Please enable JavaScript to use CodeHS

Standards Mapping

for New Mexico 3B

28

Standards in this Framework

16

Standards Mapped

57%

Mapped to Course

Standard Lessons
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
  1. 11.4 Basic Crypto Systems: Caesar Cipher
  2. 11.6 Basic Crypto Systems: Vigenere Cipher
  3. 11.9 Hash Function Development
  4. 12.1 Project: Classic Cipher Newscast
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 11.5 Basic Crypto Systems: Cracking Caesar
  2. 12.1 Project: Classic Cipher Newscast
3B-AP-12
Compare and contrast fundamental data structures and their uses.
  1. 3.13 Parameters
  2. 3.14 Using i in For Loops
  3. 3.16 If Statements
  4. 3.17 If/ Else Statements
  5. 3.18 While Loops
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
  1. 3.10 Top Down Design
  2. 8.3 Karel Can't Turn Right
  3. 8.4 Functions in Karel
  4. 8.5 The Start Function
  5. 8.6 Top Down Design and Decomposition in Karel
  6. 8.7 Commenting Your Code
  7. 8.8 Super Karel
  8. 8.9 For Loops
  9. 8.10 If Statements
  10. 8.11 If/Else Statements
  11. 8.12 While Loops in Karel
  12. 8.13 Control Structures Example
  13. 8.14 More Karel Examples and Testing
  14. 8.15 How to Indent Your Code
  15. 8.16 Karel Challenges
  16. 9.7 Image Manipulation
  17. 11.4 Basic Crypto Systems: Caesar Cipher
  18. 11.6 Basic Crypto Systems: Vigenere Cipher
  19. 11.9 Hash Function Development
  20. 12.1 Project: Classic Cipher Newscast
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 3.1 Intro to Python with Tracy the Turtle
  2. 3.2 Tracy's Grid World
  3. 3.3 Turning Tracy
  4. 3.4 For Loops
  5. 3.5 Turning Tracy Using Angles
  6. 3.8 Functions
  7. 3.9 Artistic Effects
  8. 3.15 Extended Loop Control
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. 8.1 Introduction to Programming With Karel
  2. 8.2 More Basic Karel
  3. 8.3 Karel Can't Turn Right
  4. 8.4 Functions in Karel
  5. 8.5 The Start Function
  6. 8.6 Top Down Design and Decomposition in Karel
  7. 8.7 Commenting Your Code
  8. 8.8 Super Karel
  9. 8.9 For Loops
  10. 8.10 If Statements
  11. 8.11 If/Else Statements
  12. 8.12 While Loops in Karel
  13. 8.13 Control Structures Example
  14. 8.14 More Karel Examples and Testing
  15. 8.15 How to Indent Your Code
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
  1. 1.7 Hacking Ethics
  2. 2.1 Project: Public Service Announcement
  3. 6.9 Network Attacks
  4. 7.1 Project: Secure the Company's Network
  5. 10.1 Inside Web Apps
  6. 10.2 Developer Tools
  7. 10.9 Common Security Problems
  8. 10.10 SQL Injection Overview
  9. 10.11 Types of SQLi and Prevention
  10. 10.12 Cross-site Scripting
  11. 11.1 Cryptography, Cryptology, Cryptanalysis
  12. 11.2 History of Cryptography
  13. 11.7 Advanced Cryptography
  14. 11.8 Hash Functions
  15. 12.1 Project: Classic Cipher Newscast
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
  1. 11.4 Basic Crypto Systems: Caesar Cipher
  2. 11.6 Basic Crypto Systems: Vigenere Cipher
  3. 11.9 Hash Function Development
  4. 12.1 Project: Classic Cipher Newscast
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
3B-CS-01
Categorize the roles of operating system software.
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 6.2 Internet Hardware and Sending Information
  2. 6.5 Routing
  3. 7.1 Project: Secure the Company's Network
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
  1. 10.7 Basic Querying in SQL
  2. 10.8 Filtering Queries in SQL
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
  1. 1.3 Internet Safety
  2. 1.4 Privacy & Security
  3. 1.5 Information Literacy
  4. 1.6 Creative Credit & Copyright
  5. 1.7 Hacking Ethics
  6. 2.1 Project: Public Service Announcement
  7. 6.8 Impact of the Internet
  8. 7.1 Project: Secure the Company's Network
  9. 11.2 History of Cryptography
  10. 11.8 Hash Functions
  11. 12.1 Project: Classic Cipher Newscast
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 1.3 Internet Safety
  2. 2.1 Project: Public Service Announcement
  3. 6.8 Impact of the Internet
  4. 7.1 Project: Secure the Company's Network
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 1.3 Internet Safety
  2. 1.4 Privacy & Security
  3. 1.5 Information Literacy
  4. 1.6 Creative Credit & Copyright
  5. 2.1 Project: Public Service Announcement
  6. 6.1 Introduction to the Internet
  7. 6.8 Impact of the Internet
  8. 7.1 Project: Secure the Company's Network
  9. 11.1 Cryptography, Cryptology, Cryptanalysis
  10. 11.2 History of Cryptography
  11. 11.7 Advanced Cryptography
  12. 11.8 Hash Functions
  13. 12.1 Project: Classic Cipher Newscast
3B-IC-28
Debate laws and regulations that impact the development and use of software.
  1. 1.2 Cyberbullying
  2. 1.4 Privacy & Security
  3. 1.6 Creative Credit & Copyright
  4. 1.7 Hacking Ethics
  5. 2.1 Project: Public Service Announcement
  6. 6.7 Viewing a Webpage
  7. 6.8 Impact of the Internet
  8. 7.1 Project: Secure the Company's Network
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 6.2 Internet Hardware and Sending Information
  2. 6.9 Network Attacks
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.
  1. 1.1 Digital Footprint and Reputation
  2. 1.4 Privacy & Security
  3. 1.7 Hacking Ethics
  4. 2.1 Project: Public Service Announcement
  5. 6.6 Packets & Protocols
  6. 6.10 Network Administration
  7. 7.1 Project: Secure the Company's Network
  8. 10.1 Inside Web Apps
  9. 10.2 Developer Tools
  10. 10.9 Common Security Problems
  11. 10.11 Types of SQLi and Prevention
  12. 10.12 Cross-site Scripting
  13. 11.2 History of Cryptography
  14. 11.7 Advanced Cryptography
  15. 11.8 Hash Functions
  16. 12.1 Project: Classic Cipher Newscast