Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Computer Programming 2 with Python

65

Standards in this Framework

36

Standards Mapped

55%

Mapped to Course

Standard Lessons
A.1
Review school safety policies and procedures.
A.2
Review classroom safety rules and procedures.
A.3
Review safety procedures for using equipment in the classroom.
A.4
Identify major causes of work-related accidents in office environments.
A.5
Demonstrate safety skills in an office/work environment.
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation.
  1. 18.4 Project Prep and Development
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. 11.9 Cybersecurity
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; illegal downloading; cyberbullying; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. 11.11 Creative Credit & Copyright
C.5
Discuss legal issues and the terms of use related to copyright laws, Creative Commons, fair use laws, and ethics pertaining to downloading of images, photographs, Creative Commons, documents, video, sounds, music, trademarks, and other elements for personal use.
  1. 11.11 Creative Credit & Copyright
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information.
  1. 11.9 Cybersecurity
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. 11.9 Cybersecurity
D.1
Demonstrate creativity and innovation.
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
D.2
Demonstrate critical thinking and problem-solving skills.
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
D.3
Demonstrate initiative and self-direction.
  1. 18.4 Project Prep and Development
D.4
Demonstrate integrity.
D.5
Demonstrate work ethic.
  1. 18.4 Project Prep and Development
D.6
Demonstrate conflict resolution skills.
D.7
Demonstrate listening and speaking skills.
  1. 18.4 Project Prep and Development
D.8
Demonstrate respect for diversity.
D.9
Demonstrate customer service orientation.
D.10
Demonstrate teamwork.
E.1
Demonstrate global or “big picture” thinking.
E.2
Demonstrate career and life management skills and goal-making.
  1. 18.4 Project Prep and Development
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
E.4
Demonstrate time and resource management skills.
  1. 18.4 Project Prep and Development
E.5
Demonstrates information literacy skills.
E.6
Demonstrates information security skills.
  1. 11.9 Cybersecurity
E.7
Demonstrates information technology skills.
  1. 1.2 Introduction to Programming With Karel
  2. 3.1 What is Code
  3. 4.1 Booleans
  4. 5.1 Functions and Parameters 1
  5. 7.1 Tuples
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. 3.1 What is Code
  2. 3.2 Uses of Programs
  3. 18.4 Project Prep and Development
E.9
Demonstrate job-specific mathematics skills.
  1. 3.6 Basic Math in Python
E.10
Demonstrates professionalism in the workplace.
E.11
Demonstrates reading and writing skills.
  1. 18.4 Project Prep and Development
E.12
Demonstrates workplace safety.
F.1
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-ofservice attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017).
  1. 11.9 Cybersecurity
F.2
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017)
  1. 11.9 Cybersecurity
F.3
Explain how to document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator. (Ethical and fair use)
F.4
Examine licenses (i.e., permissions) that limit or restrict use of resources (e.g., freeware, shareware, open source, creative commons)
  1. 11.11 Creative Credit & Copyright
F.5
Discuss the implications of using licensed resources in a developed solution.
G.1.1
Investigate how a problem is systematically solved through the selection and integration of hardware and software components
G.1.2
Justify hardware and software selections for specific applications by evaluating the components (e.g., databases, sensors, application programming interfaces (APIs)) of various computing devices (e.g., desktops, laptops, tablets, smartphones, and specialized devices like global positioning systems (GPSs)).
G.1.3
Compare and contrast ways software developers protect both devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
  1. 11.9 Cybersecurity
G.1.4
Evaluate existing computing solutions according to inclusivity or non-inclusivity (e.g., sight and hearing impairment, ethnicity, age).
  1. 18.1 Intro to Design Thinking
G.1.5
Evaluate algorithms in terms of efficiency, correctness, and clarity (CSTA, 2017).
  1. 7.3 For Loops and Lists
G.1.6
Categorize a variety of algorithms (e.g, linear, exponential, logarithmic, regression etc.).
  1. 7.3 For Loops and Lists
G.2.1
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
G.2.2
Compare and contrast the various data storage tools and data organization methods.
G.2.3
Compare and contrast the various data collection methods, data analysis tools, and data representation tools.
G.2.4
Determine when data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types, and incorporate them into programs.
  1. 7.1 Tuples
  2. 7.2 Lists
G.2.5
Create and modify data structures (e.g., lists, arrays, tuples, stacks, queues, structures) are more appropriate than simple data types, and incorporate them into programs.
  1. 7.1 Tuples
  2. 7.2 Lists
G.3.1
Justify the selection of specific programming constructs, explaining the benefits and drawbacks of choices made on the program’s execution. (e.g., procedures, modules, objects).
  1. 18.4 Project Prep and Development
G.3.2
Build a complex solution to a problem that incorporates reusable code (e.g., student created, application programming interfaces (APIs), libraries).
  1. 18.4 Project Prep and Development
G.3.3
Justify the selection of specific control structures explaining the benefits and drawbacks of choices made (e.g., trade- offs involving implementation, readability, and program performance). (e.g., conditionals, loops, event handlers, recursion).
  1. 4.11 Loop and a Half
  2. 18.4 Project Prep and Development
G.3.4
Implement and modify built-in classes.
  1. 27.1 Classes and Objects
G.3.5
Create and use user-defined classes.
  1. 27.1 Classes and Objects
G.3.6
Instantiate and use objects from user-defined classes.
  1. 27.1 Classes and Objects
G.4.1
Recommend modifications for existing computing devices and software to improve functionality for end users.
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
G.4.2
Evaluate and refine programs to make them more usable, functional, and accessible.
  1. 18.1 Intro to Design Thinking
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
G.5.1
Implement version control to track program refinements. (Refers to using folder structures for version control. This is not specific to using configuration management software.)
  1. 18.4 Project Prep and Development
G.5.2
Document programs that use non-user-created resources (e.g., code, media, libraries) giving attribution to the original creator.