Please enable JavaScript to use CodeHS

Wisconsin 6-8 Framework


Standard Description
AP1.a.6.m Decompose (break down) a computational problem into parts and create solutions for one or more parts. Lessons
AP1.a.7.m Identify how sub-problems could be recombined to create something new (e.g., break down the individual parts that would be needed to program a certain type of game and then show how the parts could be reused in other types of games). Lessons
AP2.a.6.m Develop programs, both independently and collaboratively, which include sequencing with nested loops and multiple branches [Clarification At this level, students may use block-based and/or text- based languages]. Lessons
AP2.a.7.m Produce computational artifacts with broad accessibility and usability through careful consideration of diverse needs and wants of the community. Lessons
AP2.a.8.m Use an iterative design process (e.g., define the problem; generate ideas; build, test, and improve solutions) to solve computational problems, both independently and collaboratively. Lessons
AP2.a.9.m Create variables that represent different types of data and manipulate their values. Lessons
AP3.a.3.m Provide proper attribution when code is borrowed or built upon. Lessons
AP3.b.5.m Discuss how algorithms have impacted society— both the beneficial and harmful effects. Lessons
AP3.b.6.m Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size (e.g., different algorithms solve the same problem, but one might be faster than the other). [Clarification Students are not expected to quantify these differences]. Lessons
AP3.b.7.m Modify existing code to change its functionality and discuss the variety of ways in which to do this. Lessons
AP3.c.1.m Interpret the flow of execution of algorithms and predict their outcomes. [Clarification Algorithms can be expressed using natural language, flow and control diagrams, comments within code, and pseudocode]. Lessons
AP3.c.2.m Use documentation regarding code to modify programs. Lessons
AP4.a.3.m Define and use functions/ procedures that hide the complexity of a task and can be reused to solve similar tasks. [Clarification Students use and modify, but do not necessarily create, functions or procedures with parameters]. Lessons
AP5.a.5.m Solicit and integrate peer feedback as appropriate to develop or refine a program. Lessons
AP5.b.2.m Analyze team members’ strengths and use them to foster an inclusive computing culture. Lessons
AP6.a.3.m Use testing and debugging methods to ensure program correctness and completeness. Lessons
AP6.b.2.m Apply a rubric to determine if and how well a program meets objectives. Lessons
CS1.a.5.m Justify the suitability of hardware and software chosen to accomplish a task (e.g., comparison of the features of a tablet vs. desktop, selecting which sensors and platform to use in building a robot or developing a mobile app). Lessons
CS2.a.3.m Use a systematic process to identify the source of a problem within individual and connected devices (e.g., follow a troubleshooting flow diagram, make changes to software to see if hardware will work, restart device, check connections, swap in working components). Lessons
CS3.a.1.m Analyze the relationship between a device's computational components and its capabilities. (e.g., computing systems include not only computers, but also cars, microwaves, smartphones, traffic lights, and flash drives). Lessons
CS4.a.1.m Extend or modify existing programs to add simple features and behaviors using different forms of inputs and outputs (e.g., inputs such as sensors, mouse clicks, data sets; outputs such as text, graphics, sounds). Lessons
DA1.a.3.m Represent data using different encoding schemes (e.g., binary, Unicode, Morse code, shorthand, student-created codes). Lessons
DA2.a.3.m Gather and organize multiple quantitative data elements using a computational tool (e.g., spreadsheet software). Lessons
DA2.b.3.m Develop a strategy to answer a question by using a computer to manipulate (e.g., sort, total and/or average, chart, graph) and analyze data that has been collected by the class or student. Lessons
DA3.a.4.m Describe how different formats of stored data represent tradeoffs between quality and size. [Clarification compare examples of music, text and/or image formats]. Lessons
DA3.a.5.m Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools (e.g., use an app or spreadsheet form to collect data, decide which data to use or ignore, and choose a visualization method). Lessons
DA4.a.4.m Revise computational models to more accurately reflect real-world systems (e.g., ecosystems, epidemics, spread of ideas). Lessons
DA4.a.5.m Modify an existing computational model to emphasize key features and relationships within a system. (A model can be used to simulate events, examine theories and inferences, or make predictions). Lessons
IC1.a.4.m Provide examples of how computational artifacts and devices impact health and wellbeing, both positively and negatively, locally and globally (e.g., effects of globalization, and automation). Lessons
IC1.a.5.m Explain how computer science fosters innovation and can enhance careers and disciplines. Lessons
IC1.b.3.m Analyze and present beneficial and harmful effects of personal electronic communication and social electronic communication. Lessons
IC1.b.4.m Describe ways in which the internet impacts global communication and collaborating. Lessons
IC2.a.2.m Explain the impact of the digital divide (i.e., uneven access to computing, computing education, and interfaces) on access to critical information. Lessons
IC2.b.2.m Critically evaluate and redesign a computational artifact to remove barriers to universal access (e.g., using captions on images, high contrast colors, and/or larger font sizes). Lessons
IC2.c.4.m Use the internet ethically and safely to work with a group of people who are not physically near to solve a problem or reach a goal. Lessons
IC3.a.2.m Understand laws associated with digital information (e.g., intellectual property, fair use, and Creative Commons). Lessons
IC3.a.3.m Describe ethical issues that relate to computing devices and networks (e.g., equity of access, security, hacking, intellectual property, copyright, Creative Commons licensing, and plagiarism). Lessons
IC3.b.4.m Analyze and summarize negative and positive impacts of using data and information to categorize people, predict behavior, and make recommenda- tions based on those predictions (e.g., customizing search results or targeted advertising based on previous browsing history can save search time and limit options at the same time). Lessons
NI1.a.4.m Analyze and summarize security risks associated with weak passwords, lack of encryption, insecure transactions, and persistence of data. Lessons
NI1.a.5.m Understand security issues with general computer use. Lessons
NI1.b.2.m Understand security issues with general computer use. Lessons
NI2.a.6.m Simulate how information is transmitted as packets through multiple devices over the internet and networks. Lessons
NI2.a.7.m Explain, using basic terms, how a wireless or cellular network allows internet information to be transmitted from a server to a user device. Lessons
NI2.b.2.m Define the term protocol, provide an example of protocols in daily life, and explain their use on the internet. Lessons
NI2.c.3.m Explain the hierarchical structure of the Internet Domain Name System (IDNS). Lessons
NI2.d.2.m Encode and decode text- based messages using basic algorithms (e.g., shift cipher, substitution cipher). Lessons