Please enable JavaScript to use CodeHS

Standards Framework

for Arkansas 5-8

151

Standards in this Framework

Standard Description
CSK8.G5.1.1 Identify and utilize level-appropriate, algorithmic problem-solving strategies
CSK8.G6.1.1 Identify and utilize level-appropriate, algorithmic problem-solving strategies
CSK8.G7.1.1 Identify and utilize level-appropriate, algorithmic problem-solving strategies
CSK8.G8.1.1 Identify and utilize level-appropriate, algorithmic problem-solving strategies
CSK8.G5.1.2 Examine visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity
CSK8.G6.1.2 Utilize visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity
CSK8.G7.1.2 Utilize visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity
CSK8.G8.1.2 Utilize visual representations of problem-solving logic (e.g., flowcharts) to solve problems of level-appropriate complexity
CSK8.G5.1.3 Evaluate effective ways that collaboration can support problem solving and innovation
CSK8.G6.1.3 Analyze appropriate collaborative behaviors (e.g., accepting multiple perspectives, integrating feedback, providing useful feedback, understanding and using socialization) to solve problems
CSK8.G7.1.3 Analyze appropriate collaborative behaviors (e.g., accepting multiple perspectives, integrating feedback, providing useful feedback, understanding and using socialization) to solve problems
CSK8.G8.1.3 Analyze appropriate collaborative behaviors (e.g., accepting multiple perspectives, integrating feedback, providing useful feedback, understanding and using socialization) to solve problems
CSK8.G5.1.4 Apply strategies for solving simple hardware and software problems that may occur during use
CSK8.G6.1.4 Apply strategies for solving simple hardware and software problems that may occur during use
CSK8.G7.1.4 Apply strategies for identifying and solving routine hardware and software problems that occur during everyday computer use
CSK8.G8.1.4 Apply strategies for identifying and solving routine hardware and software problems that occur in everyday computer use
CSK8.G6.2.1 Describe subsets of a sample set identifying unions, intersections, and complements (e.g., describing information sorted with a Venn diagram)
CSK8.G7.2.1 Create compound statements that represent unions, intersections, and complements using OR, AND, and NOT (e.g., writing statements from information sorted with a Venn diagram)
CSK8.G8.2.1 Create subsets of a sample set by using logic (e.g., OR, AND, NOT, XOR)
CSK8.G6.2.2 Explore how variables are used to represent data
CSK8.G7.2.2 Utilize variables to construct expressions and equations
CSK8.G8.2.2 Utilize variables in the creation of functions, methods, or similar constructs
CSK8.G5.2.3 Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, block-based programming, treasure maps)
CSK8.G6.2.3 Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, block-based programming, treasure maps)
CSK8.G7.2.3 Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, block-based programming, treasure maps)
CSK8.G8.2.3 Compare and contrast the relative positions of objects using ordered pairs within a program (e.g., battleships, text-based programming, treasure maps)
CSK8.G6.2.4 Discuss binary numbers, logic, sets, and functions and their application to computer science
CSK8.G7.2.4 Examine binary numbers, logic, sets, and functions and their application to computer science
CSK8.G8.2.4 Evaluate the relationship between binary and hexadecimal representations
CSK8.G5.3.1 Illustrate how different kinds of data can be represented
CSK8.G6.3.1 Represent a variety of data in multiple formats
CSK8.G7.3.1 Evaluate the effectiveness of visual representations of data
CSK8.G8.3.1 Create and analyze data representations of various artifacts
CSK8.G5.3.2 Recognize that binary can represent data using only two options (e.g., on/off)
CSK8.G6.3.2 Discuss how and why binary can represent data in a computer
CSK8.G7.3.2 Discuss how American Standard Code for Information Interchange (ASCII) codes represent data in a computer
CSK8.G8.3.2 Discuss how and why hexadecimal codes are used to represent data in a computer
CSK8.G5.3.3 Explore various models and simulations (e.g., ecosystems, epidemics) to support research and data analysis
CSK8.G6.3.3 Compare problems that can be solved using models and simulations that utilize data analysis
CSK8.G7.3.3 Evaluate the effectiveness of models and simulations for problem solving and analyze data
CSK8.G8.3.3 Analyze the degree to which a computer model accurately represents an actual situation
CSK8.G5.3.4 Identify the characteristics (e.g., collection environment, input method, units of measure) of the collected data
CSK8.G6.3.4 Describe the characteristics (e.g., collection environment, input method, units of measure) of the collected data
CSK8.G7.3.4 Analyze the quality of collected data based on its characteristics (e.g., temperatures gathered at different scale) to determine the value provided to the user
CSK8.G8.3.4 Collect data to be used for quality analysis
CSK8.G5.3.5 Evaluate, select, and use level-appropriate tools to collect data
CSK8.G6.3.5 Collect and analyze data using a variety of level-appropriate tools (e.g., analog, digital)
CSK8.G7.3.5 Collect and analyze data from multiple sources using a variety of level-appropriate tools (e.g., analog, digital)
CSK8.G8.3.5 Collect and analyze data from multiple sources using a variety of level-appropriate tools (e.g., analog, digital)
