Please enable JavaScript to use CodeHS

California 6-8 Standards Mapping


Intro to Programming with Karel and micro:bit

24 Standards in this Framework 12 Standards Mapped 50% Mapped to Course

Standard Lessons
6-8.AP.10 Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
  1. 2.3 Comments & Pseudocode
  2. 3.4 Top Down Design and Decomposition in Karel
  3. 9.1 Karel Challenges
  4. 11.1 Final Project
6-8.AP.11 Create clearly named variables that store data, and perform operations on their contents.
  1. 2.4 Variables
  2. 7.3 Operators
6-8.AP.12 Design and iteratively develop programs that combine control structures and use compound conditions.
  1. 4.3 For Loops
  2. 4.4 More Practice with For Loops
  3. 5.1 If Statements
  4. 5.2 If/Else Statements
  5. 5.3 More Practice
  6. 6.1 While Loops in Karel
  7. 6.2 More Practice with While Loops
  8. 7.1 For Loops
  9. 7.2 While Loops
  10. 7.4 If/Else Statements
  11. 8.1 Control Structures Example
  12. 8.2 More Karel Examples and Testing
  13. 9.1 Karel Challenges
  14. 10.1 micro:bit Challenges
  15. 11.1 Final Project
6-8.AP.13 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.3 Comments & Pseudocode
  2. 3.4 Top Down Design and Decomposition in Karel
  3. 7.5 Functions
  4. 9.1 Karel Challenges
  5. 10.1 micro:bit Challenges
  6. 11.1 Final Project
6-8.AP.14 Create procedures with parameters to organize code and make it easier to reuse.
  1. 7.5 Functions
6-8.AP.15 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 10.4 Final Project
6-8.AP.16 Incorporate existing code, media, and libraries into original programs, and give attribution.
6-8.AP.17 Systematically test and refine programs using a range of test cases.
  1. 5.1 If Statements
  2. 5.2 If/Else Statements
  3. 5.3 More Practice
  4. 6.1 While Loops in Karel
  5. 6.2 More Practice with While Loops
  6. 7.2 While Loops
  7. 7.3 Operators
  8. 7.4 If/Else Statements
  9. 7.5 Functions
  10. 8.2 More Karel Examples and Testing
  11. 9.1 Karel Challenges
  12. 10.1 micro:bit Challenges
6-8.AP.18 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 10.1 micro:bit Challenges
  2. 10.4 Final Project
  3. 11.1 Final Project
6-8.AP.19 Document programs in order to make them easier to use, read, test, and debug.
  1. 2.3 Comments & Pseudocode
  2. 4.1 Commenting Your Code
6-8.CS.1 Design modifications to computing devices in order to improve the ways users interact with the devices.
  1. 10.4 Final Project
6-8.CS.2 Design a project that combines hardware and software components to collect and exchange data.
  1. 10.1 micro:bit Challenges
  2. 10.2 Explore a New Sensor
  3. 10.4 Final Project
6-8.CS.3 Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
6-8.DA.7 Represent data in multiple ways.
6-8.DA.8 Collect data using computational tools and transform the data to make it more useful.
  1. 10.2 Explore a New Sensor
6-8.DA.9 Test and analyze the effects of changing variables while using computational models.
6-8.IC.20 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
6-8.IC.21 Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.22 Collaborate with many contributors when creating a computational artifact.
6-8.IC.23 Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
6-8.IC.24 Compare tradeoffs between allowing information to be public and keeping information private and secure.
6-8.NI.4 Model the role of protocols in transmitting data across networks and the Internet.
6-8.NI.5 Explain potential security threats and security measures to mitigate threats.
6-8.NI.6 Apply multiple methods of information protection to model the secure transmission of information.