Please enable JavaScript to use CodeHS

Standards Mapping

for California 6-8

24

Standards in this Framework

19

Standards Mapped

79%

Mapped to Course

Standard Lessons
6-8.AP.10
Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
6-8.AP.11
Create clearly named variables that store data, and perform operations on their contents.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
  4. 9.9 Your First Sprites
  5. 9.10 The Physics of Sprites
6-8.AP.12
Design and iteratively develop programs that combine control structures and use compound conditions.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 8.5 Color Transitions
  5. 8.6 Shape Transformations
  6. 8.7 Direction
  7. 8.8 Mouse Data
  8. 8.9 Keyboard Data
  9. 8.10 Project: Animate an Emoji
6-8.AP.13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
6-8.AP.14
Create procedures with parameters to organize code and make it easier to reuse.
  1. 3.4 Under the Sea
  2. 5.6 Conditional Statements
  3. 5.7 If/Else Statements
6-8.AP.15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6-8.AP.16
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 8.1 Getting Started
  2. 8.2 Color
  3. 8.3 Variables
  4. 8.4 The Draw Loop
  5. 8.5 Color Transitions
  6. 8.6 Shape Transformations
  7. 8.7 Direction
  8. 8.8 Mouse Data
  9. 8.9 Keyboard Data
  10. 8.10 Project: Animate an Emoji
  11. 9.7 Program Structure
  12. 9.9 Your First Sprites
  13. 9.10 The Physics of Sprites
6-8.AP.17
Systematically test and refine programs using a range of test cases.
  1. 5.8 While Loops
  2. 5.9 Karel Challenges
  3. 9.4 Intro to JavaScript
  4. 9.5 Variables
6-8.AP.18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.19
Document programs in order to make them easier to use, read, test, and debug.
  1. 5.4 Multiple Functions
  2. 5.7 If/Else Statements
  3. 5.8 While Loops
  4. 5.9 Karel Challenges
6-8.CS.1
Design modifications to computing devices in order to improve the ways users interact with the devices.
6-8.CS.2
Design a project that combines hardware and software components to collect and exchange data.
  1. 4.5 Internet of Things
  2. 8.8 Mouse Data
  3. 8.9 Keyboard Data
  4. 15.5 Internet of Things (Duplicate)
6-8.CS.3
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
  1. 4.3 Hardware
  2. 15.3 Hardware (Duplicate)
6-8.DA.7
Represent data in multiple ways.
  1. 8.2 Color
6-8.DA.8
Collect data using computational tools and transform the data to make it more useful.
6-8.DA.9
Test and analyze the effects of changing variables while using computational models.
  1. 8.3 Variables
  2. 8.4 The Draw Loop
  3. 8.5 Color Transitions
  4. 8.6 Shape Transformations
  5. 8.7 Direction
  6. 8.8 Mouse Data
  7. 8.9 Keyboard Data
  8. 8.10 Project: Animate an Emoji
6-8.IC.20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 4.6 Ethics and Legal Considerations
  2. 6.3 Impact of the Internet
  3. 7.1 Digital Footprint and Reputation
  4. 15.6 Ethics and Legal Considerations
6-8.IC.21
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 4.6 Ethics and Legal Considerations
  2. 15.6 Ethics and Legal Considerations
6-8.IC.22
Collaborate with many contributors when creating a computational artifact.
6-8.IC.23
Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
  1. 4.6 Ethics and Legal Considerations
  2. 7.6 Creative Credit & Copyright
  3. 7.8 Project: Public Service Announcement
  4. 15.6 Ethics and Legal Considerations
6-8.IC.24
Compare tradeoffs between allowing information to be public and keeping information private and secure.
  1. 4.5 Internet of Things
  2. 6.5 The CIA Triad
  3. 7.4 Privacy & Security
  4. 7.8 Project: Public Service Announcement
  5. 15.5 Internet of Things (Duplicate)
6-8.NI.4
Model the role of protocols in transmitting data across networks and the Internet.
  1. 6.2 The Need for Protocols
6-8.NI.5
Explain potential security threats and security measures to mitigate threats.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
  3. 7.7 Hacking Ethics
6-8.NI.6
Apply multiple methods of information protection to model the secure transmission of information.
  1. 6.4 Cybersecurity
  2. 7.3 Internet Safety
  3. 7.4 Privacy & Security