Please enable JavaScript to use CodeHS

Alabama 6 Standards Mapping

to

Computing Ideas (Lovelace)

36 Standards in this Framework 28 Standards Mapped 77% Mapped to Course


Standard Lessons
R1 R1) Identify, demonstrate, and apply personal safe use of digital devices.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
R2 R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
R3 R3) Assess the validity and identify the purpose of digital content.
  1. 9.5 Information Literacy
  2. 10.1 Project: Public Service Announcement
R4 R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. 2.4 Hardware
  2. 7.2 Internet Hardware
R5 R5) Locate and curate information from digital sources to answer research questions.
  1. 9.5 Information Literacy
  2. 9.6 Creative Credit & Copyright
R6 R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
  1. 5.1 Project: Your First Website
  2. 8.1 Project: The Effects of the Internet
  3. 10.1 Project: Public Service Announcement
1 Remove background details from an everyday process to highlight essential properties. Examples: When making a sandwich, the type of bread, condiments, meats, and/or vegetables do not affect the fact that one is making a sandwich.
  1. 1.6 Top Down Design and Decomposition in Karel
2 Define a process as a function. Example: Functions or sets of steps combined to produce a process: turning off your alarm + getting out of bed + brushing your teeth + getting dressed = morning routine.
  1. 1.4 Functions in Karel
  2. 1.5 The Start Function
  3. 1.6 Top Down Design and Decomposition in Karel
  4. 1.11 If/Else Statements
  5. 1.12 While Loops in Karel
  6. 1.13 Control Structures Example
  7. 1.14 More Karel Examples and Testing
  8. 1.16 Karel Challenges
  9. 14.8 Functions
3 Create pseudocode that uses conditionals. Examples: Using if/then/else (If it is raining then bring an umbrella else get wet).
  1. 1.7 Commenting Your Code
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 14.16 If Statements
  8. 14.17 If/ Else Statements
4 Differentiate between flowcharts and pseudocode. Example: Flowcharts use shapes to indicate what to do at each step while pseudocode uses text.
  1. 1.6 Top Down Design and Decomposition in Karel
5 Identify algorithms that make use of sequencing, selection or iteration. Examples: Sequencing is doing steps in order (put on socks, put on shoes, tie laces); selection uses a Boolean condition to determine which of two parts of an algorithm are used (hair is dirty? True, wash hair; false, do not); iteration is the repetition of part of an algorithm until a condition is met (if you’re happy and you know it clap your hands, when you’re no longer happy you stop clapping).
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.16 Karel Challenges
  6. 14.2 Tracy's Grid World
  7. 14.3 Turning Tracy
  8. 14.4 For Loops
  9. 14.14 Using i in For Loops
  10. 14.15 Extended Loop Control
  11. 14.16 If Statements
  12. 14.17 If/ Else Statements
  13. 14.18 While Loops
  14. 14.19 Putting Together Control Structures
6 Identify steps in developing solutions to complex problems using computational thinking.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.13 Control Structures Example
  3. 1.14 More Karel Examples and Testing
  4. 1.16 Karel Challenges
  5. 14.10 Top Down Design
7 Describe how automation works to increase efficiency. Example: Compare the amount of time/work to hand wash a car vs. using an automated car wash.
8 Create a program that initializes a variable. Example: Create a flowchart in which the variable or object returns to a starting position upon completion of a task.
  1. 14.11 Variables
9 Differentiate between a secure and a non-secure website including how they affect personal data. Example: HTTP vs. HTTPS.
  1. 7.3 Internet Addresses
  2. 7.5 Routing
  3. 9.4 Privacy & Security
10 Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.
  1. 9.6 Creative Credit & Copyright
11 Differentiate between appropriate and inappropriate digital content and the use of that content.
  1. 9.6 Creative Credit & Copyright
12 Define digital permanence.
  1. 9.1 Digital Footprint and Reputation
13 Define personal privacy, digital footprint, and open communication.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
14 Discuss digital globalization and Internet censorship. Examples: Software that scans a website for posts about potential threats; a person’s ability to order a product directly from a manufacturer in another part of the world; a student in Africa can take an online math course created in the United States; web-hosting company prevents posting of content.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
  3. 9.3 Internet Safety
15 Identify emerging technologies in computing.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
16 Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems.
  1. 8.1 Project: The Effects of the Internet
  2. 10.1 Project: Public Service Announcement
17 Type 30 words per minute with 95% accuracy using appropriate keyboarding techniques.
18 Define censorship.
  1. 9.3 Internet Safety
19 Track data change from a variety of sources. Example: Use editing or versioning tools to track changes to data.
20 Identify data transferring protocols, visualization, and the purpose of data and methods of storage. Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database.
  1. 7.3 Internet Addresses
  2. 7.4 DNS
  3. 7.5 Routing
  4. 7.6 Packets and Protocols
21 Identify varying data structures/systems and methods of classification, including decimal and binary. Examples: Difference between a bit and a byte, bit representation, pixels.
  1. 2.4 Hardware
  2. 6.2 Number Systems
  3. 6.3 Encoding Text with Binary
  4. 6.4 Pixel Images
  5. 6.6 Pixel Colors!
22 Summarize the purpose of the American Standard Code for Information Interchange (ASCII).
  1. 6.4 Pixel Images
  2. 6.5 Hexadecimal
23 Discuss how digital devices may be used to collect, analyze, and present information.
24 Compare and contrast types of networks. Examples: Wired, wireless (WiFi), local, wide area, mobile, Internet, and intranet.
  1. 2.2 Computer Organization
  2. 7.5 Routing
25 Differentiate between secure and non-secure systems.
26 Explain why professionals may use models as logical representations of physical, mathematical, or logical systems or processes. Example: Students will discuss why an engineer may build a model of a building before actually constructing the building.
27 Explain how simulations serve to implement models.
28 Define assistive technologies and state reasons they may be needed.
  1. 7.7 The Impact of the Internet
29 Define artificial intelligence and identify examples of artificial intelligence in the community. Examples: Image recognition, voice assistants.
30 Discuss and apply the components of the problem-solving process. Example: Students will devise a plan to alleviate traffic congestion around the school during drop-off and pick-up.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.16 Karel Challenges
  3. 14.19 Putting Together Control Structures