Please enable JavaScript to use CodeHS

Standards Mapping

for Maryland 6-8

66

Standards in this Framework

47

Standards Mapped

71%

Mapped to Course

Standard Lessons
6.CS.D.01
Evaluate existing computing devices and make recommendations for improvements to design based on analysis of personal interactions and how others interact with the devices.
  1. 4.8 Project: Design the Computer of Tomorrow
7.CS.D.01
Evaluate existing computing devices and make recommendations for improvements to design that consider usability through a variety of lenses (accessibility, ergonomics, learnability, security).
  1. 4.8 Project: Design the Computer of Tomorrow
8.CS.D.01
Develop and implement a process to evaluate existing computing devices and make recommendations for improvements to design based on analysis of user interaction and other lenses.
  1. 4.8 Project: Design the Computer of Tomorrow
6.CS.HS.01
Identify ways that hardware and software are combined and work synchronously to collect, store, retrieve, and exchange data.
7.CS.HS.01
Select appropriate hardware and software components for a project considering what type of data will be collected, stored, retrieved, and exchanged.
  1. 8.8 Mouse Data
  2. 8.9 Keyboard Data
8.CS.HS.01
Design and refine systems where secure hardware and software are combined to collect, store, retrieve, and exchange data and explain why specific components were chosen for optimality.
  1. 4.5 Internet of Things
6.CS.T.01
Troubleshoot problems with computing devices and networked components (e.g. peripherals, routers, cables, etc.).
7.CS.T.01
Identify and fix problems with computing devices and their interfaced components using a variety of strategies (e.g. lost data retrieval, hardware password recovery, file restoration, key logging).
8.CS.T.01
Systematically identify and fix problems with computing devices and their interfaced components by using a structured system such as a troubleshooting flow diagram.
6.NI.NCO.01
Model a simple protocol for transferring information, using packets, across networks and the internet.
7.NI.NCO.01
Explain and model the process to replace lost packets using a protocol for information transfer.
8.NI.NCO.01
Model and explain how data is sent using protocols to choose the fastest pathway, to deal with missing information, and to deliver data securely.
6.NI.C.01
Identify existing cybersecurity concerns with the internet, its connected devices (i.e. IoT) and the systems it uses.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
7.NI.C.01
Explain how to protect electronic information using both physical (hard drive) and digital measures; explain existing cybersecurity concerns with the internet and the systems it uses.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
8.NI.C.01
Evaluate physical and digital security measures that have been developed and implemented to protect electronic information; discuss the impacts of hacking, ransomware, scams, fake scams, and ethical/legal concerns.
  1. 6.4 Cybersecurity
6.DA.S.01
Identify multiple encoding schemes that can be used to represent the same data.
  1. 8.2 Color
7.DA.S.01
Represent data using multiple encoding schemes.
  1. 8.2 Color
8.DA.S.01
Evaluate different schemes of encoding data in order to effectively choose the most appropriate method of representation.
6.DA.CVT.01
Collect data using computational tools and transform the data to make it more useful.
7.DA.CVT.01
Collect data using computational tools and hardware (e.g., sensors) and transform the data to make it more useful and reliable.
  1. 8.8 Mouse Data
  2. 8.9 Keyboard Data
8.DA.CVT.01
Develop and implement a refined process that uses computational tools to transform data to a more useful and reliable state.
6.DA.IM.01
Identify relevant data points and use models and simulations to formulate, refine, and test hypotheses.
7.DA.IM.01
Verify a model’s accuracy by comparing the results with observed data.
8.DA.IM.01
Refine existing or develop and implement new computational models based on observed and generated data.
6.AP.A.01
Use an existing algorithm or pseudocode to solve a problem.
  1. 1.3 The Rabbit Chase
  2. 1.4 Lost in Space
  3. 3.3 A Day at the Carnival
  4. 3.4 Under the Sea
  5. 5.1 Introduction to Karel
  6. 5.2 Karel's World
  7. 8.1 Getting Started
  8. 8.2 Color
  9. 8.3 Variables
  10. 8.4 The Draw Loop
  11. 8.5 Color Transitions
  12. 8.6 Shape Transformations
  13. 8.7 Direction
  14. 8.8 Mouse Data
  15. 8.9 Keyboard Data
  16. 8.10 Project: Animate an Emoji
  17. 9.7 Program Structure
7.AP.A.01
Select and modify existing algorithms and pseudocode to solve complex problems.
  1. 1.3 The Rabbit Chase
  2. 1.4 Lost in Space
  3. 3.3 A Day at the Carnival
  4. 3.4 Under the Sea
