for Oklahoma Level 2 — Oklahoma Advanced Programming
Total Standards: 31Mapped: 31Completion: 100%
L2.CS.D.01
Model how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
Oklahoma Advanced Programming
7.13 The Internet Quiz
8.3 Operating Systems
Oklahoma Cybersecurity
4.1 Operating Systems
5.1 Computers Speak Binary
L2.CS.HS.01
Identify and categorize the roles of a variety of operating system software.
Oklahoma Advanced Programming
7.13 The Internet Quiz
8.3 Operating Systems
8.4 Comparing Operating Systems
Oklahoma Cybersecurity
4.1 Operating Systems
4.3 Comparing Operating Systems
L2.CS.T.01
Illustrate how understanding the ways hardware components facilitate logic, input, output, and storage in computing systems will support troubleshooting.
Oklahoma Advanced Programming
8.1 Hardware
8.2 Peripheral Devices
Oklahoma Cybersecurity
6.1 Internal Components
6.3 Peripheral Devices
6.4 Storage Options
7.2 Troubleshooting Methodology
L2.NI.NCO.01
Describe the issues that impact network functionality (e.g., bandwidth, load, latency, topology).
Oklahoma Advanced Programming
7.2 Internet Hardware and Sending Information
7.13 The Internet Quiz
Oklahoma Cybersecurity
5.7 Routing and Packets
5.8 How Do Websites Work?
5.9 OSI Model
L2.NI.CY.01
Compare and refine ways in which software developers protect devices and information from unauthorized access.
Oklahoma Advanced Programming
7.9 Cybersecurity
Oklahoma Cybersecurity
8.3 Security in Coding
L2.DA.S.01
Convert and compare different bit representations of data types, such as characters, numbers, and images.
Oklahoma Advanced Programming
6.3 Encoding Text with Binary
6.4 Pixel Images
6.5 Hexadecimal
6.6 Pixel Colors!
6.11 Digital Information Quiz
Oklahoma Cybersecurity
5.2 Bits, Text, and Numbers
5.3 Encoding Images in Binary
L2.DA.S.02
Evaluate the trade-offs in how data is organized and stored digitally.
Oklahoma Advanced Programming
6.8 Data Compression
6.9 Lossy Compression
6.11 Digital Information Quiz
Oklahoma Cybersecurity
8.2 Using Databases
L2.DA.CVT.01
Use data analysis tools and techniques to identify patterns from complex real-world data.
Oklahoma Advanced Programming
10.11 Bias in Data Analytics
10.13 Data Science for Business Quiz
L2.DA.CVT.02
Generate data sets that use a variety of data collection tools and analysis techniques to support a claim and/or communicate information.
Oklahoma Advanced Programming
9.3 Gathering Data
10.10 Your Business Data
10.13 Data Science for Business Quiz
L2.DA.IM.01
Use models and simulations to help plan, conduct, and refine investigations.
Oklahoma Advanced Programming
5.5 Simulation
L2.AP.A.01
Model and use appropriate terminology to describe how artificial intelligence algorithms drive many software and physical systems (e.g., autonomous robots, pattern recognition, text analysis).
Oklahoma Advanced Programming
11.1 Human & Artificial Intelligence
Oklahoma Cybersecurity
1.3 Can All Information Be Trusted?
L2.AP.A.02
Develop an artificial intelligence algorithm to play a game against a human opponent or solve a real-world problem.
Oklahoma Advanced Programming
11.2 Artificial Intelligence in Gaming
11.3 Building Tic Tac Toe
11.4 Creating a Non Player Character
L2.AP.A.03
Critically examine and trace classic algorithms (e.g., selection sort, insertion sort, binary search, linear search).
Oklahoma Advanced Programming
5.3 For Loops and Lists
5.7 Basic Data Structures Quiz
AP Computer Science A (Nitro)
7.5 Searching
7.6 Sorting
7.8 ArrayList Quiz
11.2 Recursive Searching
11.3 Recursive Sorting
11.4 Recursion Quiz
L2.AP.A.04
Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency and clarity.
