Please enable JavaScript to use CodeHS

Standards Mapping

for Kansas 6-8


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device. (CSTA Practice - P3)
Model a computing system involving multiple considerations and potential tradeoffs of software and hardware, such as functionality, cost, size, speed, accessibility, and aesthetics (CSTA Practice - P5)
Know and apply grade-level appropriate skills with input and output devices. (CSTA Practice - P7)
  1. 2.2 Computer Organization
  2. 2.4 Hardware
Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.(CSTA Practice - P6)
Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.(CSTA Practice - P4)
  1. 7.6 Packets and Protocols
Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7)
  1. 9.4 Privacy & Security
  2. 15.3 Impact of Cybersecurity
Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.(CSTA Practice - P4)
Analyze multiple methods of representing data and choose the most appropriate method for representing data.(CSTA Practice - P4)
Develop, implement, and refine a process that utilizes computational tools to collect meaningful data. (CSTA Practice - P6)
Develop, implement, and refine a process to make data more useful and reliable.(CSTA Practice - P6)
Refine computational models based on the data generated by the models.(CSTA Practice - P5, P4)
Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems. (CSTA Practice - P4)
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 13.6 Comments
  6. 13.10 Top Down Design
Create programs using variables with purposeful and thoughtful naming conventions for identifiers to improve program readability. (CSTA Practice - P5)
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 13.7 Naming Guidelines
  6. 13.11 Variables
Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.(CSTA Practice - P5)
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 13.8 Functions
  6. 13.11 Variables
  7. 13.16 If Statements
  8. 13.17 If/ Else Statements
  9. 13.18 While Loops
  10. 13.19 Putting Together Control Structures
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.(CSTA Practice - P3)
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 1.13 Control Structures Example
  4. 1.16 Karel Challenges
  5. 13.10 Top Down Design
Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.(CSTA Practice - P2, P1)
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution. (CSTA Practice - P4, P5, P7)
  1. 1.8 Super Karel
Systematically test and refine programs using a range of student created inputs.(CSTA Practice - P6)
  1. 13.19 Putting Together Control Structures
Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.(CSTA Practice - P2)
Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.(CSTA Practice - P7)
  1. 13.6 Comments
Describe the trade-offs associated with computing technologies (e.g. automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.(CSTA Practice - P7)
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability (CSTA Practice - P1)
Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).(CSTA Practice - P2, P5)
  1. 9.3 Internet Safety
  2. 10.1 Project: Public Service Announcement
Identify and describe how the prominent figures in computer science have impacted and/or progressed the field. (CSTA Practice - P3)
  1. 2.1 History of Computers
Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.(CSTA Practice - P7)
Formulate a computer-science based solution for a problem or issue by gathering input from local / regional industry members (CSTA Practice - P2, P5)