Please enable JavaScript to use CodeHS

New Jersey 9-12 Computer Science Standards Mapping


Fundamentals of Cybersecurity

26 Standards in this Framework 16 Standards Mapped 61% Mapped to Course

Standard Lessons
8.1.12.AP.1 Design algorithms to solve computational problems using a combination of original and existing algorithms.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
8.1.12.AP.2 Create generalized computational solutions using collections instead of repeatedly using simple variables.
  1. 4.5 Arrays and Objects
8.1.12.AP.3 Select and combine control structures for a specific application based upon performance and readability, and identify trade-offs to justify the choice.
  1. 21.1 Challenge Problems
  2. 22.9 While Loops
  3. 22.10 Loop and a Half
  4. 23.1 Control Structures Challenges
8.1.12.AP.4 Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 3.1 Project: Public Service Announcement
8.1.12.AP.5 Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
8.1.12.AP.6 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
8.1.12.AP.7 Collaboratively design and develop programs and artifacts for broad audiences by incorporating feedback from users.
8.1.12.AP.8 Evaluate and refine computational artifacts to make them more usable and accessible.
8.1.12.AP.9 Collaboratively document and present design decisions in the development of complex programs.
8.1.12.CS.1 Describe ways in which integrated systems hide underlying implementation details to simplify user experiences.
8.1.12.CS.2 Model interactions between application software, system software, and hardware.
  1. 7.4 Software and Applications
8.1.12.CS.3 Compare the functions of application software, system software, and hardware.
  1. 7.1 Operating Systems
  2. 7.4 Software and Applications
8.1.12.CS.4 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
8.1.12.DA.1 Create interactive data visualizations using software tools to help others better understand real world phenomena, including climate change.
  1. 8.3 The Value of Data
8.1.12.DA.2 Describe the trade-offs in how and where data is organized and stored
8.1.12.DA.3 Translate between decimal numbers and binary numbers.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
8.1.12.DA.4 Explain the relationship between binary numbers and the storage and use of data in a computing device.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
8.1.12.DA.5 Create data visualizations from large data sets to summarize, communicate, and support different interpretations of real-world phenomena.
  1. 8.3 The Value of Data
8.1.12.DA.6 Create and refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
8.1.12.IC.1 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 10.10 Impact of the Internet
8.1.12.IC.2 Test and refine computational artifacts to reduce bias and equity deficits.
8.1.12.IC.3 Predict the potential impacts and implications of emerging technologies on larger social, economic, and political structures, using evidence from credible sources.
  1. 10.10 Impact of the Internet
8.1.12.NI.1 Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
8.1.12.NI.2 Evaluate security measures to address various common security threats
  1. 2.4 Privacy & Security
  2. 8.9 Common Security Problems
  3. 8.11 Types of SQLi and Prevention
8.1.12.NI.3 Explain how the needs of users and the sensitivity of data determine the level of security implemented
  1. 2.4 Privacy & Security
8.1.12.NI.4 Explain how decisions on methods to protect data are influenced by whether the data is at rest, in transit, or in use.