or ethics
  1. 8.10 Cryptography
  2. 11.9 Cybersecurity
6.2.1
Illustrate how sensitive data can be affected by malware and other attacks
  1. 11.9 Cybersecurity
6.2.2
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts
  1. 11.9 Cybersecurity
6.2.3
Compare various security measures, considering tradeoffs between the usability and security of a computing system
  1. 11.9 Cybersecurity
6.2.4
Explain tradeoffs when selecting and implementing cybersecurity recommendations
  1. 11.9 Cybersecurity