Please enable JavaScript to use CodeHS

Standards Mapping

for California 6-8

24

Standards in this Framework

12

Standards Mapped

50%

Mapped to Course

Standard Lessons
6-8.AP.10
Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
6-8.AP.11
Create clearly named variables that store data, and perform operations on their contents.
  1. 4.4 Under the Sea
6-8.AP.12
Design and iteratively develop programs that combine control structures and use compound conditions.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
6-8.AP.13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
6-8.AP.14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 4.4 Under the Sea
6-8.AP.15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6-8.AP.16
Incorporate existing code, media, and libraries into original programs, and give attribution.
6-8.AP.17
Systematically test and refine programs using a range of test cases.
6-8.AP.18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.19
Document programs in order to make them easier to use, read, test, and debug.
6-8.CS.1
Design modifications to computing devices in order to improve the ways users interact with the devices.
6-8.CS.2
Design a project that combines hardware and software components to collect and exchange data.
  1. 3.5 Internet of Things
6-8.CS.3
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
  1. 3.3 Hardware
6-8.DA.7
Represent data in multiple ways.
6-8.DA.8
Collect data using computational tools and transform the data to make it more useful.
6-8.DA.9
Test and analyze the effects of changing variables while using computational models.
6-8.IC.20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 3.6 Ethics and Legal Considerations
  2. 5.1 Digital Footprint and Reputation
6-8.IC.21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 3.6 Ethics and Legal Considerations
6-8.IC.22
Collaborate with many contributors when creating a computational artifact.
6-8.IC.23
Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
  1. 3.6 Ethics and Legal Considerations
  2. 5.6 Creative Credit & Copyright
  3. 5.8 Project: Public Service Announcement
6-8.IC.24
Compare tradeoffs between allowing information to be public and keeping information private and secure.
  1. 3.5 Internet of Things
  2. 5.4 Privacy & Security
  3. 5.8 Project: Public Service Announcement
6-8.NI.4
Model the role of protocols in transmitting data across networks and the Internet.
6-8.NI.5
Explain potential security threats and security measures to mitigate threats.
  1. 5.4 Privacy & Security
  2. 5.7 Hacking Ethics
6-8.NI.6
Apply multiple methods of information protection to model the secure transmission of information.
  1. 5.3 Internet Safety
  2. 5.4 Privacy & Security