Please enable JavaScript to use CodeHS

Alabama 8 Standards Mapping

to

Computing Ideas (Lovelace)

35 Standards in this Framework 25 Standards Mapped 71% Mapped to Course


Standard Lessons
R1 R1) Identify, demonstrate, and apply personal safe use of digital devices.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
R2 R2) Recognize and demonstrate age-appropriate responsible use of digital devices and resources as outlined in school/district rules.
  1. 9.1 Digital Footprint and Reputation
  2. 9.3 Internet Safety
  3. 9.4 Privacy & Security
R3 R3) Assess the validity and identify the purpose of digital content.
  1. 9.6 Creative Credit & Copyright
R4 R4) Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. 2.4 Hardware
  2. 7.2 Internet Hardware
R5 R5) Locate and curate information from digital sources to answer research questions.
  1. 9.5 Information Literacy
  2. 9.6 Creative Credit & Copyright
R6 R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.
  1. 5.1 Project: Your First Website
  2. 8.1 Project: The Effects of the Internet
  3. 10.1 Project: Public Service Announcement
1 Design a function using a programming language that demonstrates abstraction. Example: Create a program that utilizes functions in an effort remove repetitive sequences of steps.
  1. 1.4 Functions in Karel
  2. 1.11 If/Else Statements
  3. 1.14 More Karel Examples and Testing
  4. 1.16 Karel Challenges
  5. 14.8 Functions
  6. 14.13 Parameters
2 Explain how abstraction is used in a given function. Example: Examine a set of block-based code and explain how abstraction was used.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
3 Create an algorithm using a programming language that includes the use of sequencing, selections, or iterations. Example: Use a block-based or script programming language Step 1: Start Step 2: Declare variables a, b and c. Step 3: Read variables a, b and c. Step 4: If a>b If a>c Display a is the largest number. Else Display c is the largest number. Else If b>c Display b is the largest number. Else Display c is the greatest number. Step 5: Stop
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 14.4 For Loops
  8. 14.10 Top Down Design
  9. 14.16 If Statements
  10. 14.17 If/ Else Statements
  11. 14.18 While Loops
  12. 14.19 Putting Together Control Structures
4 Create a function to simplify a task. Example: 38 = 3*3*3*3*3*3*3*3; =(Average) used in a spreadsheet to average a given list of grades.
  1. 1.4 Functions in Karel
  2. 1.9 For Loops
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
  6. 1.14 More Karel Examples and Testing
  7. 1.16 Karel Challenges
  8. 14.8 Functions
5 Discuss the efficiency of an algorithm or technology used to solve complex problems.
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
6 Describe how algorithmic processes and automation increase efficiency.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.13 Control Structures Example
  3. 1.14 More Karel Examples and Testing
  4. 1.16 Karel Challenges
  5. 14.4 For Loops
  6. 14.10 Top Down Design
7 Create a program that includes selection, iteration, or abstraction, and initializes, and updates, at least two variables. Examples: Make a game, interactive card, story, or adventure game.
  1. 14.19 Putting Together Control Structures
8 Compare and contrast common methods of securing data.
  1. 9.4 Privacy & Security
9 Secure a file or other data. Examples: lock spreadsheet cell(s), password protect, encrypt.
10 Analyze different modes of social engineering and their effectiveness. Examples: Phishing, hoaxes, impersonation, baiting, spoofing.
  1. 9.4 Privacy & Security
  2. 16.2 What is Cybersecurity?
11 Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content. Example: Students create a brochure that highlights the consequences of illegally downloading media.
  1. 9.6 Creative Credit & Copyright
  2. 10.1 Project: Public Service Announcement
12 Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.
  1. 9.1 Digital Footprint and Reputation
13 Evaluate the impact of digital globalization on public perception and ways Internet censorship can affect free and equitable access to information.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
  3. 9.3 Internet Safety
14 Analyze current events related to computing and their effects on education, the workplace, individuals, communities, and global society.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
15 Critique computational artifacts, including options for accessibility for all users, with respect to the needs of a global culture.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
16 Present content designed for specific audiences through an appropriate medium. Example: Create and share a help video for a senior's center that provides tips for online safety.
  1. 10.1 Project: Public Service Announcement
17 Communicate and publish individually or collaboratively to persuade peers, experts, or community about issues and problems.
  1. 10.1 Project: Public Service Announcement
18 Type 40 words per minute with 95% accuracy using appropriate keyboarding techniques.
19 Critique the impacts of censorship as it impacts global society. Example: Create a presentation outlining the social implications of limiting access to web content by favoring or blocking particular products or websites.
  1. 9.3 Internet Safety
20 Examine an artifact that demonstrates bias through distorting, exaggerating, or misrepresenting data and redesign it using factual, relevant, unbiased content to more accurately reflect the truth.
21 Differentiate types of data storage and apply most efficient structure. Examples: Stack, array, queue, table, database.
22 Encrypt and decrypt various data. Example: Create and decipher a message sent in a secret code.
23 Design a digital artifact to propose a solution for a content-related problem. Example: Create a presentation outlining how to create a cost-efficient method to melt snow on roads during the winter.
24 Compare and contrast common methods of cybersecurity. Example: Discuss how password protections and encryption are similar and different.
25 Create a model that represents a system. Example: Food chain, supply and demand.
  1. 3.1 Computer Model
26 Create a simulation that tests a specific model. Examples: Demonstrate that pressure changes with temperature in a controlled environment; demonstrate that rocket design affects the height of a rocket’s launch; demonstrate that the amount of water changes the height of a plant.
27 Analyze assistive technologies and how they improve the quality of life for users. Example: Research multiple speech to text technologies and write a persuasive essay in favor of one over another.
28 Develop a logical argument for and against artificial intelligence. Examples: Students debate the use of artificial intelligence in self-driving vehicles. Students write a persuasive essay to argue for or against digital personal assistants.
29 Create an artifact to solve a problem using ideation and iteration in the problem-solving process. Examples: Create a public service announcement or design a computer program, game, or application.
  1. 14.19 Putting Together Control Structures