Please enable JavaScript to use CodeHS

New York 7-8 Framework


Standard Description
7-8.CT.1 Compare the results of alternative models or simulations to determine and evaluate how the input data and assumptions change the results. Lessons
7-8.CT.10 Document the iterative design process of developing a computational artifact that incorporates user feedback and preferences. Lessons
7-8.CT.2 Collect and use digital data in a computational artifact. Lessons
7-8.CT.3 Refine and visualize a data set in order to persuade an audience. Lessons
7-8.CT.4 Write a program using functions or procedures whose names or other documentation convey their purpose within the larger task. Lessons
7-8.CT.5 Identify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences. Lessons
7-8.CT.6 Design, compare and refine algorithms for a specific task or within a program. Lessons
7-8.CT.7 Design or remix a program that uses a variable to maintain the current value of a key piece of information. Lessons
7-8.CT.8 Develop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem. Lessons
7-8.CT.9 Read and interpret code to predict the outcome of various programs that involve conditionals and repetition for the purposes of debugging. Lessons
7-8.CY.1 Determine the types of personal information and digital resources that an individual may have access to that needs to be protected. Lessons
7-8.CY.2 Describe physical, digital, and behavioral safeguards that can be employed in different situations. Lessons
7-8.CY.3 Describe trade-offs of implementing specific security safeguards. Lessons
7-8.CY.4 Describe the limitations of cryptographic methods. Lessons
7-8.CY.5 Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly. Lessons
7-8.DL.1 Type on a keyboard while demonstrating proper keyboarding technique, with increased speed and accuracy. Lessons
7-8.DL.2 Communicate and collaborate with others using a variety of digital tools to create and revise a collaborative product. Lessons
7-8.DL.3 Compare types of search tools, choose a search tool for effectiveness and efficiency, and evaluate the quality of search tools based on returned results. Lessons
7-8.DL.4 Select and use digital tools to create, revise, and publish digital artifacts. Lessons
7-8.DL.5 Transfer knowledge of technology in order to explore new technologies. Lessons
7-8.DL.6 Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy. Lessons
7-8.DL.7 Describe safe, appropriate, positive, and responsible online behavior and identify strategies to combat negative online behavior. Lessons
7-8.IC.1 Compare and contrast tradeoffs associated with computing technologies that affect individuals and society. Lessons
7-8.IC.2 Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information. Lessons
7-8.IC.3 Identify and discuss issues of ethics surrounding computing technologies and current events. Lessons
7-8.IC.4 Identify and discuss issues related to the collection and use of public and private data. Lessons
7-8.IC.5 Analyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals. Lessons
7-8.IC.6 Assess the accessibility of a computing device or software application in terms of user needs. Lessons
7-8.IC.7 Explore a range of computer sciencerelated career paths. Lessons
7-8.NSD.1 Design a user interface for a computing technology that considers usability, accessibility, and desirability. Lessons
7-8.NSD.2 Design a project that combines hardware and software components. Lessons
7-8.NSD.3 Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide. Lessons
7-8.NSD.4 Design a protocol for transmitting data through a multi-point network. Lessons
7-8.NSD.5 Summarize how remote data is stored and accessed in a network. Lessons