Please enable JavaScript to use CodeHS

Standards Mapping

for Connecticut 2

23

Standards in this Framework

20

Standards Mapped

86%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.7 If/Else Statements
  2. 1.8 While Loops
  3. 1.9 Karel Challenges
  4. 4.1 Getting Started
  5. 4.10 Project: Animate an Emoji
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 1.5 For Loops
  2. 4.3 Variables
  3. 4.4 The Draw Loop
  4. 4.5 Color Transitions
  5. 4.6 Shape Transformations
  6. 4.7 Direction
  7. 4.8 Mouse Data
  8. 4.9 Keyboard Data
  9. 4.10 Project: Animate an Emoji
  10. 5.5 Variables
  11. 5.9 Your First Sprites
  12. 5.10 The Physics of Sprites
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.7 If/Else Statements
  2. 1.8 While Loops
  3. 4.8 Mouse Data
  4. 4.9 Keyboard Data
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.3 Functions
  2. 1.4 Multiple Functions
  3. 4.1 Getting Started
  4. 4.2 Color
  5. 4.3 Variables
  6. 4.4 The Draw Loop
  7. 4.5 Color Transitions
  8. 4.6 Shape Transformations
  9. 4.7 Direction
  10. 4.8 Mouse Data
  11. 4.9 Keyboard Data
  12. 4.10 Project: Animate an Emoji
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 1.9 Karel Challenges
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 3.5 Incorporating Images
  2. 4.1 Getting Started
  3. 4.2 Color
  4. 5.8 Understanding the Canvas
  5. 5.9 Your First Sprites
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 1.6 Conditional Statements
  2. 1.7 If/Else Statements
  3. 1.8 While Loops
  4. 1.9 Karel Challenges
  5. 5.4 Intro to JavaScript
  6. 5.5 Variables
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 4.10 Project: Animate an Emoji
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 1.4 Multiple Functions
  2. 1.9 Karel Challenges
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
  1. 4.8 Mouse Data
  2. 4.9 Keyboard Data
2-CS-03
Systematically identify and fix problems with computing devices and their components.
2-DA-07
Represent data using multiple encoding schemes.
  1. 2.7 Project: Steganography
  2. 4.2 Color
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. 6.2 Intro to Spreadsheets
  2. 6.5 Visualizing Data
  3. 6.6 Models
  4. 6.8 Project: Data Storytelling
  5. 6.9 Project: Tell Your Story
2-DA-09
Refine computational models based on the data they have generated.
  1. 6.6 Models
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 2.3 Impact of the Internet
  2. 2.4 Cybersecurity
  3. 2.5 The CIA Triad
  4. 2.6 Encryption
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 2.3 Impact of the Internet
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 6.7 Project: Statistical Questions
  2. 6.9 Project: Tell Your Story
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 2.4 Cybersecurity
  2. 2.5 The CIA Triad
  3. 2.6 Encryption
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 2.1 What is the Internet?
  2. 2.2 The Need for Protocols
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 2.4 Cybersecurity
  2. 2.6 Encryption
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.
  1. 2.6 Encryption
  2. 2.7 Project: Steganography