Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computer Science 2

61

Standards in this Framework

38

Standards Mapped

62%

Mapped to Course

Standard Lessons
CSII-1.1
Document problem analysis through industry standards such as: flowcharts, functional specifications, user stories, etc.
CSII-1.2
Outline the problem assigned and describe the solution.
  1. 2.6 Top Down Design and Decomposition in Karel
CSII-1.3
Use puzzles and games to enhance problem solving skills.
  1. 2.1 Introduction to Programming With Karel
  2. 2.2 More Basic Karel
  3. 2.3 Karel Can't Turn Right
  4. 2.4 Functions in Karel
  5. 2.5 The Start Function
  6. 2.6 Top Down Design and Decomposition in Karel
  7. 2.7 Commenting Your Code
  8. 2.9 Super Karel
  9. 2.10 For Loops
  10. 2.11 If Statements
  11. 2.12 If/Else Statements
  12. 2.13 While Loops in Karel
  13. 2.14 Control Structures Example
  14. 2.15 More Karel Examples and Testing
  15. 3.2 Challenge Problems
CSII-1.4
Recognize language appropriate planning and designing tools (for example: flowcharts, UML diagrams, pseudocode, use cases).
CSII-1.5
Modify an existing program, such as a template, to add additional functionality and discuss intended and unintended implications.
CSII-1.6
Justify what programming methodology to use (object oriented or procedural).
  1. 17.4 When Do I Use an Object?
CSII-2.1
Design a solution to a problem by working in a team.
CSII-2.2
Explore technologies that can be used to collaborate with others of various cultures and career fields.
  1. 1.12 Project: Public Service Announcement
CSII-2.3
Utilize a problem solving approach to develop a solution using technology.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-2.4
Analyze the work of peers and provide feedback.
CSII-2.5
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices in a group software project.
CSII-3.1
Develop algorithms to determine a solution.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-3.2
Assess the use of algorithms to provide a solution.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-3.3
Create pseudocode to describe a solution.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-3.4
Create a program flowchart using ANSI standard flowcharting symbols to define a solution.
CSII-3.5
Explain how the algorithm can be used to solve a problem.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-3.6
Apply Boolean logic and relational operations.
  1. 7.1 Booleans
  2. 7.2 Logical Operators
  3. 7.3 Comparison Operators
  4. 7.4 If Statements
CSII-3.7
Demonstrate iteration in an algorithm.
CSII-3.8
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-3.9
Illustrate the flow of execution of a recursive algorithm.
CSII-3.10
Integrate classic algorithms (sorting and searching) to solve computational problems.
CSII-3.11
Demonstrate the different methods for encoding data such as binary, decimal, hexadecimal, ASCII, and Unicode.
CSII-4.1
Define the process of programming.
  1. 2.1 Introduction to Programming With Karel
  2. 2.5 The Start Function
CSII-4.2
Plan and develop programs for broad audiences using a software development lifecycle process (such as: Agile, waterfall, and spiral).
CSII-4.3
Adhere to industry standard programming conventions for accuracy and readability.
  1. 2.7 Commenting Your Code
  2. 2.16 How to Indent Your Code
  3. 5.2 Variables
CSII-4.4
Demonstrate code reuse by creating programming solutions using libraries and APIs.
CSII-4.5
Create an advanced computer program that corresponds to an algorithm or proposed solution.
  1. 3.2 Challenge Problems
CSII-4.6
Implement fundamental programming constructs, including data types, control structures, methods, and arrays.
  1. 2.10 For Loops
  2. 2.11 If Statements
  3. 2.12 If/Else Statements
  4. 2.13 While Loops in Karel
  5. 2.14 Control Structures Example
  6. 7.4 If Statements
  7. 7.5 For Loops in JavaScript
  8. 7.6 General For Loops
  9. 7.7 For Loop Practice
  10. 7.9 While Loops
  11. 9.11 Intro to Lists/Arrays
  12. 9.12 Adding/Removing From an Array
  13. 9.13 Array Length and Looping Through Arrays
  14. 9.14 Iterating Over an Array
  15. 16.1 Indexing Into an Array
