Please enable JavaScript to use CodeHS

Standards Mapping

for Kentucky 6-8

25

Standards in this Framework

15

Standards Mapped

60%

Mapped to Course

Standard Lessons
M-NI-01
Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet.
M-NI-02
Model how information is disguised using different methods of encryption to secure it during transmission from one point to another.
  1. 6.6 Encryption
  2. 6.7 Project: Steganography
M-NI-03
Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 7.4 Privacy & Security
M-DA-01
Store data using multiple encoding methods.
M-DA-02
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. 12.8 Project: Data Storytelling
M-DA-03
Refine computational models based on the data they have generated.
M-AP-01
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
M-AP-02
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 5.4 Multiple Functions
M-AP-03
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
M-AP-04
Create flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 5.7 If/Else Statements
  2. 5.9 Karel Challenges
M-AP-05
Create clearly named variables that represent different data types and perform operations on their values.
  1. 8.3 Variables
  2. 9.5 Variables
M-AP-06
Create procedures with parameters to organize code and make it easier to reuse.
M-AP-07
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 5.9 Karel Challenges
M-AP-08
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 9.6 Introducing Libraries
M-AP-09
Systematically test and refine programs using a range of test cases.
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.9 Karel Challenges
M-AP-10
Document programs in order to make them easier to follow, test, and debug.
  1. 5.4 Multiple Functions
M-AP-11
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
M-AP-12
Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
M-IC-01
Discuss issues of bias and accessibility in existing technologies.
  1. 4.6 Ethics and Legal Considerations
M-IC-02
Compare the positive & negative effects of computing technologies on society.
  1. 4.6 Ethics and Legal Considerations
  2. 6.3 Impact of the Internet
M-IC-03
Collaborate with others using appropriate tools at the local, national, and/or international levels.
M-IC-04
Discuss the benefits and consequences of making information either public or private.
  1. 7.1 Digital Footprint and Reputation
  2. 7.4 Privacy & Security
M-CS-01
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
  1. 4.3 Hardware
  2. 4.8 Project: Design the Computer of Tomorrow
M-CS-02
Design projects that combine hardware and software components to collect and exchange data.
M-CS-03
Identify and fix problems with computing devices and their components systematically.
  1. 4.3 Hardware