Please enable JavaScript to use CodeHS

Standards Mapping

for North Dakota 6-8

66

Standards in this Framework

53

Standards Mapped

80%

Mapped to Course

Standard Lessons
6.NI.1
Explain how data is sent across networks.
  1. 4.13 Viewing Websites
  2. 7.6 Packets and Protocols
7.NI.1
Model how data is sent from one computer to another across networks.
  1. 4.13 Viewing Websites
  2. 7.6 Packets and Protocols
8.NI.1
Investigate how data is sent from one computer to another across networks.
  1. 4.13 Viewing Websites
  2. 7.6 Packets and Protocols
6.HS.1
Use hardware and/or software to complete a task.
  1. 2.3 Software
  2. 2.4 Hardware
  3. 7.2 Internet Hardware
7.HS.1
Compare and contrast hardware and/or software options to complete a task.
  1. 2.3 Software
  2. 2.4 Hardware
8.HS.1
Choose appropriate device/hardware/software to complete a task.
  1. 2.3 Software
  2. 2.4 Hardware
6.HS.2
Use software features to accomplish a goal.
  1. 2.3 Software
6.HS.3
Organize, store, and retrieve digital information with guidance.
7.HS.3
Organize, store, and retrieve digital information with minimal guidance.
8.HS.3
Organize, store, and retrieve digital information efficiently.
6.HS.4
Identify threats to technology systems.
  1. 9.4 Privacy & Security
  2. 15.4 The CIA Triad
7.HS.4
Describe threats to technology systems.
  1. 9.4 Privacy & Security
  2. 15.4 The CIA Triad
8.HS.4
Describe ways to protect against threats to technology systems.
  1. 9.4 Privacy & Security
6.HS.5
Identify security measures to protect technology systems.
7.HS.5
Explain how security measures protect technology systems.
8.HS.5
Compare and contrast security measures used to protect technology systems.
6.T.1
Apply basic troubleshooting strategies.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.14 More Karel Examples and Testing
6.PSA.1
Identify and test an algorithm to solve a problem.
  1. 1.14 More Karel Examples and Testing
  2. 13.1 Intro to Python with Tracy the Turtle
  3. 13.2 Tracy's Grid World
  4. 13.3 Turning Tracy
  5. 13.4 For Loops
  6. 13.5 Turning Tracy Using Angles
  7. 13.8 Functions
  8. 13.9 Artistic Effects
  9. 13.10 Top Down Design
  10. 13.11 Variables
  11. 13.12 User Input
  12. 13.13 Parameters
  13. 13.14 Using i in For Loops
  14. 13.15 Extended Loop Control
  15. 13.16 If Statements
  16. 13.17 If/ Else Statements
  17. 13.18 While Loops
  18. 13.19 Putting Together Control Structures
7.PSA.1
Modify and test an algorithm to solve a problem.
  1. 1.14 More Karel Examples and Testing
  2. 13.1 Intro to Python with Tracy the Turtle
  3. 13.2 Tracy's Grid World
  4. 13.3 Turning Tracy
  5. 13.4 For Loops
  6. 13.5 Turning Tracy Using Angles
  7. 13.8 Functions
  8. 13.9 Artistic Effects
  9. 13.10 Top Down Design
  10. 13.11 Variables
  11. 13.12 User Input
  12. 13.13 Parameters
  13. 13.14 Using i in For Loops
  14. 13.15 Extended Loop Control
  15. 13.16 If Statements
  16. 13.17 If/ Else Statements
  17. 13.18 While Loops
  18. 13.19 Putting Together Control Structures
8.PSA.1
Create and test an algorithm to solve a problem across disciplines.
  1. 1.14 More Karel Examples and Testing
6.PSA.2
Debug a program that includes sequencing, loops, or conditionals.
  1. 1.7 Commenting Your Code
  2. 1.12 While Loops in Karel
  3. 13.4 For Loops
  4. 13.14 Using i in For Loops
  5. 13.15 Extended Loop Control
  6. 13.16 If Statements
  7. 13.17 If/ Else Statements
  8. 13.18 While Loops
  9. 13.19 Putting Together Control Structures
6.PSA.3
Compare and contrast the efficiencies of multiple solutions to a task.
  1. 1.13 Control Structures Example
  2. 13.4 For Loops
  3. 13.10 Top Down Design
  4. 13.19 Putting Together Control Structures
6.DCA.1
Collect and analyze data to support a claim.
7.DCA.1
Represent data, in more than one way, to defend your claim.
8.DCA.1
Represent data from multiple sources in order to defend or refute a claim.
6.DD.1
Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 13.4 For Loops
  4. 13.11 Variables
  5. 13.17 If/ Else Statements
  6. 13.18 While Loops
  7. 13.19 Putting Together Control Structures
7.DD.1
Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 13.4 For Loops
