Please enable JavaScript to use CodeHS

Standards Mapping

for Connecticut 2

23

Standards in this Framework

15

Standards Mapped

65%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.4 Functions in Karel
  2. 1.4 Functions in Karel
  3. 1.5 The Start Function
  4. 1.5 The Start Function
  5. 1.6 Top Down Design and Decomposition in Karel
  6. 1.6 Top Down Design and Decomposition in Karel
  7. 1.7 Commenting Your Code
  8. 1.7 Commenting Your Code
  9. 1.16 Karel Challenges
  10. 1.16 Karel Challenges
  11. 13.10 Top Down Design
  12. 13.10 Top Down Design
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 11.1 Extra Karel Practice
  2. 11.1 Extra Karel Practice
  3. 12.1 Extra Karel Puzzles
  4. 12.1 Extra Karel Puzzles
  5. 13.7 Naming Guidelines
  6. 13.7 Naming Guidelines
  7. 13.11 Variables
  8. 13.11 Variables
  9. 13.12 User Input
  10. 13.12 User Input
  11. 13.13 Parameters
  12. 13.13 Parameters
  13. 13.16 If Statements
  14. 13.16 If Statements
  15. 13.17 If/ Else Statements
  16. 13.17 If/ Else Statements
  17. 13.18 While Loops
  18. 13.18 While Loops
  19. 13.19 Putting Together Control Structures
  20. 13.19 Putting Together Control Structures
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.12 While Loops in Karel
  2. 1.12 While Loops in Karel
  3. 1.13 Control Structures Example
  4. 1.13 Control Structures Example
  5. 11.1 Extra Karel Practice
  6. 11.1 Extra Karel Practice
  7. 12.1 Extra Karel Puzzles
  8. 12.1 Extra Karel Puzzles
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.16 Karel Challenges
  2. 1.16 Karel Challenges
  3. 13.11 Variables
  4. 13.11 Variables
  5. 13.14 Using i in For Loops
  6. 13.14 Using i in For Loops
  7. 13.15 Extended Loop Control
  8. 13.15 Extended Loop Control
  9. 13.16 If Statements
  10. 13.16 If Statements
  11. 13.17 If/ Else Statements
  12. 13.17 If/ Else Statements
  13. 13.18 While Loops
  14. 13.18 While Loops
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.16 Karel Challenges
  2. 1.16 Karel Challenges
  3. 11.1 Extra Karel Practice
  4. 11.1 Extra Karel Practice
  5. 12.1 Extra Karel Puzzles
  6. 12.1 Extra Karel Puzzles
  7. 13.16 If Statements
  8. 13.16 If Statements
  9. 13.17 If/ Else Statements
  10. 13.17 If/ Else Statements
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 5.1 Project: Your First Website
  2. 5.1 Project: Your First Website
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 1.10 If Statements
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 8.1 Project: The Effects of the Internet
  2. 13.6 Comments
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 1.16 Karel Challenges
  2. 1.16 Karel Challenges
  3. 11.1 Extra Karel Practice
  4. 11.1 Extra Karel Practice
  5. 12.1 Extra Karel Puzzles
  6. 12.1 Extra Karel Puzzles
  7. 13.6 Comments
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
2-CS-03
Systematically identify and fix problems with computing devices and their components.
2-DA-07
Represent data using multiple encoding schemes.
  1. 6.1 Intro to Digital Information
  2. 6.1 Intro to Digital Information
  3. 6.2 Number Systems
  4. 6.2 Number Systems
  5. 6.3 Encoding Text with Binary
  6. 6.3 Encoding Text with Binary
  7. 6.4 Pixel Images
  8. 6.4 Pixel Images
  9. 6.5 Hexadecimal
  10. 6.5 Hexadecimal
  11. 6.6 Pixel Colors!
  12. 6.6 Pixel Colors!
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
2-DA-09
Refine computational models based on the data they have generated.
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 2.1 History of Computers
  2. 2.1 History of Computers
  3. 2.5 Future of Computing
  4. 2.5 Future of Computing
  5. 3.1 Computer Model
  6. 3.1 Computer Model
  7. 7.1 Intro to the Internet
  8. 7.1 Intro to the Internet
  9. 7.7 The Impact of the Internet
  10. 7.7 The Impact of the Internet
  11. 8.1 Project: The Effects of the Internet
  12. 8.1 Project: The Effects of the Internet
  13. 9.1 Digital Footprint and Reputation
  14. 9.1 Digital Footprint and Reputation
  15. 9.2 Cyberbullying
  16. 9.2 Cyberbullying
  17. 9.3 Internet Safety
  18. 9.3 Internet Safety
  19. 9.4 Privacy & Security
  20. 9.4 Privacy & Security
  21. 9.5 Information Literacy
  22. 9.5 Information Literacy
  23. 9.6 Creative Credit & Copyright
  24. 9.6 Creative Credit & Copyright
  25. 10.1 Project: Public Service Announcement
  26. 10.1 Project: Public Service Announcement
  27. 15.1 Module Overview - Cybersecurity
  28. 15.1 Module Overview - Cybersecurity
  29. 15.2 What is Cybersecurity?
  30. 15.2 What is Cybersecurity?
  31. 15.3 Impact of Cybersecurity
  32. 15.3 Impact of Cybersecurity
  33. 15.4 The CIA Triad
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 9.2 Cyberbullying
  2. 9.2 Cyberbullying
  3. 10.1 Project: Public Service Announcement
  4. 10.1 Project: Public Service Announcement
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 7.1 Intro to the Internet
  2. 7.1 Intro to the Internet
  3. 7.7 The Impact of the Internet
  4. 7.7 The Impact of the Internet
  5. 8.1 Project: The Effects of the Internet
  6. 8.1 Project: The Effects of the Internet
  7. 9.1 Digital Footprint and Reputation
  8. 9.1 Digital Footprint and Reputation
  9. 9.2 Cyberbullying
  10. 9.2 Cyberbullying
  11. 9.3 Internet Safety
  12. 9.3 Internet Safety
  13. 9.4 Privacy & Security
  14. 9.4 Privacy & Security
  15. 9.6 Creative Credit & Copyright
  16. 9.6 Creative Credit & Copyright
  17. 10.1 Project: Public Service Announcement
  18. 10.1 Project: Public Service Announcement
  19. 15.2 What is Cybersecurity?
  20. 15.2 What is Cybersecurity?
  21. 15.3 Impact of Cybersecurity
  22. 15.3 Impact of Cybersecurity
  23. 15.4 The CIA Triad
  24. 15.4 The CIA Triad
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 4.13 Viewing Websites
  2. 4.13 Viewing Websites
  3. 7.1 Intro to the Internet
  4. 7.1 Intro to the Internet
  5. 7.2 Internet Hardware
  6. 7.2 Internet Hardware
  7. 7.3 Internet Addresses
  8. 7.3 Internet Addresses
  9. 7.4 DNS
  10. 7.4 DNS
  11. 7.5 Routing
  12. 7.5 Routing
  13. 7.6 Packets and Protocols
  14. 7.6 Packets and Protocols
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 9.3 Internet Safety
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
  4. 9.4 Privacy & Security
  5. 10.1 Project: Public Service Announcement
  6. 10.1 Project: Public Service Announcement
  7. 15.2 What is Cybersecurity?
  8. 15.3 Impact of Cybersecurity
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.