Please enable JavaScript to use CodeHS

Standards Mapping

for Washington 2

23

Standards in this Framework

17

Standards Mapped

73%

Mapped to Course

Standard Lessons
2-AP-10
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.6 Top Down Design
2-AP-11
Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.2 Naming Guidelines
  2. 5.1 Variables
  3. 5.5 User Input
  4. 5.6 Parameters
2-AP-12
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.4 Lost in Space
2-AP-13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 5.1 Variables
  2. 5.9 Using i in For Loops
  3. 5.10 Extended Loop Control
2-AP-14
Create procedures with parameters to organize code and make it easier to reuse.
2-AP-15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-AP-16
Incorporate existing code, media, and libraries into original programs, and give attribution.
2-AP-17
Systematically test and refine programs using a range of test cases.
  1. 1.4 Lost in Space
2-AP-18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 4.1 Comments
2-AP-19
Document programs in order to make them easier to follow, test, and debug.
  1. 4.1 Comments
2-CS-01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 7.3 Hardware
2-CS-02
Design projects that combine hardware and software components to collect and exchange data.
  1. 7.5 Internet of Things
2-CS-03
Systematically identify and fix problems with computing devices and their components.
  1. 7.3 Hardware
2-DA-07
Represent data using multiple encoding schemes.
2-DA-08
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. 8.8 Project: Public Service Announcement
  2. 9.2 Intro to Spreadsheets
  3. 9.5 Visualizing Data
  4. 9.6 Models
  5. 9.8 Project: Data Storytelling
  6. 9.9 Project: Tell Your Story
2-DA-09
Refine computational models based on the data they have generated.
  1. 9.6 Models
2-IC-20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 7.4 Cloud Computing
2-IC-21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 7.6 Ethics and Legal Considerations
2-IC-22
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 7.8 Project: Design the Computer of Tomorrow
  2. 8.8 Project: Public Service Announcement
  3. 9.7 Project: Statistical Questions
  4. 9.9 Project: Tell Your Story
2-IC-23
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 8.1 Digital Footprint and Reputation
  2. 8.4 Privacy & Security
  3. 8.7 Hacking Ethics
2-NI-04
Model the role of protocols in transmitting data across networks and the Internet.
2-NI-05
Explain how physical and digital security measures protect electronic information.
  1. 8.4 Privacy & Security
2-NI-06
Apply multiple methods of encryption to model the secure transmission of information.