CSK8.G5.3.6 Evaluate the most effective ways to arrange, collect, and visually represent data
CSK8.G6.3.6 Evaluate the most effective ways to arrange, collect, and visually represent data
CSK8.G7.3.6 Evaluate the most effective ways to arrange, collect, and visually represent data
CSK8.G8.3.6 Evaluate the most effective ways to arrange, collect, and visually represent data
CSK8.G5.4.1 Identify real-world cybersecurity problems (e.g., malicious hacking) and apply strategies for protecting and securing personal digital information
CSK8.G6.4.1 Identify real-world cybersecurity problems (e.g., malicious hacking) as they relate to personal cybersecurity, and how to apply strategies for protecting and securing personal digital information
CSK8.G7.4.1 Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity and how to apply digital and physical methods for protecting and securing personal information
CSK8.G8.4.1 Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity and how to apply digital and physical methods for protecting and securing personal information
CSK8.G5.4.2 Discuss issues related to the use of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use
CSK8.G6.4.2 Discuss the difference between appropriate, legal, and ethical uses of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use
CSK8.G7.4.2 Demonstrate an understanding between appropriate, legal, and ethical uses of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use
CSK8.G8.4.2 Analyze the difference between appropriate, legal, and ethical uses of technology, acceptable use policies, and codes of conduct and the consequences of inappropriate use
CSK8.G5.4.3 Identify individual digital footprint (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world
CSK8.G6.4.3 Apply strategies to protect personal digital footprints (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world
CSK8.G7.4.3 Apply strategies to protect personal digital footprints (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world
CSK8.G8.4.3 Apply strategies to protect personal digital footprints (e.g., game profiles, other online accounts, and shares on social media) and the responsibilities and opportunities of living, learning, and working in a digitally connected world
CSK8.G5.5.1 Create algorithms to solve problems and evaluate effectiveness
CSK8.G6.5.1 Create algorithms to solve problems and evaluate effectiveness
CSK8.G7.5.1 Create algorithms using constraints to solve problems and evaluate effectiveness
CSK8.G8.5.1 Create algorithms using constraints to solve problems and evaluate effectiveness
CSK8.G5.5.2 Design and test algorithms collaboratively using technology
CSK8.G6.5.2 Design and test algorithms collaboratively using technology
CSK8.G7.5.2 Design and test algorithms collaboratively using technology
CSK8.G8.5.2 Design and test algorithms collaboratively using technology
CSK8.G5.5.3 Compare and refine algorithms
CSK8.G6.5.3 Compare and refine algorithms
CSK8.G7.5.3 Compare and refine algorithms
CSK8.G8.5.3 Compare and refine algorithms
CSK8.G5.5.4 Identify and correct multiple errors within a level-appropriate algorithm
CSK8.G6.5.4 Identify and correct multiple errors within a level-appropriate algorithm
CSK8.G7.5.4 Identify and correct multiple errors within a level-appropriate algorithm
CSK8.G8.5.4 Identify and correct multiple errors within a level-appropriate algorithm
CSK8.G5.6.1 Use a visual block-based or text-based programming language individually and collaboratively to solve level-appropriate problems
CSK8.G6.6.1 Use a visual block-based or text-based programming language individually and collaboratively to solve level-appropriate problems
CSK8.G7.6.1 Use a visual block-based or text-based programming language individually and collaboratively to solve level-appropriate problems
CSK8.G8.6.1 Create a level-appropriate program individually and collaboratively using a text-based programming language
CSK8.G5.6.2 Discuss and apply best practices of documentation (e.g., comments, descriptive variable names, program headers)
CSK8.G6.6.2 Discuss and apply best practices of documentation (e.g., comments, descriptive variable names, program headers)
CSK8.G7.6.2 Utilize best practices of documentation (e.g., comments, descriptive variable names, program headers)
CSK8.G8.6.2 Utilize best practices of documentation (e.g., comments, descriptive variable names, program headers)
CSK8.G5.6.3 Improve or remix existing block-based and/or text-based programs
CSK8.G6.6.3 Improve or remix existing block-based and/or text-based programs
CSK8.G7.6.3 Improve or remix existing block-based and/or text-based programs
CSK8.G8.6.3 Improve or remix existing text-based programs
CSK8.G5.7.1 Discuss ways that humans create input for a desired output through a device (e.g., changing device settings, texting)
CSK8.G6.7.1 Identify what distinguishes humans from machines, including focusing on human intelligence versus machine intelligence (e.g., computer vision, language understanding, robot motion, speech)
CSK8.G7.7.1 Describe ways in which computers use models of intelligent behavior (e.g., computer vision, language understanding, robot motion, speech)
CSK8.G8.7.1 Compare and contrast human intelligence and computer intelligence (e.g., common sense, emotional decisions, literal versus abstract)
CSK8.G5.7.2 Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment
