Please enable JavaScript to use CodeHS

Standards Mapping

for New Mexico 2

23

Standards in this Framework

23

Standards Mapped

100%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.10 Top Down Design
  2. 1.10 Top Down Design
  3. 3.3 Comments & Pseudocode
  4. 11.4 Functions in Karel
  5. 11.4 Functions in Karel
  6. 11.5 The Start Function
  7. 11.5 The Start Function
  8. 11.6 Top Down Design and Decomposition in Karel
  9. 11.6 Top Down Design and Decomposition in Karel
  10. 11.7 Commenting Your Code
  11. 11.7 Commenting Your Code
  12. 11.16 Karel Challenges
  13. 11.16 Karel Challenges
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 1.7 Naming Guidelines
  2. 1.7 Naming Guidelines
  3. 1.11 Variables
  4. 1.11 Variables
  5. 1.12 User Input
  6. 1.12 User Input
  7. 1.13 Parameters
  8. 1.13 Parameters
  9. 1.16 If Statements
  10. 1.16 If Statements
  11. 1.17 If/ Else Statements
  12. 1.17 If/ Else Statements
  13. 1.18 While Loops
  14. 1.18 While Loops
  15. 1.19 Putting Together Control Structures
  16. 1.19 Putting Together Control Structures
  17. 3.4 Variables
  18. 12.1 Extra Karel Puzzles
  19. 12.1 Extra Karel Puzzles
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 11.12 While Loops in Karel
  2. 11.12 While Loops in Karel
  3. 11.13 Control Structures Example
  4. 11.13 Control Structures Example
  5. 12.1 Extra Karel Puzzles
  6. 12.1 Extra Karel Puzzles
  7. 14.1 For Loops
  8. 14.2 While Loops
  9. 14.4 If/Else Statements
  10. 15.1 micro:bit Challenges
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.11 Variables
  2. 1.11 Variables
  3. 1.14 Using i in For Loops
  4. 1.14 Using i in For Loops
  5. 1.15 Extended Loop Control
  6. 1.15 Extended Loop Control
  7. 1.16 If Statements
  8. 1.16 If Statements
  9. 1.17 If/ Else Statements
  10. 1.17 If/ Else Statements
  11. 1.18 While Loops
  12. 1.18 While Loops
  13. 3.3 Comments & Pseudocode
  14. 11.16 Karel Challenges
  15. 11.16 Karel Challenges
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.16 If Statements
  2. 1.16 If Statements
  3. 1.17 If/ Else Statements
  4. 1.17 If/ Else Statements
  5. 11.16 Karel Challenges
  6. 11.16 Karel Challenges
  7. 12.1 Extra Karel Puzzles
  8. 12.1 Extra Karel Puzzles
  9. 14.5 Functions
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.5 Prototype
  3. 15.4 Final Project
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 6.6 Copyright
  2. 6.10 Project: Your First Website, Pt 1
  3. 6.16 Project: Your First Website, Pt 2
  4. 7.7 Build Your Website!
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 11.10 If Statements
  3. 11.11 If/Else Statements
  4. 11.12 While Loops in Karel
  5. 11.13 Control Structures Example
  6. 11.14 More Karel Examples and Testing
  7. 11.16 Karel Challenges
  8. 14.1 For Loops
  9. 14.2 While Loops
  10. 14.3 Operators
  11. 14.4 If/Else Statements
  12. 14.5 Functions
  13. 15.1 micro:bit Challenges
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 1.6 Comments
  2. 10.1 Project: The Effects of the Internet
  3. 15.1 micro:bit Challenges
  4. 15.4 Final Project
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 1.6 Comments
  2. 3.3 Comments & Pseudocode
  3. 11.16 Karel Challenges
  4. 11.16 Karel Challenges
  5. 12.1 Extra Karel Puzzles
  6. 12.1 Extra Karel Puzzles
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 7.5 Prototype
  2. 15.4 Final Project
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
  1. 3.2 Setting Up your micro:bit
  2. 3.3 Comments & Pseudocode
  3. 3.4 Variables
  4. 14.3 Operators
  5. 14.4 If/Else Statements
  6. 14.5 Functions
2-CS-03
Systematically identify and fix problems with computing devices and their components.
  1. 2.6 Troubleshooting
2-DA-07
Represent data using multiple encoding schemes.
