Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Computer Programming 2 with Python

65

Standards in this Framework

65

Standards Mapped

100%

Mapped to Course

Standard Lessons
A.1
Review school safety policies and procedures.
  1. 10.1 School and Classroom Safety
A.2
Review classroom safety rules and procedures.
  1. 10.1 School and Classroom Safety
A.3
Review safety procedures for using equipment in the classroom.
  1. 10.1 School and Classroom Safety
A.4
Identify major causes of work-related accidents in office environments.
  1. 10.2 Workplace Safety
A.5
Demonstrate safety skills in an office/work environment.
  1. 10.2 Workplace Safety
  2. 10.4 Skills for the 21st Century
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
  1. 10.3 Student Organizations
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
  1. 10.3 Student Organizations
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
  1. 10.3 Student Organizations
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
  1. 10.3 Student Organizations
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
  1. 10.3 Student Organizations
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation.
  1. 5.4 Project Prep and Development
  2. 7.10 Mini-Project: Findings
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. 8.7 Digital Footprint and Responsibility
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. 8.1 Common Cyber Attacks and Prevention
  2. 8.3 Security in Coding
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; illegal downloading; cyberbullying; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. 8.4 Creative Credit & Copyright
  2. 8.5 Ethics and Legal Considerations
  3. 8.6 Responsibly Using Someone Else's Code
  4. 8.7 Digital Footprint and Responsibility
C.5
Discuss legal issues and the terms of use related to copyright laws, Creative Commons, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal use.
  1. 8.4 Creative Credit & Copyright
  2. 8.5 Ethics and Legal Considerations
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information.
  1. 8.1 Common Cyber Attacks and Prevention
  2. 8.3 Security in Coding
  3. 8.5 Ethics and Legal Considerations
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. 8.1 Common Cyber Attacks and Prevention
  2. 8.3 Security in Coding
D.1
Demonstrate creativity and innovation.
  1. 5.1 Intro to Design Thinking
  2. 5.2 Prototype
  3. 5.3 Test
  4. 5.4 Project Prep and Development
  5. 10.4 Skills for the 21st Century
D.2
Demonstrate critical thinking and problem-solving skills.
  1. 5.1 Intro to Design Thinking
  2. 5.2 Prototype
  3. 5.3 Test
  4. 5.4 Project Prep and Development
  5. 9.1 Project: Harnessing Technology to Solve Problems
  6. 10.4 Skills for the 21st Century
D.3
Demonstrate initiative and self-direction.
  1. 5.4 Project Prep and Development
  2. 9.1 Project: Harnessing Technology to Solve Problems
  3. 10.4 Skills for the 21st Century
D.4
Demonstrate integrity.
  1. 10.4 Skills for the 21st Century
D.5
Demonstrate work ethic.
  1. 5.4 Project Prep and Development
  2. 10.4 Skills for the 21st Century
D.6
Demonstrate conflict resolution skills.
  1. 10.4 Skills for the 21st Century
D.7
Demonstrate listening and speaking skills.
  1. 5.4 Project Prep and Development
  2. 9.1 Project: Harnessing Technology to Solve Problems
  3. 10.4 Skills for the 21st Century
D.8
Demonstrate respect for diversity.
  1. 10.4 Skills for the 21st Century
D.9
Demonstrate customer service orientation.
  1. 10.4 Skills for the 21st Century
D.10
Demonstrate teamwork.
  1. 10.4 Skills for the 21st Century
E.1
Demonstrate global or “big picture” thinking.
  1. 9.1 Project: Harnessing Technology to Solve Problems
  2. 10.4 Skills for the 21st Century
E.2
Demonstrate career and life management skills and goal-making.
  1. 5.4 Project Prep and Development
  2. 10.4 Skills for the 21st Century
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
  1. 10.4 Skills for the 21st Century
E.4
Demonstrate time and resource management skills.
  1. 5.4 Project Prep and Development
  2. 10.4 Skills for the 21st Century
E.5
Demonstrates information literacy skills.
  1. 8.7 Digital Footprint and Responsibility
  2. 8.8 Can All Information Be Trusted?
E.6
Demonstrates information security skills.
  1. 8.1 Common Cyber Attacks and Prevention
  2. 8.2 Using Databases
  3. 8.3 Security in Coding
E.7
Demonstrates information technology skills.
  1. 1.1 What is Code
  2. 2.1 Booleans
  3. 3.1 Functions and Parameters 1
  4. 4.1 Tuples
  5. 7.10 Mini-Project: Findings
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. 1.1 What is Code
  2. 1.2 Uses of Programs
  3. 5.4 Project Prep and Development
  4. 7.10 Mini-Project: Findings
E.9
Demonstrate job-specific mathematics skills.
