Please enable JavaScript to use CodeHS

Standards Mapping

for Kentucky 6-8

25

Standards in this Framework

17

Standards Mapped

68%

Mapped to Course

Standard Lessons
M-NI-01
Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet.
  1. 4.13 Viewing Websites
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
M-NI-02
Model how information is disguised using different methods of encryption to secure it during transmission from one point to another.
M-NI-03
Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data.
  1. 9.4 Privacy & Security
  2. 15.4 The CIA Triad
M-DA-01
Store data using multiple encoding methods.
  1. 6.3 Encoding Text with Binary
  2. 6.4 Pixel Images
M-DA-02
Collect data using computational tools and transform the data to make it more useful and reliable.
M-DA-03
Refine computational models based on the data they have generated.
M-AP-01
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 13.19 Putting Together Control Structures
M-AP-02
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
M-AP-03
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
M-AP-04
Create flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 13.10 Top Down Design
M-AP-05
Create clearly named variables that represent different data types and perform operations on their values.
  1. 13.7 Naming Guidelines
  2. 13.11 Variables
M-AP-06
Create procedures with parameters to organize code and make it easier to reuse.
  1. 13.13 Parameters
M-AP-07
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 13.19 Putting Together Control Structures
M-AP-08
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 1.8 Super Karel
M-AP-09
Systematically test and refine programs using a range of test cases.
  1. 13.10 Top Down Design
  2. 13.19 Putting Together Control Structures
M-AP-10
Document programs in order to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
M-AP-11
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 9.6 Creative Credit & Copyright
M-AP-12
Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
M-IC-01
Discuss issues of bias and accessibility in existing technologies.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
M-IC-02
Compare the positive & negative effects of computing technologies on society.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
M-IC-03
Collaborate with others using appropriate tools at the local, national, and/or international levels.
  1. 10.1 Project: Public Service Announcement
M-IC-04
Discuss the benefits and consequences of making information either public or private.
  1. 9.1 Digital Footprint and Reputation
  2. 9.6 Creative Credit & Copyright
M-CS-01
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
M-CS-02
Design projects that combine hardware and software components to collect and exchange data.
M-CS-03
Identify and fix problems with computing devices and their components systematically.