Please enable JavaScript to use CodeHS

Standards Mapping

for Illinois 6-8

29

Standards in this Framework

25

Standards Mapped

86%

Mapped to Course

Standard Lessons
6-8.CS.01
Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 4.8 Project: Design the Computer of Tomorrow
6-8.CS.02
Design projects that combine hardware and software components to collect and exchange data.
  1. 4.5 Internet of Things
  2. 8.8 Mouse Data
  3. 8.9 Keyboard Data
6-8.CS.03
Systematically identify and fix problems with computing devices and their components.
  1. 4.3 Hardware
6-8.NI.04
Model the role of protocols in transmitting data across networks and the Internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
6-8.NI.05
Explain how physical and digital security measures protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 7.4 Privacy & Security
6-8.NI.06
Apply multiple methods of encryption to model the secure transmission of information.
  1. 6.6 Encryption
  2. 6.7 Project: Steganography
6-8.DA.07
Represent data using multiple encoding schemes.
  1. 6.7 Project: Steganography
  2. 8.2 Color
6-8.DA.08
Collect data using computational tools and transform the data to make it more useful and reliable.
6-8.DA.09
Refine computational models based on the data they have generated.
6-8.DA.10
Evaluate the misuse of data and impact of distorted outcomes.
  1. 6.5 The CIA Triad
6-8.AP.11
Use flowcharts or pseudocode to address complex problems as algorithms.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
6-8.AP.12
Perform operations on student-created variables that possess descriptive names and represent different data types.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
  4. 9.9 Your First Sprites
6-8.AP.13
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.5 For Loops
  5. 5.7 If/Else Statements
  6. 5.8 While Loops
  7. 5.9 Karel Challenges
  8. 8.5 Color Transitions
  9. 8.6 Shape Transformations
  10. 8.7 Direction
  11. 8.8 Mouse Data
  12. 8.9 Keyboard Data
  13. 8.10 Project: Animate an Emoji
6-8.AP.14
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.9 Karel Challenges
6-8.AP.15
Create procedures with parameters to organize code and make it easier to reuse.
  1. 3.4 Under the Sea
6-8.AP.16
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 8.10 Project: Animate an Emoji
6-8.AP.17
Incorporate existing code, media, and libraries into original programs and give attribution.
  1. 8.1 Getting Started
  2. 8.2 Color
  3. 8.3 Variables
  4. 8.4 The Draw Loop
  5. 8.5 Color Transitions
  6. 8.6 Shape Transformations
  7. 8.7 Direction
  8. 8.8 Mouse Data
  9. 8.9 Keyboard Data
  10. 8.10 Project: Animate an Emoji
  11. 9.7 Program Structure
  12. 9.9 Your First Sprites
6-8.AP.18
Systematically test and refine programs using a range of test cases.
  1. 1.4 Lost in Space
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 9.4 Intro to JavaScript
  5. 9.5 Variables
6-8.AP.19
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 8.10 Project: Animate an Emoji
6-8.AP.20
Document programs to make them easier to follow, test, and debug.
  1. 5.4 Multiple Functions
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
6-8.IC.21
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 7.8 Project: Public Service Announcement
6-8.IC.22
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 4.6 Ethics and Legal Considerations
  2. 7.8 Project: Public Service Announcement
6-8.IC.23
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
6-8.IC.24
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 7.4 Privacy & Security
6-8.ET.A
Explain that the field of emerging technologies will be evolving and rapidly growing.
6-8.ET.B
Compare existing and emerging technologies, ideas, and concepts.
  1. 8.1 Getting Started
6-8.ET.C
Describe how emerging technologies are influencing current events at a local and global scale.
  1. 4.7 The Future of Computing
  2. 6.3 Impact of the Internet
6-8.ET.D
Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate.
  1. 6.3 Impact of the Internet
  2. 7.1 Digital Footprint and Reputation
  3. 7.2 Cyberbullying
  4. 7.6 Creative Credit & Copyright
  5. 7.7 Hacking Ethics
  6. 7.8 Project: Public Service Announcement
6-8.ET.E
Create new or original work by applying emerging technologies.
  1. 8.10 Project: Animate an Emoji