Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada CS II

21

Standards in this Framework

21

Standards Mapped

100%

Mapped to Course

Standard Lessons
CS.1.1.2
Describe how artificial intelligence drives many software and physical systems
  1. 18.1 Magpie Lab
CS.1.1.3
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem
  1. 18.1 Magpie Lab
CS.1.1.4
Use and adapt classic algorithms to solve computational problems
  1. 9.2 Linear Search
  2. 9.3 Binary Search
  3. 9.4 Selection Sort
  4. 9.5 Insertion Sort
  5. 9.7 Mergesort
CS.1.1.5
Develop classic algorithms in code to solve computational problems
  1. 9.2 Linear Search
  2. 9.3 Binary Search
  3. 9.4 Selection Sort
  4. 9.5 Insertion Sort
  5. 9.7 Mergesort
CS.1.2.2
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions
  1. 10.4 Activity 4: Extending the Celebrity Class
  2. 14.1 Quiz Creation
  3. 20.4 Create a Negative or Positive Review
CS.1.3.3
Implement arrays in code
  1. 7.2 Introduction to Arrays
  2. 7.3 Using Arrays
  3. 7.4 Enhanced For Loops
CS.1.3.4
Implement ArrayLists and LinkedLists in code
  1. 7.5 ArrayList Methods
  2. 7.6 Arrays vs ArrayLists
  3. 7.8 The List Interface
CS.1.4.3
Construct solutions to problems using student-created components, such as procedures, modules and/or objects
  1. 5.1 Java Methods
  2. 5.2 Methods and Parameters
  3. 5.3 Methods and Return Values
  4. 6.4 Writing Classes
  5. 6.6 Getter and Setter Methods
  6. 8.4 Activity 4: Hiding and Revealing a Text Message
  7. 12.1 Pokemon Simulation
  8. 13.1 Mad Libs
  9. 20.3 Autogenerated Review
  10. 20.4 Create a Negative or Positive Review
CS.1.4.4
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution
  1. 8.2 Activity 2: Hiding and Revealing a Picture
  2. 8.4 Activity 4: Hiding and Revealing a Text Message
  3. 9.6 Advanced: Recursion
CS.1.4.5
Demonstrate code reuse by creating programming solutions using libraries and APIs
  1. 3.8 Super Karel
  2. 17.1 Elevens
  3. 18.1 Magpie Lab
  4. 19.1 Picture Lab
CS.1.5.6
Plan and develop programs for broad audiences using a software life cycle process
  1. 11.5 Presenting your Innovation
CS.1.5.7
Explain security issues that might lead to compromised computer programs
  1. 1.6 Application Security
  2. 1.7 Browser Configuration
CS.1.5.8
Develop programs for multiple computing platforms
  1. 11.6 Challenge: Take your Innovation Off CodeHS
CS.1.5.9
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project
  1. 10.1 Activity 1: Introduction to Celebrity
  2. 10.2 Activity 2: The Celebrity Class: A Simple Version
  3. 10.3 Activity 3: Putting it All Together
  4. 10.4 Activity 4: Extending the Celebrity Class
CS.1.5.10
Develop and use a series of test cases to verify that a program performs according to its design specifications
  1. 3.14 More Karel Examples and Testing
CS.1.5.11
Modify an existing program to add additional functionality and discuss intended and unintended implications, e.g., breaking other functionality
  1. 18.1 Magpie Lab
  2. 19.1 Picture Lab
CS.2.2.2
Categorize the roles of operating system software
  1. 1.1 Operating Systems
  2. 1.2 Comparing Operating Systems
  3. 1.3 Compatibility
CS.2.3.2
Illustrate ways computing systems implement logic, input, and output through hardware components
  1. 2.2 Notational Systems
CS.3.1.3
Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images
  1. 2.2 Notational Systems
  2. 2.3 Data Representation
  3. 7.12 Binary
  4. 8.1 Activity 1: Exploring Color
  5. 8.2 Activity 2: Hiding and Revealing a Picture
  6. 8.3 Activity 3: Identifying a Hidden Picture
  7. 8.4 Activity 4: Hiding and Revealing a Text Message
CS.4.1.5
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society
  1. 6.18 Ethical and Social Implications of Computing
CS.4.3.4
Discuss the role of ethics in emerging technologies
  1. 7.13 Ethical Issues Around Data Collection