Please enable JavaScript to use CodeHS

Standards Mapping

for Kentucky 6-8

25

Standards in this Framework

25

Standards Mapped

100%

Mapped to Course

Standard Lessons
M-NI-01
Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet.
  1. 6.9 Viewing Websites
  2. 9.3 Internet Addresses
  3. 9.4 DNS
  4. 9.5 Routing
  5. 9.6 Packets and Protocols
M-NI-02
Model how information is disguised using different methods of encryption to secure it during transmission from one point to another.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.3 Basic Crypto Systems: Caesar Cipher
M-NI-03
Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data.
  1. 4.4 Privacy & Security
  2. 13.4 The CIA Triad
M-DA-01
Store data using multiple encoding methods.
  1. 8.3 Encoding Text with Binary
  2. 8.4 Pixel Images
M-DA-02
Collect data using computational tools and transform the data to make it more useful and reliable.
  1. 15.2 Explore a New Sensor
M-DA-03
Refine computational models based on the data they have generated.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
M-AP-01
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 1.19 Putting Together Control Structures
  2. 15.1 micro:bit Challenges
  3. 15.4 Final Project
M-AP-02
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.10 Top Down Design
  2. 3.3 Comments & Pseudocode
  3. 11.6 Top Down Design and Decomposition in Karel
M-AP-03
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 7.6 Test
  2. 15.4 Final Project
M-AP-04
Create flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 1.10 Top Down Design
  2. 3.3 Comments & Pseudocode
  3. 11.6 Top Down Design and Decomposition in Karel
  4. 11.7 Commenting Your Code
  5. 15.1 micro:bit Challenges
M-AP-05
Create clearly named variables that represent different data types and perform operations on their values.
  1. 1.7 Naming Guidelines
  2. 1.11 Variables
  3. 3.4 Variables
  4. 14.3 Operators
M-AP-06
Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.13 Parameters
  2. 14.5 Functions
M-AP-07
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.19 Putting Together Control Structures
  2. 11.9 For Loops
  3. 11.11 If/Else Statements
  4. 11.12 While Loops in Karel
  5. 11.13 Control Structures Example
  6. 14.1 For Loops
  7. 14.2 While Loops
  8. 14.3 Operators
  9. 14.4 If/Else Statements
  10. 15.1 micro:bit Challenges
M-AP-08
Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 11.8 Super Karel
M-AP-09
Systematically test and refine programs using a range of test cases.
  1. 1.10 Top Down Design
  2. 1.19 Putting Together Control Structures
  3. 14.2 While Loops
  4. 14.4 If/Else Statements
  5. 15.1 micro:bit Challenges
M-AP-10
Document programs in order to make them easier to follow, test, and debug.
  1. 1.6 Comments
  2. 3.3 Comments & Pseudocode
  3. 11.7 Commenting Your Code
M-AP-11
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 6.6 Copyright
M-AP-12
Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
  1. 7.1 Intro to Design Thinking
  2. 7.5 Prototype
  3. 7.6 Test
  4. 7.7 Build Your Website!
M-IC-01
Discuss issues of bias and accessibility in existing technologies.
  1. 2.5 Future of Computing
  2. 9.7 The Impact of the Internet
M-IC-02
Compare the positive & negative effects of computing technologies on society.
  1. 2.5 Future of Computing
  2. 9.7 The Impact of the Internet
  3. 15.4 Final Project
M-IC-03
Collaborate with others using appropriate tools at the local, national, and/or international levels.
  1. 4.5 Project: Public Service Announcement
M-IC-04
Discuss the benefits and consequences of making information either public or private.
  1. 4.1 Digital Footprint and Reputation
  2. 6.6 Copyright
M-CS-01
Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
  1. 7.5 Prototype
  2. 7.6 Test
M-CS-02
Design projects that combine hardware and software components to collect and exchange data.
  1. 15.2 Explore a New Sensor
M-CS-03
Identify and fix problems with computing devices and their components systematically.
  1. 2.6 Troubleshooting