Please enable JavaScript to use CodeHS

Standards Mapping

for Alaska 6-8

65

Standards in this Framework

49

Standards Mapped

75%

Mapped to Course

Standard Lessons
7.CS.D.01
Review, analyze, and evaluate device(s) and how other users interact with devices and recommend improvements to design.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
8.CS.D.01
Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device.
  1. 2.2 Computer Organization
  2. 3.1 Computer Model
6.CS.HS.01
Identify ways that hardware and software (User Interface) design are combined to collect and exchange data.
  1. 2.2 Computer Organization
  2. 2.3 Software
  3. 2.4 Hardware
7.CS.HS.01
Evaluate and recommend improvements to hardware and software (User Interface) design to collect and exchange data
  1. 2.3 Software
  2. 2.4 Hardware
8.CS.HS.01
Design and refine projects that combine hardware and software (User Interface) to collect and exchange data.
  1. 3.1 Computer Model
6.CS.T.01
Identify and discuss increasingly complex software and hardware problems with computing devices and their components.
  1. 2.5 Future of Computing
7.CS.T.01
Identify and fix increasingly complex software and hardware problems with computing devices and their components.
8.CS.T.01
Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.
6.NI.NCO.01
Model a simple protocol for transferring information using packets.
  1. 7.6 Packets and Protocols
7.NI.NCO.01
Explain how a system recovers when a packet is lost and the effect it has on the transferred information.
  1. 7.6 Packets and Protocols
8.NI.NCO.01
Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.
  1. 7.6 Packets and Protocols
6.NI.C.01
Identify existing cybersecurity concerns with the Internet and systems it uses.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
  4. 9.4 Privacy & Security
  5. 15.3 Impact of Cybersecurity
  6. 15.4 The CIA Triad
6.NI.C.02
Explain the importance of secured websites and describe how one method of encryption works
  1. 9.4 Privacy & Security
  2. 15.3 Impact of Cybersecurity
7.NI.C.01
Explain how to protect electronic information, both physical and digital, identify cybersecurity concerns and options to address issues with the Internet and the systems it uses
  1. 9.4 Privacy & Security
  2. 15.3 Impact of Cybersecurity
7.NI.C.02
Identify and explain two or more methods of encryption used to ensure and secure the transmission of information.
8.NI.C.01
Evaluate physical and digital procedures that could be implemented to protect electronic data/information. Explain the impacts of malware (e.g., hacking, ransomware).
  1. 7.7 The Impact of the Internet
  2. 9.4 Privacy & Security
  3. 15.3 Impact of Cybersecurity
8.NI.C.02
Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information
6.DA.S.01
Identify how the same data can be represented in multiple ways.
  1. 6.3 Encoding Text with Binary
7.DA.S.01
Create multiple representations of data
  1. 6.3 Encoding Text with Binary
  2. 6.4 Pixel Images
  3. 6.5 Hexadecimal
  4. 6.6 Pixel Colors!
8.DA.S.01
Analyze multiple methods of representing data and choose the most appropriate method for representing data.
6.DA.CVT.01
Collect data using computational tools and transform the data to make it more useful (e.g., spreadsheet formulas)
7.DA.CVT.01
Collect data using computational tools and transform the data to make it more useful and reliable
8.DA.CVT.01
Develop, implement, and refine a process that utilizes computational tools to collect and transform data to make it more useful and reliable.
6.DA.IM.01
Use models and simulations to formulate, refine, and test hypotheses.
7.DA.IM.01
Discuss the correctness of a model representing a system by comparing the model’s generated results with observed data from the modeled system.
8.DA.IM.01
Refine computational models based on the data generated by the models
6.AP.A.01
Use an existing algorithm in natural language or pseudocode to solve complex problems.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 13.10 Top Down Design
7.AP.A.01
Select and modify an existing algorithm in natural language or pseudocode to solve complex problems.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 13.10 Top Down Design
  4. 13.19 Putting Together Control Structures
8.AP.A.01
Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 13.6 Comments
  4. 13.10 Top Down Design
  5. 13.19 Putting Together Control Structures
6.AP.C.01
Develop programs that utilize combinations of repetition, conditionals, functions, and the manipulation of variables representing different data types.
  1. 1.4 Functions in Karel
  2. 1.8 Super Karel
  3. 1.9 For Loops
  4. 1.11 If/Else Statements
  5. 1.12 While Loops in Karel
  6. 1.13 Control Structures Example
  7. 13.19 Putting Together Control Structures
7.AP.C.01
Develop programs that utilize combinations of repetition, compound conditionals, functions, and the manipulation of variables representing different data types.
  1. 1.4 Functions in Karel
  2. 1.8 Super Karel
  3. 1.9 For Loops
  4. 1.11 If/Else Statements
  5. 1.12 While Loops in Karel
  6. 1.13 Control Structures Example
  7. 13.19 Putting Together Control Structures
8.AP.C.01
Develop programs that utilize combinations of nested repetition, compound conditionals, functions, and the manipulation of variables representing different data types.
  1. 1.4 Functions in Karel
  2. 1.8 Super Karel
  3. 1.9 For Loops
  4. 1.11 If/Else Statements
  5. 1.12 While Loops in Karel
  6. 1.13 Control Structures Example
