Please enable JavaScript to use CodeHS

Kansas 6-8 Standards Framework

26 Standards in this Framework


Standard Description
8.CS.D.01 Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device. (CSTA Practice - P3)
8.CS.HS.01 Model a computing system involving multiple considerations and potential tradeoffs of software and hardware, such as functionality, cost, size, speed, accessibility, and aesthetics (CSTA Practice - P5)
8.CS.IO.01 Know and apply grade-level appropriate skills with input and output devices. (CSTA Practice - P7)
8.CS.T.01 Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.(CSTA Practice - P6)
8.NI.NCO.01 Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.(CSTA Practice - P4)
8.NI.C.01 Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7)
8.NI.C.02 Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.(CSTA Practice - P4)
8.DA.S.01 Analyze multiple methods of representing data and choose the most appropriate method for representing data.(CSTA Practice - P4)
8.DA.C.01 Develop, implement, and refine a process that utilizes computational tools to collect meaningful data. (CSTA Practice - P6)
8.DA.VT.01 Develop, implement, and refine a process to make data more useful and reliable.(CSTA Practice - P6)
8.DA.IM.01 Refine computational models based on the data generated by the models.(CSTA Practice - P5, P4)
8.AP.A.01 Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems. (CSTA Practice - P4)
8.AP.V.01 Create programs using variables with purposeful and thoughtful naming conventions for identifiers to improve program readability. (CSTA Practice - P5)
8.AP.C.01 Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.(CSTA Practice - P5)
8.AP.M.01 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.(CSTA Practice - P3)
8.AP.PD.01 Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.(CSTA Practice - P2, P1)
8.AP.PD.02 Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution. (CSTA Practice - P4, P5, P7)
8.AP.PD.03 Systematically test and refine programs using a range of student created inputs.(CSTA Practice - P6)
8.AP.PD.04 Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.(CSTA Practice - P2)
8.AP.PD.05 Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.(CSTA Practice - P7)
8.IC.C.01 Describe the trade-offs associated with computing technologies (e.g. automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.(CSTA Practice - P7)
8.IC.C.02 Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability (CSTA Practice - P1)
8.IC.SI.01 Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).(CSTA Practice - P2, P5)
8.IC.H.01 Identify and describe how the prominent figures in computer science have impacted and/or progressed the field. (CSTA Practice - P3)
8.IC.SLE.01 Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.(CSTA Practice - P7)
8.IC.CP.01 Formulate a computer-science based solution for a problem or issue by gathering input from local / regional industry members (CSTA Practice - P2, P5)