  1. 1.6 Basic Math in Python
E.10
Demonstrates professionalism in the workplace.
  1. 10.2 Workplace Safety
  2. 10.4 Skills for the 21st Century
E.11
Demonstrates reading and writing skills.
  1. 2.12 Challenge: Guessing Game
  2. 3.8 Challenge: Ghosts
  3. 5.4 Project Prep and Development
  4. 7.10 Mini-Project: Findings
  5. 8.7 Digital Footprint and Responsibility
  6. 8.8 Can All Information Be Trusted?
  7. 9.1 Project: Harnessing Technology to Solve Problems
E.12
Demonstrates workplace safety.
  1. 10.2 Workplace Safety
F.1
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-ofservice attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017).
  1. 8.1 Common Cyber Attacks and Prevention
F.2
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017)
  1. 8.3 Security in Coding
F.3
Explain how to document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator. (Ethical and fair use)
  1. 8.6 Responsibly Using Someone Else's Code
F.4
Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons)
  1. 8.4 Creative Credit & Copyright
  2. 8.5 Ethics and Legal Considerations
  3. 8.6 Responsibly Using Someone Else's Code
F.5
Discuss the implications of using licensed resources in a developed solution.
  1. 8.6 Responsibly Using Someone Else's Code
G.1.1
Investigate how a problem is systematically solved through the selection and integration of hardware and software components
  1. 9.1 Project: Harnessing Technology to Solve Problems
G.1.2
Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, and specialized devices like global positioning systems (GPSs)).
  1. 9.1 Project: Harnessing Technology to Solve Problems
G.1.3
Compare and contrast ways software developers protect both devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
  1. 8.3 Security in Coding
G.1.4
Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age).
  1. 5.1 Intro to Design Thinking
G.1.5
Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017).
  1. 4.3 For Loops and Lists
G.1.6
Categorize a variety of algorithms (e.g, linear, exponential, logarithmic, regression etc.).
  1. 4.3 For Loops and Lists
G.2.1
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
  1. 7.2 Gathering Data
  2. 7.4 Modules, Packages & Libraries
  3. 7.5 Series and Central Tendency
  4. 7.6 Measures of Spread
  5. 7.7 Pandas DataFrames
  6. 7.8 Selecting Columns
  7. 7.9 Using Functions
  8. 7.10 Mini-Project: Findings
G.2.2
Compare and contrast the various data storage tools and data organization methods.
  1. 8.2 Using Databases
G.2.3
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
  1. 7.2 Gathering Data
  2. 7.4 Modules, Packages & Libraries
  3. 7.5 Series and Central Tendency
  4. 7.6 Measures of Spread
  5. 7.7 Pandas DataFrames
  6. 7.8 Selecting Columns
  7. 7.9 Using Functions
  8. 7.10 Mini-Project: Findings
G.2.4
Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types, and incorporate them into programs.
  1. 4.1 Tuples
  2. 4.2 Lists
G.2.5
Create and modify data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types, and incorporate them into programs.
  1. 4.1 Tuples
  2. 4.2 Lists
G.3.1
Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution. (e.g., procedures, modules, objects).
  1. 2.12 Challenge: Guessing Game
  2. 3.8 Challenge: Ghosts
  3. 5.4 Project Prep and Development
G.3.2
Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries).
  1. 5.4 Project Prep and Development
  2. 7.10 Mini-Project: Findings
G.3.3
Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., trade- offs involving implementation, readability, and program performance). (e.g., conditionals, loops, event handlers, recursion).
  1. 2.11 Loop and a Half
  2. 2.12 Challenge: Guessing Game
  3. 3.8 Challenge: Ghosts
  4. 5.4 Project Prep and Development
G.3.4
Implement and modify built-in classes.
  1. 6.1 Classes and Objects
G.3.5
Create and use user-defined classes.
  1. 6.1 Classes and Objects
G.3.6
Instantiate and use objects from user-defined classes.
  1. 6.1 Classes and Objects
G.4.1
Recommend modifications for existing computing devices and software to improve functionality for end users.
  1. 5.1 Intro to Design Thinking
  2. 5.2 Prototype
  3. 5.3 Test
  4. 5.4 Project Prep and Development
G.4.2
Evaluate and refine programs to make them more usable, functional, and accessible.
  1. 5.1 Intro to Design Thinking
  2. 5.2 Prototype
  3. 5.3 Test
  4. 5.4 Project Prep and Development
G.5.1
Implement version control to track program refinements. (Refers to using folder structures for version control. This is not specific to using configuration management software.)
  1. 5.4 Project Prep and Development
G.5.2
Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator.
  1. 8.6 Responsibly Using Someone Else's Code