  4. 13.11 Variables
  5. 13.17 If/ Else Statements
  6. 13.18 While Loops
  7. 13.19 Putting Together Control Structures
8.DD.1
Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 13.4 For Loops
  4. 13.11 Variables
  5. 13.17 If/ Else Statements
  6. 13.18 While Loops
  7. 13.19 Putting Together Control Structures
6.A.1
Use a variety of strategies to refine and revise search results.
  1. 9.5 Information Literacy
8.A.1
Use advanced search strategies to locate information online.
  1. 9.5 Information Literacy
6.E.1
Evaluate information and its sources.
  1. 9.5 Information Literacy
7.E.1
Independently, evaluate information and its sources using student selected processes and strategies.
  1. 9.5 Information Literacy
6.C.1
Repurpose or remix original works following fair use guidelines.
  1. 9.6 Creative Credit & Copyright
6.IP.1
With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 9.6 Creative Credit & Copyright
7.IP.1
With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 9.6 Creative Credit & Copyright
8.IP.1
Properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 9.6 Creative Credit & Copyright
6.IP.2
Cite a variety of sources using the appropriate format.
  1. 9.6 Creative Credit & Copyright
6.IP.3
Describe negative consequences of piracy and plagiarism.
  1. 9.6 Creative Credit & Copyright
7.IP.3
Identify strategies to avoid personal works and the works of others from being pirated and plagiarized.
  1. 9.6 Creative Credit & Copyright
8.IP.3
Debate the risks and benefits of sharing personal works online.
  1. 7.7 The Impact of the Internet
  2. 9.6 Creative Credit & Copyright
6.IC.1
Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility.
  1. 7.7 The Impact of the Internet
7.IC.1
Compare and contrast the impacts of technology, including bias and accessibility.
  1. 7.7 The Impact of the Internet
8.IC.1
Explore and create solutions for the negative impacts of technology, including bias and accessibility.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
6.SI.1
Use collaborative technology.
7.SI.1
Use collaborative technology to gather and share information.
8.SI.1
Use collaborative technology to communicate information to a specific audience.
6.SI.2
Identify how social interactions can impact a person’s self-image.
  1. 9.2 Cyberbullying
6.SE.1
Identify steps for responding to uncomfortable situations when interacting online.
  1. 9.2 Cyberbullying
  2. 9.3 Internet Safety
6.SE.2
Identify basic methods to maintain digital privacy and security.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
7.SE.2
Identify a variety of methods to maintain digital privacy and security.
  1. 9.4 Privacy & Security
8.SE.2
Identify advanced methods to maintain digital privacy and security.
  1. 9.4 Privacy & Security
6.SE.3
Recognize that data-collection technology can be used to track navigation online.
  1. 9.4 Privacy & Security
6.SE.4
Identify threats to personal cybersecurity.
  1. 9.4 Privacy & Security
7.SE.4
Describe how to respond to threats to personal cybersecurity.
  1. 9.4 Privacy & Security
8.SE.4
Discuss the consequences of identity theft.
6.RU.1
Identify different forms of cyberbullying.
  1. 9.2 Cyberbullying
7.RU.1
Describe different forms of cyberbullying and the effects on all parties involved.
  1. 9.2 Cyberbullying
6.RU.2
Identify strategies to stop cyberbullying.
  1. 9.2 Cyberbullying
7.RU.2
Identify strategies to prevent and stop cyberbullying.
  1. 9.2 Cyberbullying
8.RU.2
Identify strategies to prevent and stop cyberbullying.
  1. 9.2 Cyberbullying
6.RU.3
Use approprite digital etiquette in a variety of situations.
  1. 9.1 Digital Footprint and Reputation
6.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 9.6 Creative Credit & Copyright
7.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 9.6 Creative Credit & Copyright
8.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 9.6 Creative Credit & Copyright
6.DI.1
Describe personal online usage and determine how it affects identity on- and offline.
  1. 9.1 Digital Footprint and Reputation
7.DI.1
Evaluate how digital identity can impact a person now and in the future.
  1. 9.1 Digital Footprint and Reputation