Please enable JavaScript to use CodeHS

Standards Mapping

for Louisiana 6-8

36

Standards in this Framework

22

Standards Mapped

61%

Mapped to Course

Standard Lessons
M.CS.1A
Analyze the functions and interactions of core components within a computer system.
  1. 4.2 Software
  2. 4.3 Hardware
M.CS.1B
Explain how hardware and software components work together to perform specific tasks.
  1. 4.2 Software
  2. 4.3 Hardware
M.CS.2A
Evaluate possible solutions to a hardware or software problem.
  1. 4.3 Hardware
E.NI.1A
Analyze the various structures and functions of a network.
  1. 6.1 What is the Internet?
E.NI.1B
Identify and differentiate the protocols utilized in data sharing across networks.
M.NI.2B
Analyze threats and vulnerabilities to information security for individuals and organizations.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
M.NI.2A
Explain how physical and digital security practices and measures proactively address threats to users, data, and devices within and across networks.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 6.6 Encryption
  4. 7.4 Privacy & Security
M.DA.1A
Analyze and explain the connection between data sets and graphical representations.
  1. 12.5 Visualizing Data
M.DA.1B
Evaluate the most efficient and effective ways to arrange, collect, and visually represent data to inform others.
  1. 12.8 Project: Data Storytelling
  2. 12.9 Project: Tell Your Story
M.DA.2A
Compare and contrast how data is collected using computational and non-computational tools and processes.
M.DA.2B
Analyze scenarios and computing systems to determine the appropriate data entry format for specific tasks.
M.DA.3A
Propose methods to back up data safely and the appropriate practices for data risk management.
M.DA.3B
Describe how different representations of real-world phenomena such as letters, numbers, and images are encoded as data.
M.DA.4A
Utilize tools and techniques to locate, collect, and create visualizations of large-scale data sets.
  1. 12.8 Project: Data Storytelling
  2. 12.9 Project: Tell Your Story
M.DA.4B
Collect and transform data using computational tools to make functional and reliable data for use in hypothesis testing.
  1. 12.3 Sort and Filter
  2. 12.4 Statistical Measures
M.DA.5A
Refine computational models based on data generated by the models.
M.DA.5B
Describe and evaluate the accuracy of a modeled system by comparing the generated results with observed data from the system the data represents.
M.AP.1A
Evaluate and use naming conventions for variables to accurately communicate the variables' meaning to other users and programmers.
  1. 8.3 Variables
  2. 9.5 Variables
M.AP.1B
Evaluate algorithms in terms of efficiency, correctness, and clarity.
  1. 5.9 Karel Challenges
M.AP.1C
Compare and contrast data constants and variables.
M.AP.2A
Explain the functions of various control structures. Compare and contrast examples of control structure types.
  1. 5.5 For Loops
  2. 5.6 Conditional Statements
  3. 5.7 If/Else Statements
  4. 5.8 While Loops
M.AP.2B
Design and iteratively develop programs that combine control structures into advanced control structures.
  1. 5.9 Karel Challenges
M.AP.3A
Decompose problems to facilitate program design, implementation, and review.
  1. 5.9 Karel Challenges
M.AP.3B
Create procedures with parameters to organize code and promote reusability.
M.AP.4A
Seek and incorporate feedback from peers to employ user-centered design solutions.
M.AP.4B
Use applicable industry practices to test, debug, document, and peer review code.
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.1 Introduction to Karel
  4. 5.4 Multiple Functions
M.AP.4C
Develop computational artifacts by working as a team, distributing tasks, and maintaining an iterative project timeline.
M.AP.4D
Incorporate existing resources into original programs and give the proper attributions.
  1. 8.1 Getting Started
  2. 9.6 Introducing Libraries
M.IC.1A
Identify foundational computational advancements through the use of the technology innovation cycle.
M.IC.1B
Plan and devise new ideas and solutions for problems with inspiration from previous discoveries in computational knowledge.
  1. 4.3 Hardware
M.IC.2A
Develop and propose norms for informal versus formal online communications.
M.IC.2B
Analyze communication technologies and then describe how the technology's use influences individuals and society.
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
  3. 7.5 Information Literacy
M.IC.2C
Generate designs that increase the accessibility and usability of technology for various groups of users.
  1. 4.3 Hardware
  2. 4.8 Project: Design the Computer of Tomorrow
M.IC.3A
Identify applicable laws that impact personal, industry, or business computing practices.
M.IC.3B
Recommend and propose computing-use guidelines to maintain a user’s personal safety, privacy, and well-being.
  1. 7.3 Internet Safety
  2. 7.4 Privacy & Security
  3. 7.8 Project: Public Service Announcement
M.IC.3C
Describe and categorize factors that affect user's access to computing resources locally, nationally, and globally.
  1. 6.3 Impact of the Internet