Please enable JavaScript to use CodeHS

Standards Mapping

for New York 4-6

34

Standards in this Framework

31

Standards Mapped

91%

Mapped to Course

Standard Lessons
4-6.CT.1
Develop a computational model of a system that shows changes in output when there are changes in inputs.
  1. 2.2 A Day at the Park
  2. 3.4 Under the Sea
4-6.CT.10
Describe the steps taken and choices made to design and develop a solution using an iterative design process.
  1. 2.3 Karel Adventures 2: Evaluation
  2. 3.5 Tracy Adventures 1: Evaluation
  3. 5.9 Karel Challenges
4-6.CT.2
Collect digital data related to a reallife question or need.
  1. 12.7 Project: Statistical Questions
  2. 12.8 Project: Data Storytelling
4-6.CT.3
Visualize a simple data set in order to highlight relationships and persuade an audience.
  1. 12.8 Project: Data Storytelling
  2. 12.9 Project: Tell Your Story
4-6.CT.4
Decompose a problem into smaller named tasks, some of which can themselves be decomposed into smaller steps.
  1. 2.2 A Day at the Park
  2. 5.4 Multiple Functions
  3. 5.9 Karel Challenges
4-6.CT.5
Identify and name a task within a problem that gets performed multiple times while solving that problem, but with slightly different concrete details each time.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 3.4 Under the Sea
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
4-6.CT.6
Compare two or more algorithms and discuss the advantages and disadvantages of each for a specific task.
  1. 1.3 The Rabbit Chase
  2. 2.2 A Day at the Park
  3. 5.9 Karel Challenges
4-6.CT.7
Identify pieces of information that might change as a program or process runs.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
4-6.CT.8
Develop algorithms or programs that use repetition and conditionals for creative expression or to solve a problem.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
4-6.CT.9
Explain each step of an algorithm or program that includes repetition and conditionals for the purposes of debugging.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
4-6.CY.1
Explain why different types of information might need to be protected.
  1. 6.4 Cybersecurity
  2. 6.6 Encryption
  3. 7.4 Privacy & Security
4-6.CY.2
Describe common safeguards for protecting personal information.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
4-6.CY.3
Describe trade-offs between allowing information to be public and keeping information private and secure.
  1. 6.4 Cybersecurity
  2. 7.1 Digital Footprint and Reputation
  3. 7.3 Internet Safety
  4. 7.4 Privacy & Security
4-6.CY.4
Model and explain the purpose of simple cryptographic methods.
  1. 6.6 Encryption
  2. 6.7 Project: Steganography
4-6.CY.5
Explain suspicious activity of applications and devices.
  1. 6.4 Cybersecurity
4-6.DL.1
Type on a keyboard while demonstrating proper keyboarding technique.
4-6.DL.2
Select appropriate digital tools to communicate and collaborate while learning with others.
  1. 4.3 Hardware
  2. 4.8 Project: Design the Computer of Tomorrow
  3. 7.8 Project: Public Service Announcement
  4. 12.9 Project: Tell Your Story
4-6.DL.3
Conduct and refine advanced multicriteria digital searches to locate content relevant to varied learning goals.
  1. 7.5 Information Literacy
4-6.DL.4
Use a variety of digital tools and resources to create and revise digital artifacts.
  1. 1.3 The Rabbit Chase
  2. 1.4 Lost in Space
  3. 2.1 Quest for the Rosetta Stone
  4. 2.2 A Day at the Park
  5. 5.9 Karel Challenges
  6. 6.7 Project: Steganography
  7. 7.8 Project: Public Service Announcement
  8. 10.9 Complete Your Homepage
  9. 12.9 Project: Tell Your Story
4-6.DL.5
Identify common features of digital technologies.
  1. 4.1 History of Computing
  2. 4.2 Software
  3. 4.3 Hardware
4-6.DL.6
Describe persistence of digital information and explain how actions in online spaces can have consequences.
  1. 7.1 Digital Footprint and Reputation
4-6.DL.7
Identify and describe actions in online spaces that could potentially be unsafe or harmful.
  1. 7.3 Internet Safety
4-6.IC.1
Describe computing technologies that have changed the world, and express how those technologies influence, and are influenced by, cultural practices.
  1. 4.1 History of Computing
4-6.IC.2
Explain how laws impact the use of computing technologies and digital information.
  1. 4.6 Ethics and Legal Considerations
  2. 7.6 Creative Credit & Copyright
4-6.IC.3
Explain current events that involve computing technologies.
  1. 4.4 Cloud Computing
  2. 4.5 Internet of Things
  3. 4.7 The Future of Computing
4-6.IC.4
Explain who has access to data in different digital spaces.
  1. 6.5 The CIA Triad
  2. 7.4 Privacy & Security
4-6.IC.5
Explain how computer systems play a role in human decision-making
  1. 12.1 Your World in Numbers
  2. 12.5 Visualizing Data
  3. 12.6 Models
4-6.IC.6
Identify and explain ways to improve the accessibility and usability of a computing device or software application for the diverse needs and wants of users.
  1. 4.3 Hardware
  2. 4.8 Project: Design the Computer of Tomorrow
4-6.IC.7
Identify a diverse range of role models in computer science.
4-6.NSD.1
Propose improvements to the design of a computing technology based on an analysis of user interactions with that technology.
  1. 4.3 Hardware
4-6.NSD.2
Model how computer hardware and software work together as a system to accomplish tasks.
  1. 4.2 Software
  2. 4.3 Hardware
4-6.NSD.3
Determine potential solutions to solve hardware and software problems using common troubleshooting strategies.
  1. 4.3 Hardware
4-6.NSD.4
Model how data is structured to transmit through a network.
4-6.NSD.5
Describe that data can be stored locally or remotely in a network.
  1. 4.4 Cloud Computing