Please enable JavaScript to use CodeHS

Standards Mapping

for California 6-8

24

Standards in this Framework

14

Standards Mapped

58%

Mapped to Course

Standard Lessons
6-8.AP.10
Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
  1. 1.6 Top Down Design and Decomposition in Karel
6-8.AP.11
Create clearly named variables that store data, and perform operations on their contents.
  1. 3.2 Variables
  2. 3.3 User Input
  3. 25.1 Intro to Lists/Arrays
  4. 25.8 Intro to Objects/Maps
  5. 25.12 Intro to Sets
  6. 25.13 Intro to Grids
6-8.AP.12
Design and iteratively develop programs that combine control structures and use compound conditions.
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
  6. 5.4 If Statements
  7. 5.7 For Loop Practice
  8. 5.9 While Loops
6-8.AP.13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 7.1 Functions and Parameters 1
  2. 7.2 Functions and Parameters 2
  3. 7.3 Functions and Parameters 3
  4. 7.4 Functions and Return Values 1
  5. 7.5 Functions and Return Values 2
6-8.AP.14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 7.1 Functions and Parameters 1
  2. 7.2 Functions and Parameters 2
  3. 7.3 Functions and Parameters 3
6-8.AP.15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6-8.AP.16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 1.8 Super Karel
  2. 27.1 Game Design: Helicopter
6-8.AP.17
Systematically test and refine programs using a range of test cases.
  1. 11.1 Breakout
6-8.AP.18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.19
Document programs in order to make them easier to use, read, test, and debug.
  1. 1.7 Commenting Your Code
6-8.CS.1
Design modifications to computing devices in order to improve the ways users interact with the devices.
  1. 9.5 Mouse Events: Mouse Clicked
  2. 9.6 Mouse Events: Mouse Moved
  3. 9.8 Key Events
6-8.CS.2
Design a project that combines hardware and software components to collect and exchange data.
  1. 9.5 Mouse Events: Mouse Clicked
  2. 9.6 Mouse Events: Mouse Moved
  3. 9.8 Key Events
6-8.CS.3
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 1.14 More Karel Examples and Testing
  4. 1.15 How to Indent Your Code
6-8.DA.7
Represent data in multiple ways.
  1. 3.2 Variables
  2. 25.1 Intro to Lists/Arrays
  3. 25.8 Intro to Objects/Maps
  4. 25.9 Basics of Objects
  5. 25.12 Intro to Sets
  6. 25.13 Intro to Grids
6-8.DA.8
Collect data using computational tools and transform the data to make it more useful.
  1. 3.3 User Input
  2. 7.1 Functions and Parameters 1
  3. 7.4 Functions and Return Values 1
  4. 7.5 Functions and Return Values 2
6-8.DA.9
Test and analyze the effects of changing variables while using computational models.
  1. 3.2 Variables
  2. 3.3 User Input
  3. 25.5 Iterating Over an Array
  4. 25.14 Looping Over a Grid
6-8.IC.20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
6-8.IC.21
Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.22
Collaborate with many contributors when creating a computational artifact.
6-8.IC.23
Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
6-8.IC.24
Compare tradeoffs between allowing information to be public and keeping information private and secure.
6-8.NI.4
Model the role of protocols in transmitting data across networks and the Internet.
6-8.NI.5
Explain potential security threats and security measures to mitigate threats.
6-8.NI.6
Apply multiple methods of information protection to model the secure transmission of information.