Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming L2

29

Standards in this Framework

29

Standards Mapped

100%

Mapped to Course

Standard Lessons
L2.CS.HS.01
Categorize the roles of operating system software.
  1. Fundamentals of Cybersecurity (2020)
  2. 7.1 Operating Systems
  3. 7.2 Comparing Operating Systems
  4. 7.3 Compatibility
  5. IB Computer Science Standard Level
  6. 6.6 Operating Systems
L2.CS.T.01
Identify how hardware components facilitate logic, input, output, and storage in computing systems, and their common malfunctions.
  1. Fundamentals of Cybersecurity (2020)
  2. 10.1 Internal Components
  3. 10.2 Peripheral Devices
  4. IB Computer Science Standard Level
  5. 5.7 Network Administrator
  6. 6.1 Internal Components
  7. 6.2 Peripheral Devices
L2.NI.NCO.01
Describe the issues that impact network functionality (e.g., bandwidth, load, latency, topology).
  1. Fundamentals of Cybersecurity (2020)
  2. 9.4 Internet Hardware and Sending Information
  3. 10.5 Network Options
  4. IB Computer Science Standard Level
  5. 5.5 Private Networks
  6. 6.5 Network Options
L2.NI.C.01
Compare ways software developers protect devices and information from unauthorized access.
  1. Fundamentals of Cybersecurity (2020)
  2. 8.9 Common Security Problems
  3. 8.10 SQL Injection Overview
  4. 8.11 Types of SQLi and Prevention
  5. IB Computer Science Standard Level
  6. 5.6 Cybersecurity
L2.DA.CVT.01
Use data analysis tools and techniques to identify patterns in data representing complex systems.
  1. Data Science with Python
  2. 1.3 Exploring Data Using Python
  3. 2.3 Importing and Filtering Data
  4. 2.7 Interpret and Present
L2.DA.CVT.02
Select data collection tools and techniques, and use them to generate data sets that support a claim or communicate information.
  1. Data Science with Python
  2. 4.3 Aggregating Data
  3. 4.4 Combining Datasets
L2.DA.IM.01
Formulate, refine, and test scientific hypotheses using models and simulations.
  1. Data Science with Python
  2. 2.5 Data Cleaning
  3. 2.7 Interpret and Present
L2.AP.A.01
Critically examine and trace classic algorithms. Use and adapt classic algorithms to solve computational problems (e.g., selection sort, insertion sort, binary search, linear search).
  1. IB Computer Science Standard Level
  2. 14.5 Searching
  3. 14.6 Sorting
L2.AP.A.02
Develop an artificial intelligence algorithm to play a game against a human opponent or solve a real-world problem.
  1. IB Computer Science Standard Level
  2. 18.5 Topic 4: Computational Thinking, Problem-solving
L2.AP.A.03
Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency, correctness, and clarity.
  1. IB Computer Science Standard Level
  2. 14.5 Searching
  3. 14.6 Sorting
L2.AP.V.01
Compare and contrast simple data structures and their uses (e.g., lists, stacks, queues).
  1. IB Computer Science Standard Level
  2. 14.1 ArrayList
L2.AP.C.01
Trace the execution of recursion, illustrating output and changes in values of named variables.
  1. IB Computer Science Standard Level
  2. 17.1 Recursion
L2.AP.M.01
Construct solutions to problems using student-created components, such as procedures, modules, and/or objects.
  1. IB Computer Science Standard Level
  2. 11.2 Constructors
  3. 11.4 Accessor Methods
  4. 11.5 Mutator Methods
  5. 11.6 Writing Methods
  6. 12.4 Writing Classes
  7. 12.5 Writing Classes and Instance Methods
  8. 12.7 Class Methods and Class Variables
  9. Data Science with Python
  10. 7.14 Functions
  11. 7.15 Functions and Parameters
  12. 7.17 Functions and Return Values
L2.AP.M.02
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. Fundamentals of Cybersecurity (2020)
  2. 21.1 Challenge Problems
L2.AP.M.03
Demonstrate code reuse by creating programming solutions using libraries and APIs.
  1. IB Computer Science Standard Level
  2. 12.3 Using a Class as a Client
  3. 12.8 Wrapper Classes
  4. Data Science with Python
  5. 1.4 Modules, Packages & Libraries
L2.AP.PD.01
Plan and develop programs that will provide solutions to a variety of users using a software life cycle process.
  1. IB Computer Science Standard Level
  2. 18.5 Topic 4: Computational Thinking, Problem-solving
L2.AP.PD.02
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (e.g., code documentation) in a group software project.
  1. IB Computer Science Standard Level
  2. 3.4 Maintaining the System
L2.AP.PD.03
Develop programs for multiple computing platforms.
  1. IB Computer Science Standard Level
  2. 3.2 Planning for System Implementation
L2.AP.PD.04
Evaluate key qualities of a program through a process such as a code review (e.g., qualities could include correctness, usability, readability, efficiency, portability, and scalability).
  1. IB Computer Science Standard Level
  2. 1.19 Karel Challenges
L2.AP.PD.05
Develop and use a series of test cases to verify that a program performs according to its design specifications
  1. IB Computer Science Standard Level
  2. 2.6 Test
L2.AP.PD.06
Explain security issues that might lead to compromised computer programs.
  1. Fundamentals of Cybersecurity (2020)
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
  8. IB Computer Science Standard Level
  9. 5.6 Cybersecurity
  10. 6.8 Browser Configuration
L2.AP.PD.07
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
  1. IB Computer Science Standard Level
  2. 2.4 Ideate
L2.AP.PD.08
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. Fundamentals of Cybersecurity (2020)
  2. 4.1 Programming Concepts
L2.IC.C.01
Evaluate the beneficial and harmful effects that computational artifacts and innovations have on society.
  1. Fundamentals of Cybersecurity (2020)
  2. 1.2 What is Cybersecurity?
  3. 7.4 Software and Applications
  4. 9.10 Impact of the Internet
  5. IB Computer Science Standard Level
  6. 5.8 The Impact of the Internet
  7. 6.7 Software and Applications
  8. 11.10 Ethical and Social Implications of Computing
L2.IC.C.02
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. Fundamentals of Cybersecurity (2020)
  2. 9.1 Introduction to the Internet
  3. 9.10 Impact of the Internet
  4. IB Computer Science Standard Level
  5. 11.10 Ethical and Social Implications of Computing
L2.IC.C.03
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. Fundamentals of Cybersecurity (2020)
  2. 9.10 Impact of the Internet
  3. IB Computer Science Standard Level
  4. 5.8 The Impact of the Internet
L2.IC.SI.01
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. Fundamentals of Cybersecurity (2020)
  2. 2.1 Digital Footprint and Reputation
  3. 2.2 Cyberbullying
  4. 2.3 Internet Safety
L2.IC.SLE.01
Debate laws and regulations that impact the development and use of software and technology.
  1. Fundamentals of Cybersecurity (2020)
  2. 2.6 Creative Credit & Copyright
  3. IB Computer Science Standard Level
  4. 14.7 Ethical Issues Around Data Collection
L2.IC.SLE.02
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. Fundamentals of Cybersecurity (2020)
  2. 1.2 What is Cybersecurity?
  3. 2.1 Digital Footprint and Reputation
  4. 2.2 Cyberbullying
  5. 2.4 Privacy & Security
  6. 2.6 Creative Credit & Copyright