  5. 5.1 Introduction to Karel
  6. 5.2 Karel's World
  7. 5.3 Functions
  8. 5.4 Multiple Functions
  9. 8.1 Getting Started
  10. 8.2 Color
  11. 8.3 Variables
  12. 8.4 The Draw Loop
  13. 8.5 Color Transitions
  14. 8.6 Shape Transformations
  15. 8.7 Direction
  16. 8.8 Mouse Data
  17. 8.9 Keyboard Data
  18. 8.10 Project: Animate an Emoji
  19. 9.7 Program Structure
  20. 9.8 Understanding the Canvas
  21. 9.9 Your First Sprites
  22. 9.10 The Physics of Sprites
8.AP.A.01
Develop and implement algorithms and pseudocode to solve complex problems.
  1. 1.3 The Rabbit Chase
  2. 1.4 Lost in Space
  3. 3.3 A Day at the Carnival
  4. 3.4 Under the Sea
  5. 5.1 Introduction to Karel
  6. 5.2 Karel's World
  7. 5.3 Functions
  8. 5.4 Multiple Functions
  9. 5.5 For Loops
  10. 5.6 Conditional Statements
  11. 5.7 If/Else Statements
  12. 5.8 While Loops
  13. 5.9 Karel Challenges
  14. 8.8 Mouse Data
  15. 8.9 Keyboard Data
  16. 8.10 Project: Animate an Emoji
  17. 9.5 Variables
  18. 9.9 Your First Sprites
6.AP.V.01
Decide when and how to declare and name new variables.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
  4. 9.9 Your First Sprites
7.AP.V.01
Create clearly named variables that represent different types of data.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 8.4 The Draw Loop
  4. 8.5 Color Transitions
  5. 8.6 Shape Transformations
  6. 9.5 Variables
  7. 9.9 Your First Sprites
8.AP.V.01
Create clearly named variables of different data types that utilize naming conventions to improve program readability; perform operations on variable values.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 8.4 The Draw Loop
  4. 8.5 Color Transitions
  5. 8.6 Shape Transformations
  6. 9.5 Variables
  7. 9.9 Your First Sprites
6.AP.C.01
Develop secure programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 8.4 The Draw Loop
  4. 8.5 Color Transitions
  5. 8.6 Shape Transformations
  6. 8.7 Direction
  7. 8.8 Mouse Data
  8. 8.9 Keyboard Data
  9. 8.10 Project: Animate an Emoji
7.AP.C.01
Develop secure programs that utilize combinations of loops, compound conditionals, and the manipulation of variables representing different data types.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 8.4 The Draw Loop
  4. 8.5 Color Transitions
  5. 8.6 Shape Transformations
  6. 8.7 Direction
  7. 8.8 Mouse Data
  8. 8.9 Keyboard Data
  9. 8.10 Project: Animate an Emoji
8.AP.C.01
Develop secure programs that utilize combinations of nested loops, compound conditionals, procedures with and without parameters, and the manipulation of variables representing different data types.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
6.AP.M.01
Decompose problems and sub-problems into parts to facilitate the secure design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 9.4 Intro to JavaScript
  10. 9.5 Variables
  11. 9.7 Program Structure
6.AP.M.02
Identify and use functions within a program to repeat instructions.
  1. 2.2 A Day at the Park
  2. 3.4 Under the Sea
  3. 5.3 Functions
  4. 5.4 Multiple Functions
  5. 5.5 For Loops
  6. 5.6 Conditional Statements
  7. 5.7 If/Else Statements
  8. 5.8 While Loops
  9. 5.9 Karel Challenges
  10. 9.7 Program Structure
7.AP.M.01
Decompose problems and sub-problems into parts to facilitate the secure design, implementation, and review of increasingly complex programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 9.4 Intro to JavaScript
  10. 9.5 Variables
  11. 9.7 Program Structure
7.AP.M.02
Create and use a function in a program to repeat instructions in order to organize code and make it easier to reuse.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
8.AP.M.01
Decompose problems and sub-problems into parts to facilitate the secure design, implementation, and review of complex programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 9.4 Intro to JavaScript
  10. 9.5 Variables
  11. 9.7 Program Structure
8.AP.M.02
Create and use a function with parameters in a program to repeat instructions in order to organize code and make it easier to reuse.
  1. 3.4 Under the Sea
6.AP.PD.01
Seek and incorporate feedback from team members to refine the solution to a problem.
  1. 8.10 Project: Animate an Emoji
6.AP.PD.02
Incorporate existing code, media, and libraries into original programs from secure sources, and give appropriate attribution.
  1. 8.10 Project: Animate an Emoji
  2. 9.9 Your First Sprites
6.AP.PD.03
Test and refine existing and original programs.
  1. 1.4 Lost in Space
  2. 2.2 A Day at the Park
  3. 3.4 Under the Sea
  4. 5.2 Karel's World
  5. 5.3 Functions
  6. 5.4 Multiple Functions
  7. 5.6 Conditional Statements
  8. 5.7 If/Else Statements
  9. 5.8 While Loops
  10. 9.4 Intro to JavaScript
  11. 9.5 Variables
