Please enable JavaScript to use CodeHS

Standards Mapping

for Connecticut 2

23

Standards in this Framework

15

Standards Mapped

65%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.4 Functions in Karel
  2. 1.5 The Start Function
  3. 1.6 Top Down Design and Decomposition in Karel
  4. 1.7 Commenting Your Code
  5. 1.16 Karel Challenges
  6. 13.10 Top Down Design
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 11.1 Extra Karel Practice
  2. 12.1 Extra Karel Puzzles
  3. 13.7 Naming Guidelines
  4. 13.11 Variables
  5. 13.12 User Input
  6. 13.13 Parameters
  7. 13.16 If Statements
  8. 13.17 If/ Else Statements
  9. 13.18 While Loops
  10. 13.19 Putting Together Control Structures
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.12 While Loops in Karel
  2. 1.13 Control Structures Example
  3. 11.1 Extra Karel Practice
  4. 12.1 Extra Karel Puzzles
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.16 Karel Challenges
  2. 13.11 Variables
  3. 13.14 Using i in For Loops
  4. 13.15 Extended Loop Control
  5. 13.16 If Statements
  6. 13.17 If/ Else Statements
  7. 13.18 While Loops
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.16 Karel Challenges
  2. 11.1 Extra Karel Practice
  3. 12.1 Extra Karel Puzzles
  4. 13.16 If Statements
  5. 13.17 If/ Else Statements
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 5.1 Project: Your First Website
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 1.10 If Statements
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 8.1 Project: The Effects of the Internet
  2. 13.6 Comments
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 1.16 Karel Challenges
  2. 11.1 Extra Karel Practice
  3. 12.1 Extra Karel Puzzles
  4. 13.6 Comments
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
2-CS-03
Systematically identify and fix problems with computing devices and their components.
2-DA-07
Represent data using multiple encoding schemes.
  1. 6.1 Intro to Digital Information
  2. 6.2 Number Systems
  3. 6.3 Encoding Text with Binary
  4. 6.4 Pixel Images
  5. 6.5 Hexadecimal
  6. 6.6 Pixel Colors!
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
2-DA-09
Refine computational models based on the data they have generated.
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 3.1 Computer Model
  4. 7.1 Intro to the Internet
  5. 7.7 The Impact of the Internet
  6. 8.1 Project: The Effects of the Internet
  7. 9.1 Digital Footprint and Reputation
  8. 9.2 Cyberbullying
  9. 9.3 Internet Safety
  10. 9.4 Privacy & Security
  11. 9.5 Information Literacy
  12. 9.6 Creative Credit & Copyright
  13. 10.1 Project: Public Service Announcement
  14. 15.1 Module Overview - Cybersecurity
  15. 15.2 What is Cybersecurity?
  16. 15.3 Impact of Cybersecurity
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 9.2 Cyberbullying
  2. 10.1 Project: Public Service Announcement
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 7.1 Intro to the Internet
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
  4. 9.1 Digital Footprint and Reputation
  5. 9.2 Cyberbullying
  6. 9.3 Internet Safety
  7. 9.4 Privacy & Security
  8. 9.6 Creative Credit & Copyright
  9. 10.1 Project: Public Service Announcement
  10. 15.2 What is Cybersecurity?
  11. 15.3 Impact of Cybersecurity
  12. 15.4 The CIA Triad
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 4.13 Viewing Websites
  2. 7.1 Intro to the Internet
  3. 7.2 Internet Hardware
  4. 7.3 Internet Addresses
  5. 7.4 DNS
  6. 7.5 Routing
  7. 7.6 Packets and Protocols
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
  3. 10.1 Project: Public Service Announcement
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.