Please enable JavaScript to use CodeHS

Standards Mapping

for North Dakota 6-8

66

Standards in this Framework

54

Standards Mapped

81%

Mapped to Course

Standard Lessons
6.NI.1
Explain how data is sent across networks.
  1. 9.8 Packets & Protocols
  2. 9.9 Viewing a Webpage
7.NI.1
Model how data is sent from one computer to another across networks.
  1. 9.8 Packets & Protocols
  2. 9.9 Viewing a Webpage
8.NI.1
Investigate how data is sent from one computer to another across networks.
  1. 9.8 Packets & Protocols
  2. 9.9 Viewing a Webpage
6.HS.1
Use hardware and/or software to complete a task.
  1. 7.4 Software and Applications
  2. 9.4 Internet Hardware and Sending Information
  3. 10.1 Internal Components
  4. 11.1 Methodology
  5. 11.2 Support Practice
  6. 21.1 Challenge Problems
7.HS.1
Compare and contrast hardware and/or software options to complete a task.
  1. 7.4 Software and Applications
  2. 10.1 Internal Components
  3. 11.1 Methodology
  4. 11.2 Support Practice
8.HS.1
Choose appropriate device/hardware/software to complete a task.
  1. 7.4 Software and Applications
  2. 10.2 Peripheral Devices
6.HS.2
Use software features to accomplish a goal.
  1. 7.4 Software and Applications
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
6.HS.3
Organize, store, and retrieve digital information with guidance.
7.HS.3
Organize, store, and retrieve digital information with minimal guidance.
8.HS.3
Organize, store, and retrieve digital information efficiently.
6.HS.4
Identify threats to technology systems.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
7.HS.4
Describe threats to technology systems.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
8.HS.4
Describe ways to protect against threats to technology systems.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
6.HS.5
Identify security measures to protect technology systems.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
7.HS.5
Explain how security measures protect technology systems.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
8.HS.5
Compare and contrast security measures used to protect technology systems.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
6.T.1
Apply basic troubleshooting strategies.
  1. 11.1 Methodology
  2. 11.2 Support Practice
  3. 14.1 Project: Security Assessment Report
6.PSA.1
Identify and test an algorithm to solve a problem.
  1. 4.3 Looping
  2. 4.4 Branching
7.PSA.1
Modify and test an algorithm to solve a problem.
  1. 4.3 Looping
  2. 4.4 Branching
8.PSA.1
Create and test an algorithm to solve a problem across disciplines.
6.PSA.2
Debug a program that includes sequencing, loops, or conditionals.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.9 While Loops
  4. 22.10 Loop and a Half
6.PSA.3
Compare and contrast the efficiencies of multiple solutions to a task.
6.DCA.1
Collect and analyze data to support a claim.
7.DCA.1
Represent data, in more than one way, to defend your claim.
8.DCA.1
Represent data from multiple sources in order to defend or refute a claim.
6.DD.1
Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 4.1 Programming Concepts
  2. 4.3 Looping
  3. 4.4 Branching
  4. 22.3 Comparison Operators
  5. 22.5 For Loops in JavaScript
  6. 22.6 General For Loops
  7. 22.7 For Loop Practice
  8. 22.9 While Loops
7.DD.1
Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 4.1 Programming Concepts
  2. 4.3 Looping
  3. 4.4 Branching
  4. 22.3 Comparison Operators
  5. 22.5 For Loops in JavaScript
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
  8. 22.10 Loop and a Half
8.DD.1
Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
  1. 4.1 Programming Concepts
  2. 4.3 Looping
  3. 4.4 Branching
  4. 22.3 Comparison Operators
  5. 22.5 For Loops in JavaScript
  6. 22.9 While Loops
  7. 22.10 Loop and a Half
6.A.1
Use a variety of strategies to refine and revise search results.
  1. 2.5 Information Literacy
8.A.1
Use advanced search strategies to locate information online.
  1. 2.5 Information Literacy
6.E.1
Evaluate information and its sources.
  1. 2.5 Information Literacy
7.E.1
Independently, evaluate information and its sources using student selected processes and strategies.
  1. 2.5 Information Literacy
6.C.1
Repurpose or remix original works following fair use guidelines.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
6.IP.1
With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 2.6 Creative Credit & Copyright
7.IP.1
With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 2.6 Creative Credit & Copyright
8.IP.1
Properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 2.6 Creative Credit & Copyright
6.IP.2
Cite a variety of sources using the appropriate format.
  1. 2.6 Creative Credit & Copyright
6.IP.3
Describe negative consequences of piracy and plagiarism.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
7.IP.3
Identify strategies to avoid personal works and the works of others from being pirated and plagiarized.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
8.IP.3
Debate the risks and benefits of sharing personal works online.
  1. 2.6 Creative Credit & Copyright
  2. 9.10 Impact of the Internet
6.IC.1
Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility.
  1. 9.10 Impact of the Internet
7.IC.1
Compare and contrast the impacts of technology, including bias and accessibility.
  1. 9.10 Impact of the Internet
8.IC.1
Explore and create solutions for the negative impacts of technology, including bias and accessibility.
  1. 9.10 Impact of the Internet
6.SI.1
Use collaborative technology.
7.SI.1
Use collaborative technology to gather and share information.
8.SI.1
Use collaborative technology to communicate information to a specific audience.
6.SI.2
Identify how social interactions can impact a person’s self-image.
  1. 2.2 Cyberbullying
6.SE.1
Identify steps for responding to uncomfortable situations when interacting online.
  1. 2.2 Cyberbullying
  2. 2.3 Internet Safety
6.SE.2
Identify basic methods to maintain digital privacy and security.
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
7.SE.2
Identify a variety of methods to maintain digital privacy and security.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
8.SE.2
Identify advanced methods to maintain digital privacy and security.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.8 System Administration
6.SE.3
Recognize that data-collection technology can be used to track navigation online.
  1. 2.4 Privacy & Security
6.SE.4
Identify threats to personal cybersecurity.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
7.SE.4
Describe how to respond to threats to personal cybersecurity.
  1. 2.4 Privacy & Security
8.SE.4
Discuss the consequences of identity theft.
6.RU.1
Identify different forms of cyberbullying.
  1. 2.2 Cyberbullying
7.RU.1
Describe different forms of cyberbullying and the effects on all parties involved.
  1. 2.2 Cyberbullying
6.RU.2
Identify strategies to stop cyberbullying.
  1. 2.2 Cyberbullying
7.RU.2
Identify strategies to prevent and stop cyberbullying.
  1. 2.2 Cyberbullying
8.RU.2
Identify strategies to prevent and stop cyberbullying.
  1. 2.2 Cyberbullying
6.RU.3
Use approprite digital etiquette in a variety of situations.
  1. 2.1 Digital Footprint and Reputation
6.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
7.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
8.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
6.DI.1
Describe personal online usage and determine how it affects identity on- and offline.
  1. 2.1 Digital Footprint and Reputation
7.DI.1
Evaluate how digital identity can impact a person now and in the future.
  1. 2.1 Digital Footprint and Reputation