Please enable JavaScript to use CodeHS

Standards Mapping

for Kentucky 6-8


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet.
  1. 4.13 Viewing Websites
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
Model how information is disguised using different methods of encryption to secure it during transmission from one point to another.
Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data.
  1. 9.4 Privacy & Security
Store data using multiple encoding methods.
  1. 6.3 Encoding Text with Binary
  2. 6.4 Pixel Images
Collect data using computational tools and transform the data to make it more useful and reliable.
Refine computational models based on the data they have generated.
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 13.19 Putting Together Control Structures
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
Create flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 13.10 Top Down Design
Create clearly named variables that represent different data types and perform operations on their values.
  1. 13.7 Naming Guidelines
  2. 13.11 Variables
Create procedures with parameters to organize code and make it easier to reuse.
  1. 13.13 Parameters
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.9 For Loops
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 13.19 Putting Together Control Structures
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 1.8 Super Karel
Systematically test and refine programs using a range of test cases.
  1. 13.10 Top Down Design
  2. 13.19 Putting Together Control Structures
Document programs in order to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 13.6 Comments
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 9.6 Creative Credit & Copyright
Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
Discuss issues of bias and accessibility in existing technologies.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Compare the positive & negative effects of computing technologies on society.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
Collaborate with others using appropriate tools at the local, national, and/or international levels.
  1. 10.1 Project: Public Service Announcement
Discuss the benefits and consequences of making information either public or private.
  1. 9.1 Digital Footprint and Reputation
  2. 9.6 Creative Credit & Copyright
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
Design projects that combine hardware and software components to collect and exchange data.
Identify and fix problems with computing devices and their components systematically.