Please enable JavaScript to use CodeHS

Standards Mapping

for Delaware 2

23

Standards in this Framework

15

Standards Mapped

65%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.6 Organizational Techniques
  2. 4.6 Organizational Techniques
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 4.1 Programming Concepts
  3. 6.1 Project: Classic Cipher Newscast
  4. 6.1 Project: Classic Cipher Newscast
  5. 22.1 Booleans
  6. 22.1 Booleans
  7. 22.2 Logical Operators
  8. 22.2 Logical Operators
  9. 22.3 Comparison Operators
  10. 22.3 Comparison Operators
  11. 22.4 If Statements
  12. 22.4 If Statements
  13. 22.5 For Loops in JavaScript
  14. 22.5 For Loops in JavaScript
  15. 22.6 General For Loops
  16. 22.6 General For Loops
  17. 22.7 For Loop Practice
  18. 22.7 For Loop Practice
  19. 22.8 Random Numbers
  20. 22.8 Random Numbers
  21. 22.9 While Loops
  22. 22.9 While Loops
  23. 22.10 Loop and a Half
  24. 22.10 Loop and a Half
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 4.3 Looping
  3. 4.4 Branching
  4. 4.4 Branching
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 22.4 If Statements
  2. 22.4 If Statements
  3. 22.5 For Loops in JavaScript
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.6 General For Loops
  7. 22.7 For Loop Practice
  8. 22.7 For Loop Practice
  9. 22.8 Random Numbers
  10. 22.8 Random Numbers
  11. 22.9 While Loops
  12. 22.9 While Loops
  13. 22.10 Loop and a Half
  14. 22.10 Loop and a Half
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 4.3 Looping
  2. 4.4 Branching
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
  2. 4.6 Organizational Techniques
  3. 6.1 Project: Classic Cipher Newscast
  4. 6.1 Project: Classic Cipher Newscast
  5. 22.1 Booleans
  6. 22.1 Booleans
  7. 22.2 Logical Operators
  8. 22.2 Logical Operators
  9. 22.3 Comparison Operators
  10. 22.3 Comparison Operators
  11. 22.4 If Statements
  12. 22.4 If Statements
  13. 22.5 For Loops in JavaScript
  14. 22.5 For Loops in JavaScript
  15. 22.6 General For Loops
  16. 22.6 General For Loops
  17. 22.7 For Loop Practice
  18. 22.7 For Loop Practice
  19. 22.8 Random Numbers
  20. 22.8 Random Numbers
  21. 22.9 While Loops
  22. 22.9 While Loops
  23. 22.10 Loop and a Half
  24. 22.10 Loop and a Half
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
2-CS-03
Systematically identify and fix problems with computing devices and their components.
  1. 11.1 Methodology
  2. 11.1 Methodology
  3. 11.2 Support Practice
2-DA-07
Represent data using multiple encoding schemes.
  1. 9.2 Notational Systems
  2. 9.2 Notational Systems
  3. 9.3 Data Representation
  4. 9.3 Data Representation
  5. 9.8 Packets & Protocols
  6. 9.8 Packets & Protocols
  7. 9.9 Viewing a Webpage
  8. 9.9 Viewing a Webpage
  9. 14.1 Project: Security Assessment Report
  10. 14.1 Project: Security Assessment Report
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
2-DA-09
Refine computational models based on the data they have generated.
  1. 8.7 Basic Querying in SQL
  2. 8.8 Filtering Queries in SQL
  3. 14.1 Project: Security Assessment Report
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 1.1 Module Overview - Cybersecurity
  2. 1.1 Module Overview - Cybersecurity
  3. 1.2 What is Cybersecurity?
  4. 1.2 What is Cybersecurity?
  5. 1.3 Impact of Cybersecurity
  6. 1.3 Impact of Cybersecurity
  7. 2.1 Digital Footprint and Reputation
  8. 2.1 Digital Footprint and Reputation
  9. 2.2 Cyberbullying
  10. 2.2 Cyberbullying
  11. 2.3 Internet Safety
  12. 2.3 Internet Safety
  13. 2.4 Privacy & Security
