Please enable JavaScript to use CodeHS

Standards Mapping

for Alabama 7

36

Standards in this Framework

23

Standards Mapped

63%

Mapped to Course

Standard Lessons
R1
R1) Identify, demonstrate, and apply personal safe use of digital devices.
  1. 7.3 Internet Safety
  2. 7.4 Privacy & Security
R2
R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
  1. 7.2 Cyberbullying
  2. 7.3 Internet Safety
R3
R3) Assess the validity and identify the purpose of digital content.
  1. 7.1 Digital Footprint and Reputation
R4
R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. 4.3 Hardware
  2. 15.3 Hardware (Duplicate)
R5
R5) Locate and curate information from digital sources to answer research questions.
  1. 7.8 Project: Public Service Announcement
R6
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
  1. 7.8 Project: Public Service Announcement
  2. 8.1 Getting Started
  3. 8.2 Color
  4. 8.3 Variables
  5. 8.4 The Draw Loop
  6. 8.5 Color Transitions
  7. 8.6 Shape Transformations
  8. 8.7 Direction
  9. 8.8 Mouse Data
  10. 8.9 Keyboard Data
  11. 8.10 Project: Animate an Emoji
  12. 10.5 Incorporating Images
1
Create a function to simplify a task. Example: Get a writing utensil, get paper, jot notes can collectively be named “note taking”.
  1. 2.2 A Day at the Park
  2. 3.3 A Day at the Carnival
  3. 3.4 Under the Sea
  4. 5.3 Functions
  5. 5.4 Multiple Functions
  6. 8.4 The Draw Loop
2
Create complex pseudocode using conditionals and Boolean statements. Example: Automated vacuum pseudocode – drive forward until the unit encounters an obstacle; reverse 2"; rotate 30 degrees to the left, repeat.
  1. 5.4 Multiple Functions
  2. 5.6 Conditional Statements
  3. 5.7 If/Else Statements
3
Create algorithms that demonstrate sequencing, selection or iteration. Examples: Debit card transactions are approved until the account balance is insufficient to fund the transaction = iteration, do until.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 5.5 For Loops
  4. 5.6 Conditional Statements
  5. 5.7 If/Else Statements
  6. 5.8 While Loops
  7. 5.9 Karel Challenges
  8. 8.4 The Draw Loop
  9. 8.5 Color Transitions
  10. 8.6 Shape Transformations
  11. 8.7 Direction
  12. 8.8 Mouse Data
  13. 8.9 Keyboard Data
  14. 8.10 Project: Animate an Emoji
4
Design a complex algorithm that contains sequencing, selection or iteration. Examples: Lunch line algorithm that contains parameters for bringing your lunch and multiple options available in the lunch line.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 5.5 For Loops
  4. 5.6 Conditional Statements
  5. 5.7 If/Else Statements
  6. 5.8 While Loops
  7. 5.9 Karel Challenges
5
Solve a complex problem using computational thinking.
  1. 1.3 The Rabbit Chase
  2. 1.4 Lost in Space
  3. 2.1 Quest for the Rosetta Stone
  4. 2.2 A Day at the Park
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
  7. 9.5 Variables
  8. 9.9 Your First Sprites
6
Create and organize algorithms in order to automate a process efficiently. Example: Set of recipes (algorithms) for preparing a complete meal.
  1. 2.2 A Day at the Park
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
7
Create a program that updates the value of a variable in the program. Examples: Update the value of score when a coin is collected (in a flowchart, pseudocode or program).
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.9 Your First Sprites
  4. 9.10 The Physics of Sprites
8
Formulate a narrative for each step of a process and its intended result, given pseudocode or code.
  1. 1.3 The Rabbit Chase
  2. 5.4 Multiple Functions
  3. 8.10 Project: Animate an Emoji
9
Identify common methods of securing data. Examples: Permissions, encryption, vault, locked closet.
  1. 6.4 Cybersecurity
  2. 6.6 Encryption
  3. 7.4 Privacy & Security
10
Explain social engineering, including countermeasures, and its impact on a digital society. Examples: Phishing, hoaxes, impersonation, baiting, spoofing.
  1. 6.4 Cybersecurity
  2. 7.1 Digital Footprint and Reputation
  3. 7.2 Cyberbullying
  4. 7.3 Internet Safety
  5. 7.4 Privacy & Security
  6. 7.5 Information Literacy
11
Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.
  1. 4.6 Ethics and Legal Considerations
  2. 7.6 Creative Credit & Copyright
  3. 15.6 Ethics and Legal Considerations
12
Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.
  1. 7.1 Digital Footprint and Reputation
  2. 7.4 Privacy & Security
13
Compare and contrast information available locally and globally. Example: Review an article published in the United States and compare to an article on the same subject published in China.
14
Discuss current events related to emerging technologies in computing and the effects such events have on individuals and the global society.
  1. 4.7 The Future of Computing
  2. 6.3 Impact of the Internet
  3. 15.7 The Future of Computing (Duplicate)
15
Discuss unique perspectives and needs of a global culture when developing computational artifacts, including options for accessibility for all users. Example: Would students create a webpage aimed at reaching a village of users that have no way access to the Internet?
  1. 7.8 Project: Public Service Announcement
16
Construct content designed for specific audiences through an appropriate medium. Examples: Design a multi-media children’s e-book with an appropriate readability level.
17
Publish content to be available for external feedback.
18
Type 35 words per minute with 95% accuracy using appropriate keyboarding techniques.
19
Discuss the benefits and limitations of censorship.
  1. 4.6 Ethics and Legal Considerations
  2. 15.6 Ethics and Legal Considerations
20
Evaluate the validity and accuracy of a data set.
21
Compare common transfer protocols. Examples: FTP, HTTP
22
Compare data storage structures. Examples: Stack, array, queue, table, database.
23
Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.
24
Diagram a network given a specific setup or need. Examples: Home network, public network, business network.
25
List common methods of system cybersecurity. Examples: Various password requirements, two-factor authentication, biometric, geolocation.
26
Categorize models based on the most appropriate representation of various systems.
27
Identify data needed to create a model or simulation of a given event. Examples: When creating a random name generator, the program needs access to a list of possible names.
28
Classify types of assistive technologies. Examples: Hardware, software, stylus, sticky keys.
  1. 4.3 Hardware
  2. 15.3 Hardware (Duplicate)
29
Compare and contrast human intelligence and artificial intelligence.
  1. 4.7 The Future of Computing
  2. 15.7 The Future of Computing (Duplicate)
30
Apply the problem-solving process to solve real-world problems.