Please enable JavaScript to use CodeHS

Standards Mapping

for CSTA 2


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 3.5 Top Down Design
  2. 5.3 Comments & Pseudocode
Create clearly named variables that represent different data types and perform operations on their values.
  1. 3.2 Naming Guidelines
  2. 4.1 Variables
  3. 4.2 User Input
  4. 4.3 Parameters
  5. 5.4 Variables
  6. 6.1 If Statements
  7. 6.2 If/ Else Statements
  8. 6.3 While Loops
  9. 8.1 Putting Together Control Structures
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 7.1 For Loops
  2. 7.2 While Loops
  3. 7.4 If/Else Statements
  4. 9.1 micro:bit Challenges
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 4.1 Variables
  2. 4.4 Using i in For Loops
  3. 4.5 Extended Loop Control
  4. 5.3 Comments & Pseudocode
  5. 6.1 If Statements
  6. 6.2 If/ Else Statements
  7. 6.3 While Loops
Create procedures with parameters to organize code and make it easier to reuse.
  1. 6.1 If Statements
  2. 6.2 If/ Else Statements
  3. 7.5 Functions
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 9.4 Final Project
Incorporate existing code, media, and libraries into original programs, and give attribution.
Systematically test and refine programs using a range of test cases.
  1. 7.1 For Loops
  2. 7.2 While Loops
  3. 7.3 Operators
  4. 7.4 If/Else Statements
  5. 7.5 Functions
  6. 9.1 micro:bit Challenges
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 9.1 micro:bit Challenges
  2. 9.4 Final Project
Document programs in order to make them easier to follow, test, and debug.
  1. 3.1 Comments
  2. 5.3 Comments & Pseudocode
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 9.4 Final Project
Design projects that combine hardware and software components to collect and exchange data.
  1. 5.2 Setting Up your micro:bit
  2. 5.3 Comments & Pseudocode
  3. 5.4 Variables
  4. 7.3 Operators
  5. 7.4 If/Else Statements
  6. 7.5 Functions
Systematically identify and fix problems with computing devices and their components.
Represent data using multiple encoding schemes.
Collect data using computational tools and transform the data to make it more useful and reliable.
Refine computational models based on the data they have generated.
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
Discuss issues of bias and accessibility in the design of existing technologies.
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
Describe tradeoffs between allowing information to be public and keeping information private and secure.
Model the role of protocols in transmitting data across networks and the Internet.
Explain how physical and digital security measures protect electronic information.
Apply multiple methods of encryption to model the secure transmission of information.