CS.1.1.2 |
Describe how artificial intelligence drives many software and physical systems |
-
18.1 Magpie Lab
|
CS.1.1.3 |
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem |
-
18.1 Magpie Lab
|
CS.1.1.4 |
Use and adapt classic algorithms to solve computational problems |
-
9.2 Linear Search
-
9.3 Binary Search
-
9.4 Selection Sort
-
9.5 Insertion Sort
-
9.7 Mergesort
|
CS.1.1.5 |
Develop classic algorithms in code to solve computational problems |
-
9.2 Linear Search
-
9.3 Binary Search
-
9.4 Selection Sort
-
9.5 Insertion Sort
-
9.7 Mergesort
|
CS.1.2.2 |
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions |
-
10.4 Activity 4: Extending the Celebrity Class
-
14.1 Quiz Creation
-
20.4 Create a Negative or Positive Review
|
CS.1.3.3 |
Implement arrays in code |
-
7.2 Introduction to Arrays
-
7.3 Using Arrays
-
7.4 Enhanced For Loops
|
CS.1.3.4 |
Implement ArrayLists and LinkedLists in code |
-
7.5 ArrayList Methods
-
7.6 Arrays vs ArrayLists
-
7.8 The List Interface
|
CS.1.4.3 |
Construct solutions to problems using student-created components, such as procedures, modules and/or objects |
-
5.1 Java Methods
-
5.2 Methods and Parameters
-
5.3 Methods and Return Values
-
6.4 Writing Classes
-
6.6 Getter and Setter Methods
-
8.4 Activity 4: Hiding and Revealing a Text Message
-
12.1 Pokemon Simulation
-
13.1 Mad Libs
-
20.3 Autogenerated Review
-
20.4 Create a Negative or Positive Review
|
CS.1.4.4 |
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution |
-
8.2 Activity 2: Hiding and Revealing a Picture
-
8.4 Activity 4: Hiding and Revealing a Text Message
-
9.6 Advanced: Recursion
|
CS.1.4.5 |
Demonstrate code reuse by creating programming solutions using libraries and APIs |
-
3.8 Super Karel
-
17.1 Elevens
-
18.1 Magpie Lab
-
19.1 Picture Lab
|
CS.1.5.6 |
Plan and develop programs for broad audiences using a software life cycle process |
-
11.5 Presenting your Innovation
|
CS.1.5.7 |
Explain security issues that might lead to compromised computer programs |
-
1.6 Application Security
-
1.7 Browser Configuration
|
CS.1.5.8 |
Develop programs for multiple computing platforms |
-
11.6 Challenge: Take your Innovation Off CodeHS
|
CS.1.5.9 |
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project |
-
10.1 Activity 1: Introduction to Celebrity
-
10.2 Activity 2: The Celebrity Class: A Simple Version
-
10.3 Activity 3: Putting it All Together
-
10.4 Activity 4: Extending the Celebrity Class
|
CS.1.5.10 |
Develop and use a series of test cases to verify that a program performs according to its design specifications |
-
3.14 More Karel Examples and Testing
|
CS.1.5.11 |
Modify an existing program to add additional functionality and discuss intended and unintended implications, e.g., breaking other functionality |
-
18.1 Magpie Lab
-
19.1 Picture Lab
|
CS.2.2.2 |
Categorize the roles of operating system software |
-
1.1 Operating Systems
-
1.2 Comparing Operating Systems
-
1.3 Compatibility
|
CS.2.3.2 |
Illustrate ways computing systems implement logic, input, and output through hardware components |
-
2.2 Notational Systems
|
CS.3.1.3 |
Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images |
-
2.2 Notational Systems
-
2.3 Data Representation
-
7.12 Binary
-
8.1 Activity 1: Exploring Color
-
8.2 Activity 2: Hiding and Revealing a Picture
-
8.3 Activity 3: Identifying a Hidden Picture
-
8.4 Activity 4: Hiding and Revealing a Text Message
|
CS.4.1.5 |
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society |
-
6.18 Ethical and Social Implications of Computing
|
CS.4.3.4 |
Discuss the role of ethics in emerging technologies |
-
7.13 Ethical Issues Around Data Collection
|