Please enable JavaScript to use CodeHS

Standards Mapping

for CSTA 2

23

Standards in this Framework

21

Standards Mapped

91%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 8.1 Getting Started
  5. 8.10 Project: Animate an Emoji
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 3.4 Under the Sea
  2. 5.5 For Loops
  3. 8.3 Variables
  4. 8.4 The Draw Loop
  5. 8.5 Color Transitions
  6. 8.6 Shape Transformations
  7. 8.7 Direction
  8. 8.8 Mouse Data
  9. 8.9 Keyboard Data
  10. 8.10 Project: Animate an Emoji
  11. 9.5 Variables
  12. 9.9 Your First Sprites
  13. 9.10 The Physics of Sprites
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 8.8 Mouse Data
  7. 8.9 Keyboard Data
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 8.1 Getting Started
  5. 8.2 Color
  6. 8.3 Variables
  7. 8.4 The Draw Loop
  8. 8.5 Color Transitions
  9. 8.6 Shape Transformations
  10. 8.7 Direction
  11. 8.8 Mouse Data
  12. 8.9 Keyboard Data
  13. 8.10 Project: Animate an Emoji
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 3.4 Under the Sea
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 5.9 Karel Challenges
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 8.1 Getting Started
  2. 8.2 Color
  3. 9.8 Understanding the Canvas
  4. 9.9 Your First Sprites
  5. 10.5 Incorporating Images
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 1.4 Lost in Space
  2. 3.4 Under the Sea
  3. 5.6 Conditional Statements
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
  7. 9.4 Intro to JavaScript
  8. 9.5 Variables
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 8.10 Project: Animate an Emoji
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 5.4 Multiple Functions
  2. 5.9 Karel Challenges
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 4.3 Hardware
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
  1. 4.5 Internet of Things
  2. 8.8 Mouse Data
  3. 8.9 Keyboard Data
2-CS-03
Systematically identify and fix problems with computing devices and their components.
  1. 4.3 Hardware
2-DA-07
Represent data using multiple encoding schemes.
  1. 6.7 Project: Steganography
  2. 8.2 Color
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. 7.8 Project: Public Service Announcement
2-DA-09
Refine computational models based on the data they have generated.
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 4.4 Cloud Computing
  2. 6.3 Impact of the Internet
  3. 6.4 Cybersecurity
  4. 6.5 The CIA Triad
  5. 6.6 Encryption
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 4.6 Ethics and Legal Considerations
  2. 6.3 Impact of the Internet
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 6.6 Encryption
  4. 7.1 Digital Footprint and Reputation
  5. 7.4 Privacy & Security
  6. 7.7 Hacking Ethics
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.6 Encryption
  3. 7.4 Privacy & Security
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.
  1. 6.6 Encryption
  2. 6.7 Project: Steganography