Oklahoma Advanced Programming
5.3 For Loops and Lists
5.7 Basic Data Structures Quiz
AP Computer Science A (Nitro)
4.5 Informal Code Analysis
4.6 Iteration Quiz
L2.AP.V.01
Compare and contrast data structures and their uses (e.g., lists, stacks, queues).
AP Computer Science A (Nitro)
7.1 ArrayList
7.8 ArrayList Quiz
L2.AP.C.01
Model the execution of repetition (e.g., loops, recursion) of an algorithm illustrating output and changes in values of named variables.
Oklahoma Advanced Programming
2.5 For Loops in Python
2.6 General For Loops
2.7 For Loop Practice
2.10 Python Control Structures Quiz
5.3 For Loops and Lists
5.7 Basic Data Structures Quiz
AP Computer Science A (Nitro)
4.1 Iteration
4.6 Iteration Quiz
L2.AP.M.01
Construct solutions to problems using student-created components (e.g., procedures, modules, objects).
Oklahoma Advanced Programming
3.1 Functions and Parameters 1
3.2 Functions and Parameters 2
3.3 Functions and Parameters 3
3.4 Functions and Return Values 1
3.5 Functions and Return Values 2
3.8 Functions and Parameters Quiz
AP Computer Science A (Nitro)
5.1 Writing Classes
5.6 Writing Methods
5.11 Writing Classes Quiz
L2.AP.M.02
Design or redesign a solution to a large-scale computational problem by identifying generalizable patterns.
Create software that will provide solutions to a variety of users using multiple software development processes.
Oklahoma Advanced Programming
12.1 Software Development Life Cycle
12.2 Plan and Design
12.3 Develop Round 1
12.4 Test
12.5 Develop Round 2
L2.AP.PD.02
Design software in a project team environment using integrated development environments (IDEs), versioning systems, and collaboration systems.
Oklahoma Advanced Programming
12.2 Plan and Design
12.3 Develop Round 1
L2.AP.PD.03
Develop programs for multiple computing platforms.
Oklahoma Advanced Programming
1.6 Using Graphics in Python
L2.AP.PD.04
Systematically examine code for correctness, usability, readability, efficiency, portability, and scalability through peer review
Oklahoma Advanced Programming
12.4 Test
L2.AP.PD.05
Develop and use a series of test cases to verify that a program performs according to its design specifications.
Oklahoma Advanced Programming
5.1 Tuples
5.2 Lists
5.3 For Loops and Lists
5.4 List Methods
L2.AP.PD.06
Explain security issues that might lead to compromised computer programs.
Oklahoma Advanced Programming
7.13 The Internet Quiz
8.5 Application Security
Oklahoma Cybersecurity
4.8 Application Security
8.3 Security in Coding
8.6 Checking for Vulnerabilities
L2.AP.PD.07
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
Oklahoma Advanced Programming
5.6 Dictionaries
L2.IC.CU.01
Evaluate the beneficial and harmful effects that computational artifacts and innovations have on society.
AP Computer Science A (Nitro)
5.10 Ethical and Social Implications of Computing
Oklahoma Cybersecurity
1.3 Can All Information Be Trusted?
5.10 Impact of the Internet
Oklahoma Web Design
12.7 The Impact of the Internet
L2.IC.CU.02
Evaluate the impact of location and user audience on the distribution of computing resources in a global society.
Oklahoma Advanced Programming
1.8 Impact of Computing Innovations
L2.IC.CU.03
Design and implement a study that evaluates or predicts how creating, testing, and refining computational artifacts has revolutionized an aspect of our culture and how it might evolve (e.g., education, healthcare, art/entertainment, energy).
Oklahoma Advanced Programming
1.8 Impact of Computing Innovations
L2.IC.SI.01
Demonstrate and debate how computing increases and decreases connectivity and communication among people of various cultures.
Oklahoma Advanced Programming
7.13 The Internet Quiz
L2.IC.SLE.01
Debate laws and regulations that impact the development and use of software.