Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada 9-12 Adv

27

Standards in this Framework

16

Standards Mapped

59%

Mapped to Course

Standard Lessons
A9-12.AP.A.1
Describe how artificial intelligence drives many software and physical systems.
A9-12.AP.A.2
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
A9-12.AP.A.3
Use and adapt classic algorithms to solve computational problems.
  1. 4.6 Basic Math in JavaScript
  2. 9.10 Cryptography
A9-12.AP.A.4
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 2.15 Control Structures Example
  2. 5.7 For Loop Practice
A9-12.AP.V.1
Compare and contrast fundamental data structures and their uses.
  1. 8.1 Intro to Lists/Arrays
  2. 8.2 Indexing Into an Array
  3. 8.3 Adding/Removing From an Array
  4. 8.4 Array Length and Looping Through Arrays
  5. 8.5 Iterating Over an Array
  6. 8.6 Finding an Element in a List
  7. 8.7 Removing an Element From an Array
  8. 8.8 Simulation
A9-12.AP.C.1
Illustrate the flow of execution of a recursive algorithm.
A9-12.AP.M.1
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 6.1 Functions and Parameters 1
  2. 6.2 Functions and Parameters 2
  3. 6.3 Functions and Parameters 3
  4. 6.4 Functions and Return Values 1
  5. 6.5 Functions and Return Values 2
A9-12.AP.M.2
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 16.4 Project Prep and Development
A9-12.AP.M.3
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 2.10 Super Karel
  2. 2.19 Ultra Karel
  3. 4.6 Basic Math in JavaScript
  4. 5.8 Random Numbers
A9-12.AP.PD.1
Plan and develop programs for broad audiences using a software life cycle process.
  1. 16.1 Intro to Design Thinking
  2. 16.2 Prototype
  3. 16.3 Test
  4. 16.4 Project Prep and Development
A9-12.AP.PD.2
Explain security issues that might lead to compromised computer programs.
  1. 12.8 Cybersecurity
A9-12.AP.PD.3
Develop programs for multiple computing platforms.
A9-12.AP.PD.4
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
  1. 16.4 Project Prep and Development
A9-12.AP.PD.5
Develop and use a series of test cases to verify that a program performs according to its design specifications.
  1. 16.3 Test
A9-12.AP.PD.6
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
A9-12.AP.PD.7
Evaluate key qualities of a program through a process such as a code review.
A9-12.CS.HS.1
Categorize the roles of operating system software.
A9-12.CS.T.1
Illustrate ways computing systems implement logic, input, and output through hardware components.
A9-12.DA.CVT.1
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. 14.2 Visualizing and Interpreting Data
  2. 14.3 Data Collection & Limitations
A9-12.DA.CVT.2
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 14.3 Data Collection & Limitations
A9-12.DA.IM.1
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
  1. 8.8 Simulation
  2. 14.3 Data Collection & Limitations
A9-12.IC.C.1
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 12.9 The Impact of the Internet
A9-12.IC.C.2
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 12.9 The Impact of the Internet
A9-12.IC.C.3
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 12.9 The Impact of the Internet
A9-12.IC.SLE.1
Debate laws and regulations that impact the development and use of software.
A9-12.NI.NCO.1
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
A9-12.NI.C.1
Compare ways software developers protect devices and information from unauthorized access.