for Louisiana 9-12 — South Carolina Computer Programming 2 with Python
Total Standards: 46Mapped: 32Completion: 69%
H.CS.1A
Analyze the levels of
interactions between application
software and system software as
well as the hardware layers.
Fundamentals of Cybersecurity
4.1 Operating Systems
H.CS.1B
Explain how abstractions
hide the underlying
implementation details of
computing systems embedded in
everyday things
Fundamentals of Cybersecurity
4.1 Operating Systems
H.CS.2A
Generate guidelines that
convey systematic
troubleshooting strategies that
other users can utilize to identify
and fix errors.
Fundamentals of Cybersecurity
7.2 Troubleshooting Methodology
E.NI.1A
Evaluate a network's
scalability, reliability, and
appropriateness by describing the
relationship between routers,
switches, devices, topology, and
addressing (MAC, IP, Subnet,
Gateway).
Fundamentals of Cybersecurity
5.6 Routing and Packets
6.5 Network Devices
6.7 Network Options
6.10 Network Communication
E.NI.1B
Illustrate how to trace data
through a network model,
explaining the interactions that
occur throughout the process.
Fundamentals of Cybersecurity
5.6 Routing and Packets
5.7 How Do Websites Work?
5.8 OSI Model
E.NI.1C
Describe and evaluate the
internet as a digital public
infrastructure (DPI) from the
highest level to the private service
provider level.
H.NI.2B
Recommend security
measures to address factors that
create trade-offs between the
usability and security of a
computing system.
South Carolina Computer Programming 2 with Python
8.1 Common Cyber Attacks and Prevention
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
H.NI.2A
Interpret and analyze
mechanisms through which
malware and other types of cyber
attacks can impact hardware,
software, and sensitive data.
South Carolina Computer Programming 2 with Python
8.1 Common Cyber Attacks and Prevention
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
H.NI.2C
Compare and contrast
how software developers protect
computing systems and
information from unauthorized
user access.
South Carolina Computer Programming 2 with Python
8.3 Security in Coding
Fundamentals of Cybersecurity
8.3 Security in Coding
H.DA.1A
Evaluate data
representations, propose
strategies to reconstruct the data,
and visualize data in a variety of
ways.
H.DA.1B
Define and describe
database structures to optimize
the search and retrieval of data.
H.DA.2A
Explain and describe the
impacts of uncertainty and the
limitations of data collection
technology and tools.
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
8.1 Data as a Resource
H.DA.2B
Describe the personal
and legal impacts of accumulated
data, both collected and derived,
for given scenarios. Propose tools
and techniques to manage the
accumulated data appropriately
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
8.1 Data as a Resource
H.DA.3A
Justify choices on how
data elements are organized and
where data is stored considering
cost, speed, reliability,
accessibility, privacy, and integrity.
H.DA.3B
Explain and utilize the
appropriate data structural
organization system to collaborate
and communicate data within a
team or user group in given
scenarios.
H.DA.4A
Create interactive data
visualizations using software tools
that explain complex data to
others.
H.DA.4B
Utilize data analysis tools
to ingest (extract, transform, and
load) and process data into
relevant information.
South Carolina Computer Programming 2 with Python
7.3 Exploring Data Using Python
7.4 Modules, Packages & Libraries
7.8 Selecting Columns
7.9 Using Functions
7.10 Mini-Project: Findings
H.DA.5A
Create a model utilizing
data with the appropriate
simulated variables to develop
predictions for real-world
phenomena.
H.DA.5B
Apply and evaluate data
analysis techniques to identify
patterns represented in complex
systems.
South Carolina Computer Programming 2 with Python
7.9 Using Functions
7.10 Mini-Project: Findings
H.DA.5C
Analyze patterns in data
visualizations, then select a
collection tool to test a hypothesis
and communicate the relevant
information to others.
H.DA.5D
Evaluate the impacts of
the variables and the model on the
performance of a simulation to
refine a hypothesis.
H.AP.1A
Assess variables, then
classify the scope and type of
variable.
South Carolina Computer Programming 2 with Python
1.4 Variables
3.6 Local Variables and Scope
H.AP.1B
Design algorithms that
can be adapted to express an idea
or solve a problem.
South Carolina Computer Programming 2 with Python
3.1 Functions and Parameters 1
3.2 Functions and Parameters 2
3.3 Functions and Parameters 3
3.8 Challenge: Ghosts
4.4 List Methods
H.AP.1C
Use and adapt classical
algorithms to solve computational
problems.