CSK8.G6.7.2 Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment
CSK8.G7.7.2 Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment
CSK8.G8.7.2 Recognize the expense of computer equipment and how care and protection of the computers can prolong use and save the cost of purchasing new equipment
CSK8.G5.8.1 Describe how information can be transmitted using computing devices via a network
CSK8.G6.8.1 Describe how information can be transmitted using computing devices via a network
CSK8.G7.8.1 Identify major components and functions of computer systems and networks
CSK8.G8.8.1 Describe major components and functions of computer systems and networks
CSK8.G5.8.2 Demonstrate touch typing techniques while increasing speed and maintaining accuracy
CSK8.G6.8.2 Demonstrate touch typing techniques while increasing speed and maintaining accuracy
CSK8.G7.8.2 Demonstrate touch typing techniques while increasing speed and maintaining accuracy
CSK8.G8.8.2 Demonstrate touch typing techniques while increasing speed and maintaining accuracy
CSK8.G5.8.3 Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture
CSK8.G6.8.3 Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture
CSK8.G7.8.3 Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture
CSK8.G8.8.3 Practice proper keyboarding technique: ● body centered in front of keyboard ● elbows down ● eyes focused on the screen ● proper posture
CSK8.G7.9.1 Compare and contrast examples of high-level and low-level programming languages
CSK8.G8.9.1 Research the hierarchy in computing including high-level languages, instruction sets, logic circuits, and translations
CSK8.G5.9.2 Demonstrate level-appropriate proficiency with keyboards and other input/output devices
CSK8.G6.9.2 Demonstrate level-appropriate proficiency with keyboards and other input/output devices
CSK8.G7.9.2 Demonstrate level-appropriate proficiency with keyboards and other input/output devices
CSK8.G8.9.2 Demonstrate level-appropriate proficiency with keyboards and other input/output devices
CSK8.G5.9.3 Use and evaluate productivity technology tools for effectiveness in writing, communication, and publishing activities
CSK8.G6.9.3 Apply productivity/multimedia tools to support communication throughout the curriculum
CSK8.G7.9.3 Apply productivity/multimedia tools to support communication throughout the curriculum
CSK8.G8.9.3 Design, develop, and publish/present products (e.g., podcasts, videos, websites) using technology resources that demonstrate and communicate curriculum concepts
CSK8.G5.10.1 Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers
CSK8.G6.10.1 Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers
CSK8.G7.10.1 Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers
CSK8.G8.10.1 Identify the dangers of social media and other online engagement platforms, and strategies to address these dangers
CSK8.G5.10.2 Discuss the impact of access to computing resources
CSK8.G6.10.2 Demonstrate an understanding of the impact of access to computing resources
CSK8.G7.10.2 Demonstrate an understanding of the impact of access to computing resources on a global economy
CSK8.G8.10.2 Analyze the impact of the availability to computing resources on accessing critical information
CSK8.G5.10.3 Classify different types of relationships (e.g., parents, trusted adults, friends, strangers, anonymous users) and how they affect what information should be shared
CSK8.G6.10.3 Identify the potential outcomes of oversharing information with otherwise trusted parties and how to minimize the effects
CSK8.G7.10.3 Research and discuss potential outcomes of oversharing information with otherwise trusted parties and how to minimize the effects
CSK8.G8.10.3 Research and discuss potential outcomes of oversharing information with otherwise trusted parties and how to minimize the effects
CSK8.G5.10.4 Research the history of computers and technology
CSK8.G6.10.4 Research the history of computers and technology
CSK8.G7.10.4 Research the history of computers and technology
CSK8.G8.10.4 Research the history of computers and technology
CSK8.G5.10.5 Examine the range and types of careers that require computing and technology
CSK8.G6.10.5 Investigate a career that requires computing and technology
CSK8.G7.10.5 Describe how computer science enhances other career fields
CSK8.G8.10.5 Predict the role of computer science in future careers
CSK8.G5.10.6 Explain positive and negative impacts of technology on the daily life of individuals and society
CSK8.G6.10.6 Demonstrate an understanding of positive and negative impacts of technology on the daily life of individuals and society
CSK8.G7.10.6 Analyze changes in technology through time and the effects those changes have on the daily life of individuals and society
CSK8.G8.10.6 Analyze positive and negative impacts of technology on aspects of the world (e.g., culture, economy, education, environment, workforce)
CSK8.G5.10.7 Demonstrate an understanding of ethical issues in copyright laws, fair use exemptions, and intellectual property rights in various media
CSK8.G6.10.7 Demonstrate ethical uses of copyright laws, fair use exemptions, and intellectual property in various media
CSK8.G7.10.7 Demonstrate ethical uses of copyright laws, fair use exemptions, and intellectual property in various media
CSK8.G8.10.7 Analyze ethical issues that relate to copyright laws, fair use exemptions, and intellectual property in various media