Please enable JavaScript to use CodeHS

Massachusetts 6-8 Standards Mapping

to

Foundations of Computer Science

Clear
67 Standards in this Framework 29 Standards Mapped 43% Mapped to Course


Standard Lessons
6-8.CAS.a1 Identify threats and actively protect devices and networks from viruses, intrusion, vandalism, and other malicious activities.
  1. 1.6 Privacy & Security
6-8.CAS.a2 Describe how cyberbullying can be prevented and managed.
  1. 1.4 Cyberbullying
6-8.CAS.a3 Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.
  1. 1.6 Privacy & Security
6-8.CAS.a4 Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
  1. 1.3 Digital Footprint and Reputation
6-8.CAS.a5 Differentiate between appropriate and inappropriate content on the Internet.
  1. 1.7 Information Literacy
6-8.CAS.b1 Explain how copyright law and licensing protect the owner of intellectual property.
  1. 1.10 Creative Credit & Copyright
6-8.CAS.b2 Explain possible consequences of violating intellectual property law and plagiarism.
  1. 1.10 Creative Credit & Copyright
6-8.CAS.b3 Apply fair use for using copyrighted materials (e.g., images, music, video, text).
  1. 1.10 Creative Credit & Copyright
6-8.CAS.b4 Identify the legal consequences of sending or receiving inappropriate content (e.g., cyberbullying, harassment, sexting).
  1. 1.4 Cyberbullying
6-8.CAS.b5 Differentiate among open source and proprietary software licenses and their applicability to different types of software and media.
  1. 1.10 Creative Credit & Copyright
6-8.CAS.b6 Demonstrate compliance with the school’s Acceptable Use Policy (AUP).
  1. 1.10 Creative Credit & Copyright
6-8.CAS.b7 Identify software license agreements and application permissions.
  1. 1.10 Creative Credit & Copyright
6-8.CAS.b8 Explain positive and malicious purposes of hacking.
  1. 1.11 Hacking Ethics
6-8.CAS.b9 License original content and extend license for sharing in the public domain (e.g., creative commons).
6-8.CAS.c1 Describe current events and emerging technologies in computing and the effects they may have on education, the workplace, individuals, communities, and global society.
6-8.CAS.c2 Identify and discuss the technology proficiencies needed in the classroom and the workplace, and how to meet the needs.
6-8.CAS.c3 Relate the distribution of computing resources in a global society to issues of equity, access, and power.
6-8.CAS.c4 Evaluate how media and technology can be used to distort, exaggerate, and misrepresent information.
6-8.CAS.c5 Evaluate the bias of digital information sources, including websites.
6-8.DTC.a1 Identify and explain the strengths, weaknesses, and capabilities of a variety of digital tools.
6-8.DTC.a2 Identify the kinds of content associated with different file types and why different file types exist (e.g., formats for word processing, images, music, three-dimensional drawings.).
6-8.DTC.a3 Integrate information from multiple file formats into a single artifact.
6-8.DTC.a4 Individually and collaboratively, use advanced tools to design and create online content (e.g., digital portfolio, multimedia, blog, webpage).
  1. 1.12 Project: Public Service Announcement
6-8.DTC.a5 Individually and collaboratively, develop and conduct an online survey.
6-8.DTC.b1 Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources.
  1. 1.12 Project: Public Service Announcement
6-8.DTC.b2 Collaborate synchronously and asynchronously through online digital tools.
6-8.DTC.b3 Demonstrate ability to communicate appropriately through various online tools (e.g., e-mail, social media, texting, blog comments).
6-8.DTC.c1 Perform advanced searches to locate information using a variety of digital sources (e.g., Boolean Operators, limiters like reading level, subject, media type).
  1. 1.7 Information Literacy
  2. 7.1 Booleans
  3. 7.2 Logical Operators
  4. 7.3 Comparison Operators
6-8.DTC.c2 Evaluate quality of digital sources for reliability, including currency, relevancy, authority, accuracy, and purpose of digital information.
  1. 1.7 Information Literacy
6-8.DTC.c3 Gather, organize, and analyze information from digital sources by quoting, paraphrasing, and/or summarizing.
6-8.DTC.c4 Create an artifact, individually and collaboratively, that answers a research question and communicates results and conclusions.
6-8.DTC.c5 Use digital citation tools to cite sources using a school- or district-adopted format [e.g., Modern Language Association (MLA)], including proper citation for all text and non-text sources (e.g., images, audio, video).
  1. 1.10 Creative Credit & Copyright
6-8.CS.a1 Describe the main functions of an operating system.
6-8.CS.a2 Recognize that there is a wide range of application software.
6-8.CS.a3 Identify and describe the function of the main internal parts of a basic computing device [e.g., motherboard, hard drive, Central Processing Unit (CPU)].
6-8.CS.a4 Identify and describe the use of sensors, actuators, and control systems in an embodied system (e.g., a robot, an e-textile, installation art, smart room).
6-8.CS.a5 Individually and collaboratively design and demonstrate the use of a device (e.g., robot, etextile) to accomplish a task.
6-8.CS.a6 Use a variety of computing devices [e.g., probes, sensors, handheld devices, Global Positioning System (GPS)] to individually and collaboratively collect, analyze, and present information for content-related problems.
