Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado 6-8

66

Standards in this Framework

31

Standards Mapped

46%

Mapped to Course

Standard Lessons
CS.6-8.1.1a
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. Mix and Match Middle School Course
  2. 2.2 A Day at the Park
  3. 5.4 Multiple Functions
  4. Tech Apps and Coding
  5. 1.10 Top Down Design
CS.6-8.1.2a
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. Tech Apps and Coding
  2. 7.2 Empathy
CS.6-8.1.2b
Illustrate translation of a structure such as a game board, road map, or mind map into a labeled graph and explain the contributions of the components.
CS.6-8.2.1a
Model the role of protocols in transmitting data across the Internet.
  1. Mix and Match Middle School Course
  2. 6.2 The Need for Protocols
  3. Tech Apps and Coding
  4. 6.9 Viewing Websites
  5. 9.3 Internet Addresses
  6. 9.4 DNS
  7. 9.5 Routing
  8. 9.6 Packets and Protocols
CS.6-8.2.1b
Design projects that combine hardware and software components to collect and exchange data.
  1. Tech Apps and Coding
  2. 3.1 Welcome to micro:bit!
  3. 3.4 Variables
CS.6-8.2.1c
Systematically identify and fix problems with computing devices and their components.
  1. Tech Apps and Coding
  2. 2.6 Troubleshooting
CS.6-8.2.1d
Compare and contrast network topologies.
CS.6-8.2.2a
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
CS.6-8.2.2b
Identify the role of connected network components.
  1. Tech Apps and Coding
  2. 9.2 Internet Hardware
  3. 9.5 Routing
CS.6-8.2.2c
Discuss issues of bias and accessibility in the design of existing technologies.
  1. Tech Apps and Coding
  2. 7.2 Empathy
CS.6-8.2.3a
Describe various types of threat actors.
CS.6-8.2.3b
Develop strategies to raise awareness of hardware vulnerabilities.
CS.6-8.2.3c
Evaluate the risks and benefits of Internet of Things devices.
  1. Mix and Match Middle School Course
  2. 4.5 Internet of Things
  3. 6.4 Cybersecurity
CS.6-8.2.3d
Distinguish between responsible and malicious hacking.
  1. Mix and Match Middle School Course
  2. 7.7 Hacking Ethics
CS.6-8.3.1a
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. Mix and Match Middle School Course
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.9 Karel Challenges
  5. Tech Apps and Coding
  6. 1.19 Putting Together Control Structures
  7. 1.20 Using Data to Refine Game Mechanics
CS.6-8.3.1b
Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. Mix and Match Middle School Course
  2. 5.7 If/Else Statements
  3. 5.8 While Loops
  4. 5.9 Karel Challenges
  5. Tech Apps and Coding
  6. 3.3 Comments & Pseudocode
CS.6-8.3.1c
Systematically test and refine programs using a range of test cases.
  1. Mix and Match Middle School Course
  2. 1.2 Karel Error Messages
  3. 3.2 Debugging with Error Messages
  4. 5.3 Functions
  5. 5.4 Multiple Functions
  6. 5.5 For Loops
  7. 5.6 Conditional Statements
  8. 5.7 If/Else Statements
  9. 5.8 While Loops
  10. 5.9 Karel Challenges
  11. Tech Apps and Coding
  12. 1.17 If/ Else Statements
  13. 1.18 While Loops
  14. 1.19 Putting Together Control Structures
  15. 1.20 Using Data to Refine Game Mechanics
CS.6-8.3.2a
Represent data using multiple encoding schemes.
  1. Tech Apps and Coding
  2. 8.3 Encoding Text with Binary
  3. 8.4 Pixel Images
  4. 8.5 Hexadecimal
CS.6-8.3.2b
Document programs in order to make them easier to follow, test, and debug.
  1. Mix and Match Middle School Course
  2. 5.4 Multiple Functions
  3. Tech Apps and Coding
  4. 1.6 Comments
CS.6-8.3.2c
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. Tech Apps and Coding
  2. 1.20 Using Data to Refine Game Mechanics
  3. 7.6 Test
CS.6-8.3.2d
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. Tech Apps and Coding
  2. 7.7 Build Your Website!
CS.6-8.3.2e
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. Tech Apps and Coding
  2. 7.2 Empathy
CS.6-8.3.3a
Explain the role and importance of backups.
CS.6-8.4.1a
Explain how physical and digital security measures protect electronic information.
  1. Mix and Match Middle School Course
  2. 6.4 Cybersecurity
  3. 6.6 Encryption
  4. 7.4 Privacy & Security
  5. Tech Apps and Coding
  6. 4.4 Privacy & Security
CS.6-8.4.1b
Apply multiple methods of encryption to model the secure transmission of information.
  1. Mix and Match Middle School Course
  2. 6.6 Encryption
  3. 6.7 Project: Steganography
  4. Tech Apps and Coding
  5. 5.3 Basic Crypto Systems: Caesar Cipher
  6. 5.4 Basic Crypto Systems: Cracking Caesar
  7. 5.5 Basic Crypto Systems: Vigenere Cipher
CS.6-8.4.1c
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. Mix and Match Middle School Course
  2. 7.1 Digital Footprint and Reputation
  3. 7.4 Privacy & Security
  4. Tech Apps and Coding
  5. 4.3 Internet Safety
  6. 4.4 Privacy & Security
CS.6-8.4.1d
Discuss the risks and benefits of sharing PII.
CS.6-8.4.1e
Explain techniques to detect, correct, and prevent disclosure of PII.
  1. Mix and Match Middle School Course
  2. 7.4 Privacy & Security
  3. Tech Apps and Coding
  4. 4.4 Privacy & Security
CS.6-8.4.1f
Analyze specific federal, state, and local laws as they relate to cybersecurity and privacy.
CS.6-8.5.1a
Examine an aspect of daily life that is predicted to change due to the introduction of AI technologies.
  1. Introduction to AI for Middle School
  2. 1.1 What is AI?
