Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana CS 6-8

20

Standards in this Framework

20

Standards Mapped

100%

Mapped to Course

Standard Lessons
6-8.DI.1
Decompose (i.e., break down) problems into smaller, more manageable subsets by applying the algorithmic problem solving steps to make the possible solutions easier to follow, test, and debug.
  1. 2.2 A Day at the Park
  2. 5.1 Introduction to Karel
  3. 5.2 Karel's World
6-8.DI.2
Collect data using computational tools (e.g. sensors, inputs like microphones) and transform the data to make it more useful and reliable.
  1. 8.8 Mouse Data
  2. 8.9 Keyboard Data
6-8.DI.3
Describe that data can be represented in multiple encoding schemes such as binary, RGB values (e.g., red, green, and blue intensity), and hexadecimal codes.
  1. 6.7 Project: Steganography
  2. 8.2 Color
6-8.DI.4
Create visuals such as flowcharts, diagrams, and pseudocode to represent complex problems as algorithms.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 8.1 Getting Started
  5. 8.2 Color
  6. 8.3 Variables
  7. 8.4 The Draw Loop
  8. 8.5 Color Transitions
  9. 8.6 Shape Transformations
  10. 8.7 Direction
  11. 8.8 Mouse Data
  12. 8.9 Keyboard Data
  13. 8.10 Project: Animate an Emoji
6-8.CD.1
Design projects that combine hardware and software components to collect and exchange data.
  1. 4.5 Internet of Things
  2. 8.8 Mouse Data
  3. 8.9 Keyboard Data
6-8.CD.2
Systematically identify and fix problems (i.e. troubleshoot) with computing devices and their components (e.g. checklist, decision tree, flowchart).
  1. 4.3 Hardware
  2. 5.2 Karel's World
  3. 5.3 Functions
  4. 5.4 Multiple Functions
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
6-8.CD.3
Recommend improvements to the design of computing devices, based on analysis of how users interact with the devices.
  1. 4.8 Project: Design the Computer of Tomorrow
6-8.CD.4
Describe what distinguishes humans from machines focusing on ways we can communicate, as well as ways in which computers use models of intelligent behavior (e.g., robot motion, speech and language understanding, and computer vision).
  1. 4.7 The Future of Computing
6-8.PA.1
Design and iteratively develop programs that combine the following: sequencing, looping (including nested loops), conditionals (including compound conditionals), expressions, variables, functions, and parameters.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 3.3 A Day at the Carnival
  5. 3.4 Under the Sea
  6. 3.5 Tracy Adventures 1: Evaluation
  7. 5.3 Functions
  8. 5.4 Multiple Functions
  9. 5.5 For Loops
  10. 5.6 Conditional Statements
  11. 5.7 If/Else Statements
  12. 5.8 While Loops
  13. 8.5 Color Transitions
  14. 8.6 Shape Transformations
  15. 8.7 Direction
  16. 8.8 Mouse Data
  17. 8.9 Keyboard Data
  18. 8.10 Project: Animate an Emoji
6-8.PA.2
Systematically test and refine programs using a range of test cases.
  1. 3.2 Debugging with Error Messages
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 9.4 Intro to JavaScript
  5. 9.5 Variables
6-8.PA.3
Incorporate existing code, media, and libraries into original programs and give attribution.
  1. 9.9 Your First Sprites
  2. 9.10 The Physics of Sprites
6-8.PA.4
Document programs in order to make them easier to follow, test, and debug.
  1. 5.4 Multiple Functions
6-8.NI.1
Explain how physical and cybersecurity measures protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 6.6 Encryption
  4. 7.3 Internet Safety
  5. 7.4 Privacy & Security
6-8.NI.2
Model the role of protocols in transmitting data across networks and the internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
6-8.NI.3
Apply multiple methods of encryption to model the secure transmission of information.
  1. 6.6 Encryption
  2. 6.7 Project: Steganography
6-8.IC.1
Exhibit legal and ethical behaviors when using technology and information and discuss the consequences of misuse.
  1. 4.6 Ethics and Legal Considerations
  2. 7.2 Cyberbullying
  3. 7.7 Hacking Ethics
6-8.IC.2
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 4.6 Ethics and Legal Considerations
6-8.IC.3
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 6.3 Impact of the Internet
6-8.IC.4
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 4.5 Internet of Things
  2. 6.4 Cybersecurity
  3. 6.5 The CIA Triad
  4. 7.1 Digital Footprint and Reputation
  5. 7.3 Internet Safety
6-8.IC.5
Discuss how unequal distribution and participation in technology and computer science disadvantages marginalized populations.
  1. 4.6 Ethics and Legal Considerations
  2. 6.3 Impact of the Internet
  3. 7.8 Project: Public Service Announcement