Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana CS 6-8

20

Standards in this Framework

9

Standards Mapped

45%

Mapped to Course

Standard Lessons
6-8.DI.1
Decompose (i.e., break down) problems into smaller, more manageable subsets by applying the algorithmic problem solving steps to make the possible solutions easier to follow, test, and debug.
6-8.DI.2
Collect data using computational tools (e.g. sensors, inputs like microphones) and transform the data to make it more useful and reliable.
6-8.DI.3
Describe that data can be represented in multiple encoding schemes such as binary, RGB values (e.g., red, green, and blue intensity), and hexadecimal codes.
  1. 2.7 Project: Steganography
6-8.DI.4
Create visuals such as flowcharts, diagrams, and pseudocode to represent complex problems as algorithms.
6-8.CD.1
Design projects that combine hardware and software components to collect and exchange data.
6-8.CD.2
Systematically identify and fix problems (i.e. troubleshoot) with computing devices and their components (e.g. checklist, decision tree, flowchart).
6-8.CD.3
Recommend improvements to the design of computing devices, based on analysis of how users interact with the devices.
6-8.CD.4
Describe what distinguishes humans from machines focusing on ways we can communicate, as well as ways in which computers use models of intelligent behavior (e.g., robot motion, speech and language understanding, and computer vision).
6-8.PA.1
Design and iteratively develop programs that combine the following: sequencing, looping (including nested loops), conditionals (including compound conditionals), expressions, variables, functions, and parameters.
  1. 1.3 A Day at the Carnival
  2. 1.4 Under the Sea
  3. 1.5 Tracy Adventures 1: Evaluation
6-8.PA.2
Systematically test and refine programs using a range of test cases.
  1. 1.2 Debugging with Error Messages
6-8.PA.3
Incorporate existing code, media, and libraries into original programs and give attribution.
6-8.PA.4
Document programs in order to make them easier to follow, test, and debug.
6-8.NI.1
Explain how physical and cybersecurity measures protect electronic information.
  1. 2.4 Cybersecurity
  2. 2.5 The CIA Triad
  3. 2.6 Encryption
6-8.NI.2
Model the role of protocols in transmitting data across networks and the internet.
  1. 2.1 What is the Internet?
  2. 2.2 The Need for Protocols
6-8.NI.3
Apply multiple methods of encryption to model the secure transmission of information.
  1. 2.6 Encryption
  2. 2.7 Project: Steganography
6-8.IC.1
Exhibit legal and ethical behaviors when using technology and information and discuss the consequences of misuse.
6-8.IC.2
Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.3
Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 2.3 Impact of the Internet
6-8.IC.4
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 2.4 Cybersecurity
  2. 2.5 The CIA Triad
6-8.IC.5
Discuss how unequal distribution and participation in technology and computer science disadvantages marginalized populations.
  1. 2.3 Impact of the Internet