6-8.CS.a7 Identify steps involved in diagnosing and solving routine hardware and software problems (e.g., power, connections, application window or toolbar, cables, ports, network resources, video, sound) that occur during everyday computer use.
6-8.CS.b1 Explain why some problems can be solved more easily by computers or humans based on a general understanding of types of tasks at which each excels.
6-8.CS.b2 Describe how humans and machines interact to solve problems that cannot be solved by either alone (e.g., “big data” experiments that involve drawing conclusions by analyzing vast amounts of data).
6-8.CS.c1 Explain the difference between physical (wired), local and wide area, wireless, and mobile networks.
6-8.CS.c2 Model the components of a network, including devices, routers, switches, cables, wires, and transponders.
6-8.CS.c3 Describe how information, both text and non-text, is translated and communicated between digital devices over a computer network.
6-8.CS.d1 Identify capabilities of devices that are enabled through services (e.g., a wearable device that stores fitness data in the cloud, a mobile device that uses location services for navigation).
6-8.CT.a1 Describe how data is abstracted by listing attributes of everyday items to represent, order and compare those items (e.g., street address as an abstraction for locations; car make, model, and license plate number as an abstraction for cars).
6-8.CT.a2 Define a simple function that represents a more complex task/problem and can be reused to solve similar tasks/problems.
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
  3. 9.3 Functions and Parameters 3
  4. 9.4 Functions and Return Values 1
  5. 9.5 Functions and Return Values 2
6-8.CT.a3 Use decomposition to define and apply a hierarchical classification scheme to a complex system, such as the human body, animal classification, or in computing.
  1. 2.6 Top Down Design and Decomposition in Karel
6-8.CT.b1 Design solutions that use repetition and conditionals.
  1. 7.1 Booleans
  2. 7.5 For Loops in JavaScript
  3. 7.9 While Loops
  4. 7.10 Loop and a Half
6-8.CT.b2 Use logical reasoning to predict outputs given varying inputs.
  1. 5.3 User Input
  2. 7.2 Logical Operators
  3. 7.10 Loop and a Half
6-8.CT.b3 Individually and collaboratively, decompose a problem and create a sub-solution for each of its parts (e.g., video game, robot obstacle course, making dinner).
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 3.1 Collaborative Programming
6-8.CT.b4 Recognize that more than one algorithm can solve a given problem.
  1. 2.15 More Karel Examples and Testing
  2. 3.2 Challenge Problems
6-8.CT.b5 Recognize that boundaries need to be taken into account for an algorithm to produce correct results.
6-8.CT.c1 Demonstrate that numbers can be represented in different base systems (e.g., binary, octal, and hexadecimal) and text can be represented in different ways [e.g., American Standard Code for Information Interchange (ASCII)].
6-8.CT.c2 Describe how computers store, manipulate, and transfer data types and files (e.g., integers, real numbers, Boolean Operators) in a binary system.
6-8.CT.c3 Create, modify, and use a database (e.g., define field formats, add new records, manipulate data), individually and collaboratively, to analyze data and propose solutions for a task/problem.
6-8.CT.c4 Perform a variety of operations such as sorting, filtering, and searching in a database to organize and display information in a variety of ways such as number formats (scientific notation and percentages), charts, tables, and graphs.
6-8.CT.c5 Select and use data-collection technology (e.g., probes, handheld devices, geographic mapping systems) to individually and collaboratively gather, view, organize, analyze, and report results for content-related problems.
6-8.CT.d1 Individually and collaboratively compare algorithms to solve a problem, based on a given criteria (e.g., time, resource, accessibility).
6-8.CT.d2 Use functions to hide the detail in a program.
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
  3. 9.3 Functions and Parameters 3
  4. 9.4 Functions and Return Values 1
  5. 9.5 Functions and Return Values 2
6-8.CT.d3 Create a program, individually and collaboratively, that implements an algorithm to achieve a given goal.
  1. 3.1 Collaborative Programming
6-8.CT.d4 Implement problem solutions using a programming language, including all of the following: looping behavior, conditional statements, expressions, variables, and functions.
  1. 5.2 Variables
  2. 7.1 Booleans
  3. 7.5 For Loops in JavaScript
  4. 9.1 Functions and Parameters 1
  5. 9.2 Functions and Parameters 2
  6. 9.5 Functions and Return Values 2
6-8.CT.d5 Trace programs step-by-step in order to predict their behavior.
  1. 2.15 More Karel Examples and Testing
6-8.CT.d6 Use an iterative approach in development and debugging to understand the dimensions of a problem clearly.
  1. 2.6 Top Down Design and Decomposition in Karel
6-8.CT.e1 Create a model of a real-world system and explain why some details, features and behaviors were required in the model and why some could be ignored.
6-8.CT.e2 Use and modify simulations to analyze and illustrate a concept in depth (e.g., light rays/mechanical waves interaction with materials, genetic variation).
6-8.CT.e3 Select and use computer simulations, individually and collaboratively, to gather, view, analyze, and report results for content-related problems (e.g., migration, trade, cellular function).