  12. 9.10 The Physics of Sprites
6.AP.PD.04
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 8.10 Project: Animate an Emoji
6.AP.PD.05
Document programs in order to make them easier to understand, test, and debug.
  1. 5.4 Multiple Functions
  2. 5.5 For Loops
  3. 5.6 Conditional Statements
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
  7. 8.10 Project: Animate an Emoji
7.AP.PD.01
Seek and incorporate feedback from team members and users to refine the solution to a problem.
  1. 8.10 Project: Animate an Emoji
7.AP.PD.02
Incorporate existing code, media and libraries into original programs of increasing complexity, from secure sources, and give appropriate attribution.
  1. 8.10 Project: Animate an Emoji
  2. 9.9 Your First Sprites
7.AP.PD.03
Test and refine existing and original programs using user input and secure software development guidance.
7.AP.PD.04
Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.
7.AP.PD.05
Document complex programs in order to make them easier to understand, test, and debug.
  1. 5.4 Multiple Functions
  2. 5.5 For Loops
  3. 5.6 Conditional Statements
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
8.AP.PD.01
Seek and incorporate feedback from team members and users to refine the solution to a problem that meets the needs of a diverse group of users.
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity, from secure sources, and give appropriate attribution.
  1. 8.10 Project: Animate an Emoji
  2. 9.9 Your First Sprites
8.AP.PD.03
Develop a method or implement an existing method to systematically test and refine existing and original programs using user input and secure software development guidance.
8.AP.PD.04
Evaluate communication between participants to determine best practices in collaboration when developing computational artifacts.
8.AP.PD.05
Document complex programs, using multiple methods, in order to make them easier to understand, test, and debug.
  1. 5.4 Multiple Functions
  2. 5.5 For Loops
  3. 5.6 Conditional Statements
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
6.IC.C.01
Identify tradeoffs associated with computing technologies that affect people’s everyday activities and future opportunities (e.g., college acceptances, career choices that include security clearances).
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
  3. 7.3 Internet Safety
  4. 7.4 Privacy & Security
6.IC.C.02
Identify issues of bias and accessibility that occur in the design of existing computing technologies.
  1. 4.6 Ethics and Legal Considerations
7.IC.C.01
Explain how computing impacts people’s everyday activities, career options, and diversity in innovation in computing and non-computing fields.
  1. 4.7 The Future of Computing
  2. 7.8 Project: Public Service Announcement
7.IC.C.02
Explain issues of bias and accessibility that occur in the design of existing computing technologies and describe the role and responsibility of a designer in reducing bias.
  1. 4.6 Ethics and Legal Considerations
8.IC.C.01
Compare the tradeoffs associated with computing concepts (e.g., automation, communication, privacy, cybersecurity), explaining their effects on economics and global societies.
  1. 6.4 Cybersecurity
8.IC.C.02
Analyze issues of bias and accessibility that occur in the design of everyday computing technologies, the role and responsibility of the designer, and make recommendations for how these issues could be rectified to reduce bias.
  1. 4.6 Ethics and Legal Considerations
6.IC.SI.01
Describe and use safe, appropriate, and responsible practices when participating online (e.g., discussion groups, blogs, social networking sites) to maintain a clean record for Post-secondary choices that require security clearances and background checks.
  1. 7.1 Digital Footprint and Reputation
  2. 7.3 Internet Safety
  3. 7.4 Privacy & Security
  4. 7.5 Information Literacy
7.IC.SI.01
Individually and collaboratively use advanced tools to design and create online content (e.g., digital portfolio, multimedia, blog, webpage).
8.IC.SI.01
Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources.
  1. 7.8 Project: Public Service Announcement
6.IC.SLE.01
Differentiate between appropriate and inappropriate content on the internet, and identify unethical and illegal online behavior and consequences.
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
  3. 7.3 Internet Safety
  4. 7.6 Creative Credit & Copyright
  5. 7.7 Hacking Ethics
7.IC.SLE.01
Explain the connection between the longevity of data on the internet, personal online identity, and personal privacy.
  1. 7.1 Digital Footprint and Reputation
  2. 7.4 Privacy & Security
8.IC.SLE.01
Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
  3. 7.7 Hacking Ethics