  7. 13.19 Putting Together Control Structures
6.AP.M.01
Decompose (break down) problems into abstraction layers to facilitate the design, implementation, and review of programs.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 13.10 Top Down Design
7.AP.M.01
Decompose (break down) problems into abstraction layers to facilitate the design, implementation, and review of increasingly complex programs.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 13.10 Top Down Design
8.AP.M.01
Decompose (break down) problems and sub-problems into abstraction layers to facilitate the design, implementation, and review of complex programs.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 13.10 Top Down Design
6.AP.PD.01
Seek and incorporate feedback from team members to refine a solution to a problem.
  1. 5.1 Project: Your First Website
6.AP.PD.02
Incorporate existing code, media, and libraries into original programs and give attribution.
  1. 1.8 Super Karel
6.AP.PD.03
Test and refine programs using teacher provided inputs.
  1. 1.9 For Loops
  2. 13.4 For Loops
  3. 13.8 Functions
  4. 13.13 Parameters
6.AP.PD.04
Break down tasks and follow an individual timeline when developing a computational artifact.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
6.AP.PD.05
Document block-based or text-based programs in order to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
7.AP.PD.01
Seek and incorporate feedback from team members and users to refine a solution to a problem.
  1. 5.1 Project: Your First Website
7.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
  1. 1.8 Super Karel
7.AP.PD.03
Test and refine programs using a variety of student created inputs.
  1. 1.9 For Loops
  2. 1.13 Control Structures Example
  3. 13.19 Putting Together Control Structures
7.AP.PD.04
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
7.AP.PD.05
Document block-based or text-based programs of increasing complexity in order to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
8.AP.PD.01
Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.
  1. 5.1 Project: Your First Website
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
  1. 1.8 Super Karel
8.AP.PD.03
Systematically test and refine programs using a range of student created inputs.
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
8.AP.PD.04
Explain how effective communication between participants is required for successful collaboration when developing computational artifacts
6.GCEI.C.01
Explain how computing impacts people's' everyday activities and explore carriers related to the field of computer science.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
6.GCEI.C.02
Identify and discuss the technology proficiencies needed in the classroom and the workplace, and how to meet the needs of diverse users
7.GCEI.C.01
Explain how computing impacts innovation in other fields and explore carriers related to the field of computer science.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
7.GCEI.C.02
Relate the distribution of computing resources in a global society to issues of equity, access, and power
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
8.GCEI.C.01
Describe the trade-offs associated with computing technologies, explaining their effects on economies and global societies, and explore community and global careers related to the field of computer science (e.g., automation).
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
8.GCEI.C.02
Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability. Evaluate how technology can be used to distort, exaggerate, and misrepresent information.
6.GCEI.SI.01
Individually and collaboratively develop and conduct an online survey that seeks input from a broad audience. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
7.GCEI.SI.01
Individually and collaboratively use advanced tools to design and create online content (e.g., digital portfolio, multimedia, blog, web page). Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
  1. 5.1 Project: Your First Website
  2. 10.1 Project: Public Service Announcement
8.GCEI.SI.01
Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
  1. 5.1 Project: Your First Website
  2. 10.1 Project: Public Service Announcement
6.GCEI.SLE.01
Differentiate between appropriate and inappropriate content on the Internet, and identify unethical and illegal online behavior.
  1. 9.1 Digital Footprint and Reputation
  2. 9.2 Cyberbullying
  3. 9.3 Internet Safety
6.GCEI.SLE.02
Identify what distinguishes humans from machines focusing on human intelligence versus machine intelligence (e.g., robot motion; speech and language understanding; computer vision)
  1. 2.5 Future of Computing
7.GCEI.SLE.01
Explain the connection between the longevity of data on the Internet, personal online identity, and personal privacy.
  1. 9.1 Digital Footprint and Reputation
7.GCEI.SLE.02
Describe ways in which computers use models of intelligent behavior (e.g., robot motion; speech and language understanding; computer vision)
  1. 2.5 Future of Computing
8.GCEI.SLE.01
Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
  3. 15.3 Impact of Cybersecurity
8.GCEI.SLE.02
Compare and contrast human intelligence and computer intelligence (e.g., emotional decision making versus logical decisions; common sense; literal versus abstract).
  1. 2.5 Future of Computing
6.CS.D.01
Review and analyze device(s) based on personal use and recommend improvements to the device.
  1. 2.1 History of Computers