Please enable JavaScript to use CodeHS

Standards Mapping

for Arkansas KeyCode

41

Standards in this Framework

18

Standards Mapped

43%

Mapped to Course

Standard Lessons
1.1.1
Discuss Career and Technical Student Organizations (CTSO) such as FBLA and DECA.
1.1.2
Investigate CTSO competitive events and identify sources to help prepare for success in competitive events. (If you have an active middle level chapter).
1.1.3
Understand the importance of professional dress and evaluate appropriate dress for CTSO conferences.
1.2.1
Identify effective communication skills by comparing personal vs. business communication. (e.g., text messages, emails).
1.2.2
Comprehend and explain the importance of punctuality and attendance.
1.2.3
Identify traits important to success. (e.g., initiative, positive attitude, enthusiasm, self-confidence).
1.2.4
Discuss integrity and ethical leadership.
1.2.5
Identify and practice fundamental etiquette skills. (e.g., introductions, handshakes, and eye contact)
  1. 7.8 Project: Public Service Announcement
1.2.6
Participate in soft skill evaluations.
  1. 7.8 Project: Public Service Announcement
  2. 12.9 Project: Tell Your Story
  3. 13.5 Creating a Sitemap
1.3.1
Compare and contrast positive and negative social media presence.
  1. 7.1 Digital Footprint and Reputation
1.3.2
Critique one’s own digital presence.
  1. 7.1 Digital Footprint and Reputation
2.1.1
Practice proper care of computer equipment. (e.g., headphones, mouse, keyboard, etc.).
2.1.2
Demonstrate and maintain proper use of computer equipment.
2.1.3
Identify computer hardware and software. (e.g., peripherals, computer and audio settings, etc.).
2.2.1
Establish effective file and password management. (e.g., Cloud Storage, Networks, etc.).
  1. 7.4 Privacy & Security
2.2.2
Access a gradebook program to develop accountability.
3.1.1
Demonstrate the proper techniques necessary for operation of the keyboard (e.g., seating, body posture, finger placement, etc.).
3.1.2
Demonstrate correct touch typing techniques and spacing rules (e.g., punctuation marks, one space after a period, etc.).
  1. 7.8 Project: Public Service Announcement
  2. 10.9 Complete Your Homepage
  3. 12.9 Project: Tell Your Story
  4. 13.7 Create Your Site!
3.1.3
Key documents while applying proper keyboarding techniques.
3.2.1
Understand proper 10-key techniques using numeric keypad on a keyboard.
3.2.2
Identify careers utilizing the 10-key techniques.
4.1.1
Determine and utilize the proper text formatting features. (e.g., font type, font style, color and case).
  1. 10.7 Applying Styling
  2. 10.8 Introduction to CSS Styling
4.1.2
Utilize paragraph formatting functions. (e.g., line spacing, tabs, paragraph spacing, and columns).
  1. 10.3 Formatting Text
  2. 10.7 Applying Styling
  3. 13.2 Webpage Design
4.1.3
Apply page formatting features. (e.g., borders, numbering, bullets, etc.).
  1. 10.3 Formatting Text
  2. 10.6 Using Lists
  3. 13.2 Webpage Design
4.2.1
Key business documents using appropriate formatting guidelines. (e.g., memo, email, letters, reports).
4.2.2
Edit documents using appropriate proofreaders’ marks.
4.2.3
Key documents from handwritten samples.
5.1.1
Examine traditional programming algorithms, including searches and sorts.
5.1.2
Describe the steps needed to efficiently solve a problem.
5.1.3
Manually test algorithms with simple data to observe accuracy of anticipated output.
  1. 1.1 Karel's Coding Environment
  2. 1.4 Lost in Space
  3. 5.1 Introduction to Karel
  4. 5.9 Karel Challenges
5.1.4
Demonstrate appropriate collaborative behaviors (e.g., integrating feedback, providing useful feedback, understanding and accepting multiple perspectives) when solving problems
  1. 7.8 Project: Public Service Announcement
  2. 13.5 Creating a Sitemap
  3. 13.7 Create Your Site!
5.2.1
Apply strategies to protect personal digital footprints (e.g., game profiles, shares on social media, other online accounts) and the responsibilities and opportunities of living, learning, and working in a digitally connected world
  1. 6.4 Cybersecurity
  2. 7.1 Digital Footprint and Reputation
5.2.2
Research and describe real-world cybersecurity problems (e.g., identity theft) as they relate to personal cybersecurity, and how to apply digital and physical methods for protecting and securing personal information
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
5.3.1
Explain the logic involved in how a computer program executes (e.g., flow charts, program flow)
  1. 5.7 If/Else Statements
5.3.2
Discuss and apply best practices of backend program design (e.g., comments, documentation, whitespace)
5.3.3
Test a computer program with data and evaluate output for accuracy
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.1 Introduction to Karel
  4. 5.4 Multiple Functions
  5. 5.6 Conditional Statements
5.3.4
Find and debug errors in a computer program
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.1 Introduction to Karel
  4. 5.4 Multiple Functions
  5. 5.6 Conditional Statements
  6. 9.4 Intro to JavaScript
5.4.1
Implement the following programming concepts: data types, variables creation, variable assignment, conditional branching (e.g., if, if-else, multi-branch), iteration (e.g., for, while), functions
  1. 3.4 Under the Sea
5.4.2
Create a program using a text-based programming language.
  1. 1.4 Lost in Space
  2. 2.2 A Day at the Park
  3. 3.4 Under the Sea
  4. 5.9 Karel Challenges
  5. 8.10 Project: Animate an Emoji
  6. 9.4 Intro to JavaScript
5.5.1
Identify major components and functions of computer systems (e.g., hardware, software) and networks (e.g., network components, wired, wireless) and recommend methods to secure computer systems and networks.
5.6.1
Research diverse careers and career opportunities that are influence by computer science and the technical and soft skills needed for each.