Please enable JavaScript to use CodeHS

Alabama 7 Standards Mapping

to

Computing Ideas (Lovelace)

36 Standards in this Framework 27 Standards Mapped 75% Mapped to Course


Standard Lessons
R1 R1) Identify, demonstrate, and apply personal safe use of digital devices.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
R2 R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
R3 R3) Assess the validity and identify the purpose of digital content.
  1. 9.5 Information Literacy
R4 R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. 2.4 Hardware
  2. 7.2 Internet Hardware
R5 R5) Locate and curate information from digital sources to answer research questions.
  1. 9.5 Information Literacy
  2. 9.6 Creative Credit & Copyright
R6 R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
  1. 5.1 Project: Your First Website
  2. 8.1 Project: The Effects of the Internet
  3. 10.1 Project: Public Service Announcement
1 Create a function to simplify a task. Example: Get a writing utensil, get paper, jot notes can collectively be named “note taking”.
  1. 1.4 Functions in Karel
  2. 1.5 The Start Function
  3. 14.8 Functions
2 Create complex pseudocode using conditionals and Boolean statements. Example: Automated vacuum pseudocode – drive forward until the unit encounters an obstacle; reverse 2"; rotate 30 degrees to the left, repeat.
  1. 1.11 If/Else Statements
  2. 1.12 While Loops in Karel
  3. 1.13 Control Structures Example
  4. 1.14 More Karel Examples and Testing
  5. 1.16 Karel Challenges
  6. 14.10 Top Down Design
  7. 14.17 If/ Else Statements
3 Create algorithms that demonstrate sequencing, selection or iteration. Examples: Debit card transactions are approved until the account balance is insufficient to fund the transaction = iteration, do until.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 14.2 Tracy's Grid World
  8. 14.3 Turning Tracy
  9. 14.4 For Loops
  10. 14.16 If Statements
  11. 14.17 If/ Else Statements
  12. 14.18 While Loops
  13. 14.19 Putting Together Control Structures
4 Design a complex algorithm that contains sequencing, selection or iteration. Examples: Lunch line algorithm that contains parameters for bringing your lunch and multiple options available in the lunch line.
  1. 1.11 If/Else Statements
  2. 1.12 While Loops in Karel
  3. 1.13 Control Structures Example
  4. 1.14 More Karel Examples and Testing
  5. 1.16 Karel Challenges
  6. 14.13 Parameters
  7. 14.19 Putting Together Control Structures
5 Solve a complex problem using computational thinking.
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 14.10 Top Down Design
  5. 14.19 Putting Together Control Structures
6 Create and organize algorithms in order to automate a process efficiently. Example: Set of recipes (algorithms) for preparing a complete meal.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 14.10 Top Down Design
  5. 14.19 Putting Together Control Structures
7 Create a program that updates the value of a variable in the program. Examples: Update the value of score when a coin is collected (in a flowchart, pseudocode or program).
  1. 14.11 Variables
  2. 14.13 Parameters
  3. 14.19 Putting Together Control Structures
8 Formulate a narrative for each step of a process and its intended result, given pseudocode or code.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 14.8 Functions
  4. 14.10 Top Down Design
9 Identify common methods of securing data. Examples: Permissions, encryption, vault, locked closet.
  1. 9.4 Privacy & Security
10 Explain social engineering, including countermeasures, and its impact on a digital society. Examples: Phishing, hoaxes, impersonation, baiting, spoofing.
  1. 16.2 What is Cybersecurity?
  2. 16.3 Impact of Cybersecurity
11 Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.
  1. 9.6 Creative Credit & Copyright
12 Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.
  1. 9.1 Digital Footprint and Reputation
13 Compare and contrast information available locally and globally. Example: Review an article published in the United States and compare to an article on the same subject published in China.
  1. 9.3 Internet Safety
14 Discuss current events related to emerging technologies in computing and the effects such events have on individuals and the global society.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
15 Discuss unique perspectives and needs of a global culture when developing computational artifacts, including options for accessibility for all users. Example: Would students create a webpage aimed at reaching a village of users that have no way access to the Internet?
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
16 Construct content designed for specific audiences through an appropriate medium. Examples: Design a multi-media children’s e-book with an appropriate readability level.
  1. 10.1 Project: Public Service Announcement
17 Publish content to be available for external feedback.
  1. 5.1 Project: Your First Website
18 Type 35 words per minute with 95% accuracy using appropriate keyboarding techniques.
19 Discuss the benefits and limitations of censorship.
  1. 9.3 Internet Safety
20 Evaluate the validity and accuracy of a data set.
21 Compare common transfer protocols. Examples: FTP, HTTP
  1. 7.6 Packets and Protocols
22 Compare data storage structures. Examples: Stack, array, queue, table, database.
23 Demonstrate the use of a variety of digital devices individually and collaboratively to collect, analyze, and present information for content-related problems.
24 Diagram a network given a specific setup or need. Examples: Home network, public network, business network.
  1. 7.5 Routing
25 List common methods of system cybersecurity. Examples: Various password requirements, two-factor authentication, biometric, geolocation.
  1. 9.4 Privacy & Security
26 Categorize models based on the most appropriate representation of various systems.
27 Identify data needed to create a model or simulation of a given event. Examples: When creating a random name generator, the program needs access to a list of possible names.
28 Classify types of assistive technologies. Examples: Hardware, software, stylus, sticky keys.
29 Compare and contrast human intelligence and artificial intelligence.
30 Apply the problem-solving process to solve real-world problems.