Please enable JavaScript to use CodeHS

California 6-8 Standards Mapping

to

Intro to Computer Science in Python 3

24 Standards in this Framework 11 Standards Mapped 45% Mapped to Course


Standard Lessons
6-8.AP.10 Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
  1. 2.10 Top Down Design
  2. 2.19 Putting Together Control Structures
6-8.AP.11 Create clearly named variables that store data, and perform operations on their contents.
  1. 2.7 Naming Guidelines
  2. 2.11 Variables
  3. 2.12 User Input
  4. 3.2 Variables and Types
  5. 3.3 User Input
6-8.AP.12 Design and iteratively develop programs that combine control structures and use compound conditions.
  1. 2.16 If Statements
  2. 2.17 If/ Else Statements
  3. 2.19 Putting Together Control Structures
  4. 4.4 Logical Operators
  5. 5.3 Break and Continue
  6. 6.5 Exceptions
  7. 15.2 De Morgan's Laws
6-8.AP.13 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.10 Top Down Design
  2. 6.1 Functions
  3. 6.2 Functions and Parameters
  4. 6.4 Functions and Return Values
6-8.AP.14 Create procedures with parameters to organize code and make it easier to reuse.
  1. 2.13 Parameters
  2. 6.2 Functions and Parameters
6-8.AP.15 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6-8.AP.16 Incorporate existing code, media, and libraries into original programs, and give attribution.
6-8.AP.17 Systematically test and refine programs using a range of test cases.
  1. 2.4 For Loops
  2. 2.17 If/ Else Statements
  3. 2.18 While Loops
  4. 2.19 Putting Together Control Structures
  5. 4.2 If Statements
  6. 5.1 While Loops
  7. 5.2 For Loops
  8. 5.3 Break and Continue
  9. 6.2 Functions and Parameters
  10. 7.5 The in Keyword
  11. 9.4 Dictionaries
  12. 10.1 Project: Guess the Word
  13. 13.1 Advanced Challenges with Tracy
  14. 18.1 Let's Build Mastermind
6-8.AP.18 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 2.19 Putting Together Control Structures
6-8.AP.19 Document programs in order to make them easier to use, read, test, and debug.
  1. 2.6 Comments
  2. 3.6 Comments
6-8.CS.1 Design modifications to computing devices in order to improve the ways users interact with the devices.
6-8.CS.2 Design a project that combines hardware and software components to collect and exchange data.
6-8.CS.3 Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
6-8.DA.7 Represent data in multiple ways.
  1. 8.1 Tuples
  2. 8.2 Lists
  3. 9.1 2d Lists
  4. 9.4 Dictionaries
6-8.DA.8 Collect data using computational tools and transform the data to make it more useful.
6-8.DA.9 Test and analyze the effects of changing variables while using computational models.
  1. 2.14 Using i in For Loops
  2. 2.15 Extended Loop Control
  3. 7.1 Indexing
  4. 7.2 Slicing
  5. 7.4 Strings and For Loops
  6. 7.5 The in Keyword
  7. 7.6 String Methods
  8. 8.1 Tuples
  9. 8.2 Lists
  10. 8.3 For Loops and Lists
  11. 8.4 List Methods
  12. 9.1 2d Lists
  13. 9.2 List Comprehensions
  14. 9.3 Packing and Unpacking
  15. 9.4 Dictionaries
6-8.IC.20 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
6-8.IC.21 Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.22 Collaborate with many contributors when creating a computational artifact.
  1. 2.19 Putting Together Control Structures
6-8.IC.23 Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
6-8.IC.24 Compare tradeoffs between allowing information to be public and keeping information private and secure.
6-8.NI.4 Model the role of protocols in transmitting data across networks and the Internet.
6-8.NI.5 Explain potential security threats and security measures to mitigate threats.
6-8.NI.6 Apply multiple methods of information protection to model the secure transmission of information.