  14. 2.4 Privacy & Security
  15. 2.5 Information Literacy
  16. 2.5 Information Literacy
  17. 2.6 Creative Credit & Copyright
  18. 2.6 Creative Credit & Copyright
  19. 2.7 Hacking Ethics
  20. 2.7 Hacking Ethics
  21. 3.1 Project: Public Service Announcement
  22. 3.1 Project: Public Service Announcement
  23. 5.1 Cryptography, Cryptology, Cryptanalysis
  24. 5.1 Cryptography, Cryptology, Cryptanalysis
  25. 5.2 History of Cryptography
  26. 5.2 History of Cryptography
  27. 6.1 Project: Classic Cipher Newscast
  28. 6.1 Project: Classic Cipher Newscast
  29. 8.9 Common Security Problems
  30. 8.9 Common Security Problems
  31. 9.10 Impact of the Internet
  32. 9.10 Impact of the Internet
  33. 14.1 Project: Security Assessment Report
  34. 14.1 Project: Security Assessment Report
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 2.2 Cyberbullying
  2. 2.2 Cyberbullying
  3. 3.1 Project: Public Service Announcement
  4. 3.1 Project: Public Service Announcement
  5. 9.10 Impact of the Internet
  6. 9.10 Impact of the Internet
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 1.2 What is Cybersecurity?
  2. 1.2 What is Cybersecurity?
  3. 1.3 Impact of Cybersecurity
  4. 1.3 Impact of Cybersecurity
  5. 1.4 The CIA Triad
  6. 1.4 The CIA Triad
  7. 2.1 Digital Footprint and Reputation
  8. 2.1 Digital Footprint and Reputation
  9. 2.2 Cyberbullying
  10. 2.2 Cyberbullying
  11. 2.3 Internet Safety
  12. 2.3 Internet Safety
  13. 2.4 Privacy & Security
  14. 2.4 Privacy & Security
  15. 2.6 Creative Credit & Copyright
  16. 2.6 Creative Credit & Copyright
  17. 3.1 Project: Public Service Announcement
  18. 3.1 Project: Public Service Announcement
  19. 5.2 History of Cryptography
  20. 5.2 History of Cryptography
  21. 6.1 Project: Classic Cipher Newscast
  22. 6.1 Project: Classic Cipher Newscast
  23. 7.6 Application Security
  24. 8.9 Common Security Problems
  25. 8.9 Common Security Problems
  26. 8.11 Types of SQLi and Prevention
  27. 8.11 Types of SQLi and Prevention
  28. 9.10 Impact of the Internet
  29. 9.10 Impact of the Internet
  30. 14.1 Project: Security Assessment Report
  31. 14.1 Project: Security Assessment Report
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 9.5 Internet Addresses
  2. 9.5 Internet Addresses
  3. 9.8 Packets & Protocols
  4. 9.8 Packets & Protocols
  5. 9.9 Viewing a Webpage
  6. 9.9 Viewing a Webpage
  7. 10.6 Network Communication
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 2.3 Internet Safety
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.4 Privacy & Security
  5. 2.7 Hacking Ethics
  6. 2.7 Hacking Ethics
  7. 3.1 Project: Public Service Announcement
  8. 3.1 Project: Public Service Announcement
  9. 5.1 Cryptography, Cryptology, Cryptanalysis
  10. 5.1 Cryptography, Cryptology, Cryptanalysis
  11. 5.2 History of Cryptography
  12. 5.2 History of Cryptography
  13. 6.1 Project: Classic Cipher Newscast
  14. 6.1 Project: Classic Cipher Newscast
  15. 7.6 Application Security
  16. 8.9 Common Security Problems
  17. 8.9 Common Security Problems
  18. 8.11 Types of SQLi and Prevention
  19. 8.11 Types of SQLi and Prevention
  20. 9.7 Routing
  21. 9.7 Routing
  22. 9.8 Packets & Protocols
  23. 9.8 Packets & Protocols
  24. 9.9 Viewing a Webpage
  25. 9.9 Viewing a Webpage
  26. 14.1 Project: Security Assessment Report
  27. 14.1 Project: Security Assessment Report
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
  6. 5.5 Basic Crypto Systems: Vigenere Cipher
  7. 6.1 Project: Classic Cipher Newscast
  8. 6.1 Project: Classic Cipher Newscast