Please enable JavaScript to use CodeHS

North Dakota 6-8 Standards Mapping

to

Foundations of Computer Science

Clear
66 Standards in this Framework 46 Standards Mapped 69% Mapped to Course


Standard Lessons
6.NI.1 Explain how data is sent across networks.
7.NI.1 Model how data is sent from one computer to another across networks.
8.NI.1 Investigate how data is sent from one computer to another across networks.
6.HS.1 Use hardware and/or software to complete a task.
  1. 2.1 Introduction to Programming With Karel
  2. 2.2 More Basic Karel
  3. 3.2 Challenge Problems
7.HS.1 Compare and contrast hardware and/or software options to complete a task.
8.HS.1 Choose appropriate device/hardware/software to complete a task.
6.HS.2 Use software features to accomplish a goal.
6.HS.3 Organize, store, and retrieve digital information with guidance.
  1. 5.2 Variables
  2. 5.3 User Input
7.HS.3 Organize, store, and retrieve digital information with minimal guidance.
  1. 5.2 Variables
  2. 5.3 User Input
  3. 9.11 Intro to Lists/Arrays
  4. 9.14 Iterating Over an Array
  5. 17.1 Intro to Objects/Maps
  6. 17.4 When Do I Use an Object?
  7. 17.5 Intro to Sets
  8. 17.6 Intro to Grids
8.HS.3 Organize, store, and retrieve digital information efficiently.
  1. 5.2 Variables
  2. 5.3 User Input
  3. 9.11 Intro to Lists/Arrays
  4. 9.14 Iterating Over an Array
  5. 17.1 Intro to Objects/Maps
  6. 17.5 Intro to Sets
  7. 17.6 Intro to Grids
6.HS.4 Identify threats to technology systems.
  1. 1.6 Privacy & Security
7.HS.4 Describe threats to technology systems.
  1. 1.6 Privacy & Security
8.HS.4 Describe ways to protect against threats to technology systems.
  1. 1.6 Privacy & Security
6.HS.5 Identify security measures to protect technology systems.
7.HS.5 Explain how security measures protect technology systems.
8.HS.5 Compare and contrast security measures used to protect technology systems.
6.T.1 Apply basic troubleshooting strategies.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 2.15 More Karel Examples and Testing
6.PSA.1 Identify and test an algorithm to solve a problem.
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
  3. 9.3 Functions and Parameters 3
  4. 9.4 Functions and Return Values 1
  5. 9.5 Functions and Return Values 2
7.PSA.1 Modify and test an algorithm to solve a problem.
  1. 9.1 Functions and Parameters 1
  2. 9.2 Functions and Parameters 2
  3. 9.3 Functions and Parameters 3
  4. 9.4 Functions and Return Values 1
  5. 9.5 Functions and Return Values 2
8.PSA.1 Create and test an algorithm to solve a problem across disciplines.
  1. 9.5 Functions and Return Values 2
6.PSA.2 Debug a program that includes sequencing, loops, or conditionals.
  1. 7.9 While Loops
  2. 7.10 Loop and a Half
6.PSA.3 Compare and contrast the efficiencies of multiple solutions to a task.
6.DCA.1 Collect and analyze data to support a claim.
7.DCA.1 Represent data, in more than one way, to defend your claim.
8.DCA.1 Represent data from multiple sources in order to defend or refute a claim.
6.DD.1 Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 7.3 Comparison Operators
  2. 7.5 For Loops in JavaScript
  3. 7.6 General For Loops
  4. 7.7 For Loop Practice
  5. 7.9 While Loops
7.DD.1 Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 7.3 Comparison Operators
  2. 7.5 For Loops in JavaScript
  3. 7.7 For Loop Practice
  4. 7.9 While Loops
  5. 7.10 Loop and a Half
8.DD.1 Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 7.3 Comparison Operators
  2. 7.5 For Loops in JavaScript
  3. 7.9 While Loops
  4. 7.10 Loop and a Half
6.A.1 Use a variety of strategies to refine and revise search results.
  1. 1.7 Information Literacy
8.A.1 Use advanced search strategies to locate information online.
  1. 1.7 Information Literacy
6.E.1 Evaluate information and its sources.
  1. 1.7 Information Literacy
7.E.1 Independently, evaluate information and its sources using student selected processes and strategies.
  1. 1.7 Information Literacy
6.C.1 Repurpose or remix original works following fair use guidelines.
  1. 1.10 Creative Credit & Copyright
6.IP.1 With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 1.10 Creative Credit & Copyright
7.IP.1 With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 1.10 Creative Credit & Copyright
8.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 1.10 Creative Credit & Copyright
6.IP.2 Cite a variety of sources using the appropriate format.
  1. 1.10 Creative Credit & Copyright
6.IP.3 Describe negative consequences of piracy and plagiarism.
  1. 1.10 Creative Credit & Copyright
7.IP.3 Identify strategies to avoid personal works and the works of others from being pirated and plagiarized.
  1. 1.10 Creative Credit & Copyright
8.IP.3 Debate the risks and benefits of sharing personal works online.
  1. 1.10 Creative Credit & Copyright
6.IC.1 Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility.
7.IC.1 Compare and contrast the impacts of technology, including bias and accessibility.
8.IC.1 Explore and create solutions for the negative impacts of technology, including bias and accessibility.
6.SI.1 Use collaborative technology.
7.SI.1 Use collaborative technology to gather and share information.
8.SI.1 Use collaborative technology to communicate information to a specific audience.
6.SI.2 Identify how social interactions can impact a person’s self-image.
  1. 1.4 Cyberbullying
6.SE.1 Identify steps for responding to uncomfortable situations when interacting online.
  1. 1.4 Cyberbullying
  2. 1.5 Internet Safety
6.SE.2 Identify basic methods to maintain digital privacy and security.
  1. 1.5 Internet Safety
  2. 1.6 Privacy & Security
7.SE.2 Identify a variety of methods to maintain digital privacy and security.
  1. 1.6 Privacy & Security
8.SE.2 Identify advanced methods to maintain digital privacy and security.
  1. 1.6 Privacy & Security
6.SE.3 Recognize that data-collection technology can be used to track navigation online.
  1. 1.6 Privacy & Security
6.SE.4 Identify threats to personal cybersecurity.
  1. 1.6 Privacy & Security
7.SE.4 Describe how to respond to threats to personal cybersecurity.
  1. 1.6 Privacy & Security
8.SE.4 Discuss the consequences of identity theft.
6.RU.1 Identify different forms of cyberbullying.
  1. 1.4 Cyberbullying
7.RU.1 Describe different forms of cyberbullying and the effects on all parties involved.
  1. 1.4 Cyberbullying
6.RU.2 Identify strategies to stop cyberbullying.
  1. 1.4 Cyberbullying
7.RU.2 Identify strategies to prevent and stop cyberbullying.
  1. 1.4 Cyberbullying
8.RU.2 Identify strategies to prevent and stop cyberbullying.
  1. 1.4 Cyberbullying
6.RU.3 Use approprite digital etiquette in a variety of situations.
  1. 1.3 Digital Footprint and Reputation
6.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 1.10 Creative Credit & Copyright
7.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 1.10 Creative Credit & Copyright
8.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 1.10 Creative Credit & Copyright
6.DI.1 Describe personal online usage and determine how it affects identity on- and offline.
  1. 1.3 Digital Footprint and Reputation
7.DI.1 Evaluate how digital identity can impact a person now and in the future.
  1. 1.3 Digital Footprint and Reputation