Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana CS 6-8

20

Standards in this Framework

10

Standards Mapped

50%

Mapped to Course

Standard Lessons
6-8.DI.1
Decompose (i.e., break down) problems into smaller, more manageable subsets by applying the algorithmic problem solving steps to make the possible solutions easier to follow, test, and debug.
  1. 2.2 A Day at the Park
6-8.DI.2
Collect data using computational tools (e.g. sensors, inputs like microphones) and transform the data to make it more useful and reliable.
6-8.DI.3
Describe that data can be represented in multiple encoding schemes such as binary, RGB values (e.g., red, green, and blue intensity), and hexadecimal codes.
6-8.DI.4
Create visuals such as flowcharts, diagrams, and pseudocode to represent complex problems as algorithms.
6-8.CD.1
Design projects that combine hardware and software components to collect and exchange data.
  1. 3.5 Internet of Things
6-8.CD.2
Systematically identify and fix problems (i.e. troubleshoot) with computing devices and their components (e.g. checklist, decision tree, flowchart).
  1. 3.3 Hardware
6-8.CD.3
Recommend improvements to the design of computing devices, based on analysis of how users interact with the devices.
  1. 3.8 Project: Design the Computer of Tomorrow
6-8.CD.4
Describe what distinguishes humans from machines focusing on ways we can communicate, as well as ways in which computers use models of intelligent behavior (e.g., robot motion, speech and language understanding, and computer vision).
  1. 3.7 The Future of Computing
6-8.PA.1
Design and iteratively develop programs that combine the following: sequencing, looping (including nested loops), conditionals (including compound conditionals), expressions, variables, functions, and parameters.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
6-8.PA.2
Systematically test and refine programs using a range of test cases.
6-8.PA.3
Incorporate existing code, media, and libraries into original programs and give attribution.
6-8.PA.4
Document programs in order to make them easier to follow, test, and debug.
6-8.NI.1
Explain how physical and cybersecurity measures protect electronic information.
6-8.NI.2
Model the role of protocols in transmitting data across networks and the internet.
6-8.NI.3
Apply multiple methods of encryption to model the secure transmission of information.
6-8.IC.1
Exhibit legal and ethical behaviors when using technology and information and discuss the consequences of misuse.
  1. 3.6 Ethics and Legal Considerations
6-8.IC.2
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 3.6 Ethics and Legal Considerations
6-8.IC.3
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
6-8.IC.4
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 3.5 Internet of Things
6-8.IC.5
Discuss how unequal distribution and participation in technology and computer science disadvantages marginalized populations.
  1. 3.6 Ethics and Legal Considerations