South Carolina Computer Programming 2 with Python
1.3 Hello World
1.4 Variables
1.5 User Input
1.6 Basic Math in Python
2.1 Booleans
2.2 Logical Operators
2.3 Comparison Operators
2.6 For Loops in Python
3.1 Functions and Parameters 1
3.7 Exceptions
H.AP.1D
Explain what computer
memory is and how variables are
stored and retrieved.
H.AP.1E
Identify and explain how a
derived data type can be utilized in
a real-world scenario.
South Carolina Computer Programming 2 with Python
4.4 List Methods
6.1 Classes and Objects
H.AP.2A
Justify the selection of
control structures to balance
implementation complexity,
maintainability, and program
performance.
South Carolina Computer Programming 2 with Python
5.4 Project Prep and Development
H.AP.2B
Design and iteratively
develop computational artifacts
using events to initiate
instructions.
South Carolina Computer Programming 2 with Python
5.1 Intro to Design Thinking
5.2 Prototype
5.3 Test
5.4 Project Prep and Development
H.AP.3A
Decompose problems
into smaller components using
constructs such as procedures,
modules, and/or objects.
South Carolina Computer Programming 2 with Python
3.1 Functions and Parameters 1
3.2 Functions and Parameters 2
3.3 Functions and Parameters 3
6.1 Classes and Objects
6.2 Methods
6.9 Modules
H.AP.3B
Create computational
artifacts using procedures within a
program, combinations of data and
procedures, or independent but
interrelated programs.
South Carolina Computer Programming 2 with Python
5.4 Project Prep and Development
6.1 Classes and Objects
H.AP.4A
Utilize the Software
Development Life Cycle (SDLC) to
create software that is a minimum
viable product.
H.AP.4B
Develop and utilize test
cases to verify that a program
performs according to the
program’s design specifications.
South Carolina Computer Programming 2 with Python
5.4 Project Prep and Development
H.AP.4C
Design and develop
programs by working in team roles
using version control systems,
integrated development
environments (IDEs), and
collaborative tools and practices.
South Carolina Computer Programming 2 with Python
5.4 Project Prep and Development
H.AP.4D
Evaluate licenses that
limit or restrict the use of
computational artifacts when
utilizing resources such as
libraries.
South Carolina Computer Programming 2 with Python
8.6 Responsibly Using Someone Else's Code
H.IC.1A
Analyze the key
milestones of computer science,
historical events influenced by
computer science, and the people
connected to these achievements.
Fundamentals of Cybersecurity
2.1 Cryptography: Then, Now, and Future
6.5 Network Devices
H.IC.1B
Explain how innovations in
computer science and technology
enable advancements in other
fields of study.
Fundamentals of Cybersecurity
5.9 Impact of the Internet
6.5 Network Devices
H.IC.2A
Evaluate the adoption and
adaptation of social norms from
the physical world to the cyber
world.
South Carolina Computer Programming 2 with Python
8.7 Digital Footprint and Responsibility
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
5.9 Impact of the Internet
H.IC.2B
Describe how cyberspace
is becoming a universal medium
for connecting humans, the
economy, business, and
computing.
South Carolina Computer Programming 2 with Python
8.7 Digital Footprint and Responsibility
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
5.9 Impact of the Internet
H.IC.2C
Describe and critique how
algorithmic feedback loops can
shape perceptions, reinforce a
limited data set, and limit the
sources of information that may
inform the individual user.
H.IC.3A
Debate laws and industry
regulations that impact the
development and use of
computational artifacts.
South Carolina Computer Programming 2 with Python
8.5 Ethics and Legal Considerations
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
H.IC.3B
Describe and analyze the
motives of online threat actors to a
user’s personal safety, privacy, and
well-being.
South Carolina Computer Programming 2 with Python
8.1 Common Cyber Attacks and Prevention
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
H.IC.3C
Compare and contrast the
varied approaches to govern data,
intellectual property, control
information access, and various
ways for users to be aware of
guidance.
South Carolina Computer Programming 2 with Python
8.4 Creative Credit & Copyright
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
1.5 Personal Data Security
H.IC.3D
Explain how the
interconnectedness of cyberspace
can lead to physical and digital
vulnerabilities.
South Carolina Computer Programming 2 with Python
8.1 Common Cyber Attacks and Prevention
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
1.7 Common Cyber Attacks and Prevention
H.IC.3E
Debate the ethical
considerations of creating and
publishing computational
artifacts.
South Carolina Computer Programming 2 with Python
8.5 Ethics and Legal Considerations
H.IC.3F
Analyze the data
provenance of computational
artifacts.
H.IC.3G
Explain how individuals
and organizations can exert
influence on personal and societal
perceptions and practices through
computing technologies.