Please enable JavaScript to use CodeHS

Rhode Island 9-12 Standards Mapping

to

AP Computer Science A (Nitro)

34 Standards in this Framework 17 Standards Mapped 50% Mapped to Course


Standard Lessons
3-CT-A-1 Create computational artifacts that use algorithms to solve computational problems by leveraging prior knowledge and personal interests.
  1. 6.4 Developing Algorithms Using Arrays
  2. 7.4 Developing Algorithms using ArrayLists
  3. 8.2 Traversing 2D Arrays
3-CT-V-1 Explain the role of a variable within a program, and the scope in which its name and value can be used.
  1. 5.8 Scope and Access
3-CT-D-1 Create a program that processes a collection of data.
  1. 6.2 Traversing Arrays
  2. 6.3 Enhanced for Loop for Arrays
  3. 6.4 Developing Algorithms Using Arrays
  4. 7.4 Developing Algorithms using ArrayLists
  5. 8.2 Traversing 2D Arrays
3-CT-C-1 Create and justify the selection of specific control structures when tradeoffs involve code organization, readability, and program performance and explain the benefits and drawbacks of choices made.
  1. 4.5 Informal Code Analysis
  2. 5.8 Scope and Access
  3. 7.5 Searching
  4. 7.6 Sorting
  5. 10.2 Recursive Searching
  6. 10.3 Recursive Sorting
3-CT-M-1 Identify existing computational artifacts that can be used for the subtasks of a decomposed problem
  1. 2.4 Calling a Void Method
  2. 2.5 Calling a Void Method with Parameters
  3. 2.6 Calling a Non-void Method
  4. 2.10 Using the Math Class
  5. 5.6 Writing Methods
3-CT-M-2 Create computational artifacts by incorporating predefined procedures, self-defined procedures and external artifacts.
  1. 2.4 Calling a Void Method
  2. 2.5 Calling a Void Method with Parameters
  3. 2.6 Calling a Non-void Method
  4. 2.10 Using the Math Class
3-CT-CD-1 Systematically design and implement computational artifacts for targeted audiences by incorporating feedback from users.
3-CT-CD-2 Systematically test and refine programs using a range of test cases.
3-CT-CD-3 Document computational artifacts in order to make them easier to follow, test, and debug.
  1. 5.3 Documentation with Comments
3-CSN-H-1 Analyze a computing system and explain how abstractions simplify the underlying implementation details embedded in everyday objects.
  1. 2.4 Calling a Void Method
  2. 5.8 Scope and Access
3-CSN-HS-1 Compare levels of abstraction and interactions between application software, system software, and hardware layers.
3-CSN-T-1 Develop and communicate troubleshooting strategies others can use to identify and fix errors.
  1. 5.3 Documentation with Comments
3-CSN-N-1 Identify the various elements of a network and describe how they function and interact to transfer information.
3-CY-R-1 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  1. 7.7 Ethical Issues Around Data Collection
3-CY-R-2 Analyze an existing or proposed application to identify the potential ways it could be used to obtain sensitive information.
  1. 7.7 Ethical Issues Around Data Collection
3-CY-R-3 Explain how the digital security of an organization may be affected by the actions of its employees.
3-CY-S-1 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  1. 7.7 Ethical Issues Around Data Collection
3-CY-S-2 Explain tradeoffs when selecting and implementing cybersecurity recommendations.
3-CY-RP-1 Describe the appropriate actions to take in response to detected security breaches.
3-DA-CVT-1 Select appropriate data-collection tools and presentation techniques for different types of data.
3-DA-IM-1 Create computational models that represent the relationships among different elements of data collected from a phenomenon or process.
3-DA-IM-2 Discuss potential hidden biases that could be introduced while collecting a dataset and how these biases could affect analysis conclusions.
3-DA-IM-3 Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3-DA-ST-1 Explain tradeoffs between storing data locally or in central, cloud-based systems.
  1. 7.7 Ethical Issues Around Data Collection
3-DA-ST-2 Translate data for various real-world phenomena, such as characters, numbers, and images, into bits.
3-DL-CU-1 Select appropriate software tools or resources to create a complex artifact or solve a problem.
3-DL-SDI-1 Decompose a complex problem into multiple questions, identify which can be explored through digital sources, and synthesize query results using a variety of software tools.
3-DL-US-1 Describe different kinds of computations that software tools perform to tailor a system to individual users.
3-RC-CU-1 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 5.10 Ethical and Social Implications of Computing
3-RC-CU-2 Design and analyze computational artifacts to reduce bias and equity deficits.
  1. 5.10 Ethical and Social Implications of Computing
3-RC-CU-3 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 5.10 Ethical and Social Implications of Computing
3-RC-SLE-1 Evaluate the impact of intellectual property laws on the use of digital information.
  1. 7.7 Ethical Issues Around Data Collection
3-RC-SLE-2 Evaluate the social and economic implications of privacy and free speech in the context of safety, law, or ethics.
3-RC-SI-1 Use tools and methods for collaboration on a project to increase connectivity between people in different cultures and career fields.