Please enable JavaScript to use CodeHS

Standards Mapping

for Hawaii 2

23

Standards in this Framework

14

Standards Mapped

60%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 2.10 Top Down Design
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 2.7 Naming Guidelines
  2. 2.12 Variables
  3. 2.13 User Input
  4. 2.14 Parameters
  5. 2.18 If Statements
  6. 2.19 If/ Else Statements
  7. 2.20 While Loops
  8. 2.22 Putting Together Control Structures
  9. 5.2 Variables and Types
  10. 5.3 User Input
  11. 5.4 Mathematical Operators
  12. 5.5 String Operators
  13. 5.6 Comments
  14. 6.1 Booleans
  15. 6.2 If Statements
  16. 6.3 Comparison Operators
  17. 6.4 Logical Operators
  18. 6.5 Floating Point Numbers and Rounding
  19. 7.1 While Loops
  20. 7.2 For Loops
  21. 7.3 Break and Continue
  22. 7.4 Nested Control Structures
  23. 8.1 Functions
  24. 8.2 Functions and Parameters
  25. 8.4 Functions and Return Values
  26. 8.5 Exceptions
  27. 9.1 Indexing
  28. 9.2 Slicing
  29. 9.3 Immutability
  30. 9.4 Strings and For Loops
  31. 9.5 The in Keyword
  32. 9.6 String Methods
  33. 10.1 Tuples
  34. 10.2 Lists
  35. 10.3 For Loops and Lists
  36. 10.4 List Methods
  37. 11.1 2d Lists
  38. 11.2 List Comprehensions
  39. 11.3 Packing and Unpacking
  40. 11.4 Dictionaries
  41. 11.5 Equivalence vs. Identity
  42. 17.1 Short Circuit Evaluation
  43. 17.2 De Morgan's Laws
  44. 18.1 Project: Who Said It?
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 7.4 Nested Control Structures
  2. 10.2 Lists
  3. 10.3 For Loops and Lists
  4. 11.1 2d Lists
  5. 11.5 Equivalence vs. Identity
  6. 18.1 Project: Who Said It?
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.12 Variables
  2. 2.16 Using i in For Loops
  3. 2.17 Extended Loop Control
  4. 2.18 If Statements
  5. 2.19 If/ Else Statements
  6. 2.20 While Loops
  7. 5.1 Printing in Python
  8. 5.2 Variables and Types
  9. 5.4 Mathematical Operators
  10. 6.1 Booleans
  11. 6.2 If Statements
  12. 6.3 Comparison Operators
  13. 6.4 Logical Operators
  14. 7.1 While Loops
  15. 7.2 For Loops
  16. 7.3 Break and Continue
  17. 7.4 Nested Control Structures
  18. 8.1 Functions
  19. 8.5 Exceptions
  20. 9.1 Indexing
  21. 9.2 Slicing
  22. 9.3 Immutability
  23. 9.4 Strings and For Loops
  24. 9.6 String Methods
  25. 10.1 Tuples
  26. 10.2 Lists
  27. 10.3 For Loops and Lists
  28. 10.4 List Methods
  29. 11.1 2d Lists
  30. 11.2 List Comprehensions
  31. 11.3 Packing and Unpacking
  32. 11.4 Dictionaries
  33. 11.5 Equivalence vs. Identity
  34. 17.1 Short Circuit Evaluation
  35. 17.2 De Morgan's Laws
  36. 18.1 Project: Who Said It?
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 2.18 If Statements
  2. 2.19 If/ Else Statements
  3. 6.2 If Statements
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
2-AP-17
Systematically test and refine programs using a range of test cases.
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 2.6 Comments
  2. 5.6 Comments
  3. 8.2 Functions and Parameters
  4. 8.4 Functions and Return Values
  5. 9.1 Indexing
  6. 9.2 Slicing
  7. 9.3 Immutability
  8. 9.4 Strings and For Loops
  9. 9.5 The in Keyword
  10. 9.6 String Methods
  11. 10.1 Tuples
  12. 10.2 Lists
  13. 10.3 For Loops and Lists
  14. 10.4 List Methods
  15. 11.1 2d Lists
  16. 11.2 List Comprehensions
  17. 11.3 Packing and Unpacking
  18. 11.4 Dictionaries
  19. 11.5 Equivalence vs. Identity
  20. 18.1 Project: Who Said It?
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 2.6 Comments
  2. 5.6 Comments
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
2-CS-03
Systematically identify and fix problems with computing devices and their components.
  1. 4.1 Methodology
2-DA-07
Represent data using multiple encoding schemes.
  1. 3.10 Number Systems
  2. 3.11 Encoding Text with Binary
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
2-DA-09
Refine computational models based on the data they have generated.
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.3 Digital Footprint and Reputation
  4. 1.4 Cyberbullying
  5. 1.5 Internet Safety
  6. 1.6 Privacy & Security
  7. 1.7 Information Literacy
  8. 1.11 Creative Credit & Copyright
  9. 1.12 Hacking Ethics
  10. 1.13 Project: Public Service Announcement
  11. 3.2 History of Computers
  12. 14.2 Future of Computing
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 1.4 Cyberbullying
  2. 1.13 Project: Public Service Announcement
  3. 13.3 Define
  4. 13.4 Ideate
  5. 13.6 Test
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 13.3 Define
  2. 13.4 Ideate
  3. 13.6 Test
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.3 Digital Footprint and Reputation
  4. 1.4 Cyberbullying
  5. 1.5 Internet Safety
  6. 1.6 Privacy & Security
  7. 1.11 Creative Credit & Copyright
  8. 1.13 Project: Public Service Announcement
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 1.1 What is Cybersecurity?
  2. 1.5 Internet Safety
  3. 1.6 Privacy & Security
  4. 1.12 Hacking Ethics
  5. 1.13 Project: Public Service Announcement
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.