Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada CS III

19

Standards in this Framework

5

Standards Mapped

26%

Mapped to Course

Standard Lessons
CS.1.1.5
Develop classic algorithms in code to solve computational problems
  1. 6.4 Functions and Return Values
  2. 7.4 Strings and For Loops
  3. 8.3 For Loops and Lists
CS.1.1.6
Evaluate algorithms in terms of their efficiency, correctness, and clarity
CS.1.2.3
Illustrate the flow of execution of a recursive algorithm
CS.1.2.4
Implement conditional controls in code
  1. 2.16 If Statements
  2. 2.17 If/ Else Statements
  3. 4.2 If Statements
CS.1.2.5
Implement recursive algorithms in code
CS.1.3.3
Implement arrays in code
  1. 8.2 Lists
  2. 9.1 2d Lists
CS.1.3.4
Implement ArrayLists and LinkedLists in code
CS.1.4.5
Demonstrate code reuse by creating programming solutions using libraries and APIs
  1. 21.1 Using Requests
CS.1.5.12
Evaluate key qualities of a program through a process such as a code review
  1. 13.1 Advanced Challenges with Tracy
CS.1.5.13
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems
CS.3.2.3
Select data collection tools and techniques to generate data sets that support a claim or communicate information
CS.3.3.2
Evaluate the ability of models and simulations to test and support the refinement of hypotheses
CS.4.1.6
Create computational artifacts to maximize their beneficial effects and minimize harmful effects on society
CS.4.1.7
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society
CS.4.1.8
Predict how computational innovations that have revolutionized aspects of our culture might evolve
CS.4.2.2
Use tools and methods for collaboration to increase the productivity of a team
CS.4.3.5
Debate laws and regulations that impact the development and use of software
CS.5.1.2
Describe the issues that impact network functionality, e.g., bandwidth, load, delay, topology
CS.5.2.5
Compare ways software developers protect devices and information from unauthorized access