  3. Mix and Match Middle School Course
  4. 4.7 The Future of Computing
CS.6-8.5.1b
Compare the changes AI is bringing to society with those of previous industrial revolutions.
CS.6-8.5.1c
Predict a new type of job that might arise, or how an existing type of job might change or go away, as a result of the adoption of AI technologies.
  1. Introduction to AI for Middle School
  2. 1.1 What is AI?
  3. Mix and Match Middle School Course
  4. 4.7 The Future of Computing
CS.6-8.5.1d
Create a novel application using some of the AI extensions or plugins available in the programming framework of your choice.
  1. Introduction to AI for Middle School
  2. 2.1 Communicating with AI
CS.6-8.5.1e
Research a societal problem and describe how AI technologies can be used to address that problem.
CS.6-8.5.1f
Create a dataset for training a decision tree classifier or predictor and explore the impact that different feature encodings have on the decision tree.
CS.6-8.5.2a
Describe how a vision system might exhibit cultural bias if it lacked knowledge of objects not found in the culture of the people who created it (For example: road signs in different countries).
  1. Introduction to AI for Middle School
  2. 2.1 Communicating with AI
CS.6-8.5.2b
Train and evaluate a classification or prediction model using machine learning on a dataset.
  1. Introduction to AI for Middle School
  2. 2.1 Communicating with AI
  3. 9.1 AI and Music Generation
CS.6-8.5.2c
Evaluate the ways various stakeholders' goals and values influence the design of AI systems.
CS.6-8.5.2d
Explain how the choice of training data shapes the behavior of the classifier, and how bias can be introduced if the training set is not properly balanced to represent the full range and distribution of items being classified.
  1. Introduction to AI for Middle School
  2. 3.1 Machine Learning and Music Classification
  3. 9.1 AI and Music Generation
CS.6-8.5.2e
Define criteria for consciousness and evaluate AI systems or fictional AI characters according to those criteria.
CS.6-8.5.3a
Give examples of how intelligent agents combine information from multiple sensors.
CS.6-8.5.3b
Give examples of different types of computer perception that can extract meaning from sensory signals.
CS.6-8.5.3c
Illustrate how sequences of words can be recognized as phrases, even if some of the words are unclear, by looking at how the words fit together.
CS.6-8.5.3d
Show how a game board (e.g., tic-tac-toe, Chutes and Ladders, Monopoly, chess) can be represented by a description in plain language.
CS.6-8.5.3e
Evaluate how an AI system meets the design criteria of accountability and respect for privacy.
CS.6-8.5.3f
Contrast the unique characteristics of human learning with the ways machine learning systems operate.
CS.6-8.5.3g
Model how unsupervised learning finds patterns in unlabeled data.
CS.6-8.5.3h
Explain the difference between training and using a reasoning model.
CS.6-8.5.3i
Compare how a decision tree learning algorithm works vs. how a neural network learning algorithm works.
CS.6-8.5.3j
Explain the differences between supervised learning and reinforcement learning.
CS.6-8.5.3k
Illustrate the structure of a neural network and describe how its parts form a set of functions that compute an output.
CS.6-8.5.3l
Illustrate how a computer can solve a maze, find a route on a map, or reason about concepts in a knowledge graph by drawing a search tree.
CS.6-8.5.3m
Model the process of solving a graph search problem using breadth-first search to draw a search tree.
CS.6-8.5.3n
Categorize problems as classification, prediction, combinatorial search, or sequential decision problems.
CS.6-8.5.3o
Illustrate how word embeddings can be used to reason about the meaning of words.
CS.6-8.5.3p
Describe some NLP (Natural Language Processing) tasks computers can perform and explain how they work.
CS.6-8.5.3q
Explain the knowledge a computer would need to solve a naive physics reasoning problem.
CS.6-8.5.3r
Describe how computers use different types of cues to recognize human emotional states.
CS.6-8.6.1a
Develop strategies to raise awareness of the effects of, and methods to identify and prevent, cyberbullying.
  1. Mix and Match Middle School Course
  2. 7.2 Cyberbullying
  3. Tech Apps and Coding
  4. 4.2 Cyberbullying
  5. 4.5 Project: Public Service Announcement
CS.6-8.6.1b
Recognize the many sources of data that make up a digital footprint.
  1. Mix and Match Middle School Course
  2. 7.1 Digital Footprint and Reputation
  3. Tech Apps and Coding
  4. 4.1 Digital Footprint and Reputation
CS.6-8.6.1c
Recognize the permanence of a digital footprint.
  1. Mix and Match Middle School Course
  2. 7.1 Digital Footprint and Reputation
  3. Tech Apps and Coding
  4. 4.1 Digital Footprint and Reputation
CS.6-8.6.1d
Explain how intellectual property and copyright relate to fair use.
  1. Mix and Match Middle School Course
  2. 7.6 Creative Credit & Copyright
CS.6-8.6.1e
Identify the role of social media in their lives.
CS.6-8.6.1f
Reflect on the positive and negative effects social media use has on their relationships.
CS.6-8.6.1g
Think about how to develop healthy habits when using digital media.
CS.6-8.6.1h
Explain why information about them and their behaviors is valuable to companies and consider potential strategies to limit access to information by third parties.