  1. 8.1 Intro to Digital Information
  2. 8.1 Intro to Digital Information
  3. 8.2 Number Systems
  4. 8.2 Number Systems
  5. 8.3 Encoding Text with Binary
  6. 8.3 Encoding Text with Binary
  7. 8.4 Pixel Images
  8. 8.4 Pixel Images
  9. 8.5 Hexadecimal
  10. 8.5 Hexadecimal
  11. 8.6 Pixel Colors!
  12. 8.6 Pixel Colors!
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. 7.2 Empathy
2-DA-09
Refine computational models based on the data they have generated.
  1. 1.20 Using Data to Refine Game Mechanics
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 2.1 History of Computers
  2. 2.1 History of Computers
  3. 2.5 Future of Computing
  4. 2.5 Future of Computing
  5. 4.1 Digital Footprint and Reputation
  6. 4.1 Digital Footprint and Reputation
  7. 4.2 Cyberbullying
  8. 4.2 Cyberbullying
  9. 4.3 Internet Safety
  10. 4.3 Internet Safety
  11. 4.4 Privacy & Security
  12. 4.4 Privacy & Security
  13. 4.5 Project: Public Service Announcement
  14. 4.5 Project: Public Service Announcement
  15. 5.1 Cryptography, Cryptology, Cryptanalysis
  16. 5.1 Cryptography, Cryptology, Cryptanalysis
  17. 5.2 History of Cryptography
  18. 5.2 History of Cryptography
  19. 9.1 Intro to the Internet
  20. 9.1 Intro to the Internet
  21. 9.7 The Impact of the Internet
  22. 9.7 The Impact of the Internet
  23. 13.1 Module Overview - Cybersecurity
  24. 13.1 Module Overview - Cybersecurity
  25. 13.2 What is Cybersecurity?
  26. 13.2 What is Cybersecurity?
  27. 13.3 Impact of Cybersecurity
  28. 13.3 Impact of Cybersecurity
  29. 13.4 The CIA Triad
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 4.2 Cyberbullying
  2. 4.2 Cyberbullying
  3. 4.5 Project: Public Service Announcement
  4. 4.5 Project: Public Service Announcement
  5. 7.3 Define
  6. 7.3 Define
  7. 7.5 Prototype
  8. 7.5 Prototype
  9. 7.6 Test
  10. 7.6 Test
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 7.3 Define
  2. 7.3 Define
  3. 7.5 Prototype
  4. 7.5 Prototype
  5. 7.6 Test
  6. 7.6 Test
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 4.1 Digital Footprint and Reputation
  2. 4.1 Digital Footprint and Reputation
  3. 4.2 Cyberbullying
  4. 4.2 Cyberbullying
  5. 4.3 Internet Safety
  6. 4.3 Internet Safety
  7. 4.4 Privacy & Security
  8. 4.4 Privacy & Security
  9. 4.5 Project: Public Service Announcement
  10. 4.5 Project: Public Service Announcement
  11. 5.2 History of Cryptography
  12. 5.2 History of Cryptography
  13. 9.1 Intro to the Internet
  14. 9.1 Intro to the Internet
  15. 9.7 The Impact of the Internet
  16. 9.7 The Impact of the Internet
  17. 13.2 What is Cybersecurity?
  18. 13.2 What is Cybersecurity?
  19. 13.3 Impact of Cybersecurity
  20. 13.3 Impact of Cybersecurity
  21. 13.4 The CIA Triad
  22. 13.4 The CIA Triad
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 6.9 Viewing Websites
  2. 6.9 Viewing Websites
  3. 9.1 Intro to the Internet
  4. 9.1 Intro to the Internet
  5. 9.2 Internet Hardware
  6. 9.2 Internet Hardware
  7. 9.3 Internet Addresses
  8. 9.3 Internet Addresses
  9. 9.4 DNS
  10. 9.4 DNS
  11. 9.5 Routing
  12. 9.5 Routing
  13. 9.6 Packets and Protocols
  14. 9.6 Packets and Protocols
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 4.3 Internet Safety
  2. 4.3 Internet Safety
  3. 4.4 Privacy & Security
  4. 4.4 Privacy & Security
  5. 4.5 Project: Public Service Announcement
  6. 4.5 Project: Public Service Announcement
  7. 5.1 Cryptography, Cryptology, Cryptanalysis
  8. 5.1 Cryptography, Cryptology, Cryptanalysis
  9. 5.2 History of Cryptography
  10. 5.2 History of Cryptography
  11. 13.2 What is Cybersecurity?
  12. 13.3 Impact of Cybersecurity
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
  6. 5.5 Basic Crypto Systems: Vigenere Cipher