  16. 16.2 Finding an Element in a List
  17. 16.3 Removing an Element From an Array
CSII-4.7
Compare local scope and global scope.
CSII-4.8
Create programmer defined functions and methods to break down program logic and support reuse.
  1. 2.4 Functions in Karel
  2. 2.6 Top Down Design and Decomposition in Karel
  3. 9.1 Functions and Parameters 1
  4. 9.2 Functions and Parameters 2
  5. 9.3 Functions and Parameters 3
  6. 9.4 Functions and Return Values 1
  7. 9.5 Functions and Return Values 2
CSII-4.9
Recognize the order of operations used by a computer when performing calculations.
  1. 5.4 Basic Math in JavaScript
CSII-4.10
Implement simple and compound conditionals (Boolean - not, and, or).
  1. 7.1 Booleans
  2. 7.2 Logical Operators
  3. 7.3 Comparison Operators
  4. 7.4 If Statements
CSII-4.11
Demonstrate the relationship between classes and objects (instances).
CSII-4.12
Demonstrate the differences between instance variables and class variables
CSII-4.13
Demonstrate the differences between instance methods and class methods.
CSII-4.14
Apply inheritance, polymorphism, encapsulation, and abstraction in the context of Object Oriented Programming.
CSII-4.15
Compare the graphical user interface and the command line interface.
CSII-5.1
Predict and explain programming outcomes.
  1. 3.2 Challenge Problems
  2. 15.5 Animation and Games Quiz
CSII-52
Identify cause/effect for input/output.
  1. 3.2 Challenge Problems
  2. 9.1 Functions and Parameters 1
  3. 9.2 Functions and Parameters 2
  4. 9.3 Functions and Parameters 3
  5. 9.4 Functions and Return Values 1
  6. 9.5 Functions and Return Values 2
  7. 15.5 Animation and Games Quiz
CSII-5.3
Understand input validation
  1. 5.3 User Input
CSII-5.4
Develop and use a series of test cases to verify that a program performs according to its design specifications.
  1. 3.2 Challenge Problems
CSII-5.5
Peer review documentation and code.
CSII-5.6
Differentiate between syntax, logic, and semantic errors.
  1. 2.17 Debugging Strategies
CSII-5.7
Debug code using techniques such as: code tracing, print statements, boundary testing, breakpoints, etc.
  1. 2.17 Debugging Strategies
CSII-5.8
Review computing artifacts to reduce bias, increase equity, and support accessibility.
CSII-6.1
Describe the function of a computing artifact (for example, code or design).
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-6.2
Identify the purposes of a computing artifact.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-6.3
Explain concepts related to a computing artifact.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-6.4
Describe how to use a computing artifact.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.14 Control Structures Example
  3. 3.2 Challenge Problems
CSII-6.5
Explain cause/effect by interpreting input and output.
  1. 3.2 Challenge Problems
  2. 9.1 Functions and Parameters 1
  3. 9.2 Functions and Parameters 2
  4. 9.3 Functions and Parameters 3
  5. 9.4 Functions and Return Values 1
  6. 9.5 Functions and Return Values 2
  7. 15.5 Animation and Games Quiz
CSII-6.6
Create documentation for computing artifact such as comments or user manual/readme.
  1. 2.7 Commenting Your Code
CSII-7.1
Examine the dynamic between privacy and security.
  1. 1.6 Privacy & Security
CSII-7.2
Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 1.6 Privacy & Security
  2. 1.9 Data Collection & Limitations
CSII-7.3
Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 1.6 Privacy & Security
CSII-7.4
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.1 What is Cybersecurity?
CSII-7.5
Discuss the concepts and justifications for using secure design techniques.
CSII-7.6
Discuss the laws surrounding intellectual property.
  1. 1.10 Creative Credit & Copyright
CSII-8.1
Identify computer science occupations and the roles and responsibilities of each.
  1. 1.11 Hacking Ethics
CSII-8.2
Report job outlook, demand, and projected wages for computer science careers.
  1. 1.11 Hacking Ethics
CSII-8.3
Explore the job opportunities that are available in computer science.
  1. 1.11 Hacking Ethics
CSII-8.4
Investigate post-secondary training opportunities and industry certifications that are available.