Please enable JavaScript to use CodeHS

New Jersey 6-8 Computer Science Standards Mapping


Fundamentals of Cybersecurity

25 Standards in this Framework 14 Standards Mapped 56% Mapped to Course

Standard Lessons
8.1.8.AP.1 Design and illustrate algorithms that solve complex problems using flowcharts and/or pseudocode.
  1. 4.6 Organizational Techniques
8.1.8.AP.2 Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
8.1.8.AP.3 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.10 Loop and a Half
8.1.8.AP.4 Decompose problems and sub-problems into parts to facilitate the design, implementation, and review of programs.
  1. 21.1 Challenge Problems
8.1.8.AP.5 Create procedures with parameters to organize code and make it easier to reuse.
8.1.8.AP.6 Refine a solution that meets users’ needs by incorporating feedback from team members and users.
8.1.8.AP.7 Design programs, incorporating existing code, media, and libraries, and give attribution
8.1.8.AP.8 Systematically test and refine programs using a range of test cases and users.
  1. 21.1 Challenge Problems
8.1.8.AP.9 Document programs in order to make them easier to follow, test, and debug.
8.1.8.CS.1 Recommend improvements to computing devices in order to improve the ways users interact with the devices.
8.1.8.CS.2 Design a system that combines hardware and software components to process data.
8.1.8.CS.3 Justify design decisions and explain potential system trade-offs.
8.1.8.CS.4 Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
8.1.8.DA.1 Organize and transform data collected using computational tools to make it usable for a specific purpose.
8.1.8.DA.2 Explain the difference between how the computer stores data as bits and how the data is displayed.
  1. 10.3 Data Representation
8.1.8.DA.3 Identify the appropriate tool to access data based on its file format.
  1. 7.3 Compatibility
8.1.8.DA.4 Transform data to remove errors and improve the accuracy of the data for analysis.
8.1.8.DA.5 Test, analyze, and refine computational models
8.1.8.DA.6 Analyze climate change computational models and propose refinements.
8.1.8.IC.1 Compare the trade-offs associated with computing technologies that affect individual’s everyday activities and career options.
  1. 2.1 Digital Footprint and Reputation
  2. 10.10 Impact of the Internet
8.1.8.IC.2 Describe issues of bias and accessibility in the design of existing technologies.
  1. 10.10 Impact of the Internet
8.1.8.NI.1 Model how information is broken down into smaller pieces, transmitted as addressed packets through multiple devices over networks and the Internet, and reassembled at the destination.
  1. 10.7 Routing
  2. 10.8 Packets & Protocols
8.1.8.NI.2 Model the role of protocols in transmitting data across networks and the Internet and how they enable secure and errorless communication.
  1. 10.7 Routing
  2. 10.8 Packets & Protocols
8.1.8.NI.3 Explain how network security depends on a combination of hardware, software, and practices that control access to data and systems.
  1. 11.3 Network Devices
  2. 11.5 Network Options
8.1.8.NI.4 Explain how new security measures have been created in response to key malware events.
  1. 7.6 Application Security