Please enable JavaScript to use CodeHS

Standards Mapping

for New York 7-8

34

Standards in this Framework

34

Standards Mapped

100%

Mapped to Course

Standard Lessons
7-8.CT.1
Compare the results of alternative models or simulations to determine and evaluate how the input data and assumptions change the results.
  1. 5.8 Mouse Data
  2. 5.9 Keyboard Data
7-8.CT.10
Document the iterative design process of developing a computational artifact that incorporates user feedback and preferences.
  1. 5.10 Project: Animate an Emoji
7-8.CT.2
Collect and use digital data in a computational artifact.
  1. 1.8 Project: Public Service Announcement
7-8.CT.3
Refine and visualize a data set in order to persuade an audience.
  1. 1.8 Project: Public Service Announcement
7-8.CT.4
Write a program using functions or procedures whose names or other documentation convey their purpose within the larger task.
  1. 2.3 Functions
  2. 2.4 Multiple Functions
  3. 2.5 For Loops
  4. 2.6 Conditional Statements
  5. 2.7 If/Else Statements
  6. 2.8 While Loops
  7. 2.9 Karel Challenges
  8. 5.2 Color
  9. 5.3 Variables
  10. 5.4 The Draw Loop
  11. 5.5 Color Transitions
  12. 5.6 Shape Transformations
  13. 5.7 Direction
  14. 5.8 Mouse Data
  15. 5.9 Keyboard Data
  16. 5.10 Project: Animate an Emoji
7-8.CT.5
Identify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences.
  1. 5.4 The Draw Loop
7-8.CT.6
Design, compare and refine algorithms for a specific task or within a program.
  1. 2.1 Introduction to Karel
  2. 2.2 Karel's World
  3. 2.3 Functions
  4. 2.4 Multiple Functions
  5. 2.5 For Loops
  6. 2.6 Conditional Statements
  7. 2.7 If/Else Statements
  8. 2.8 While Loops
  9. 2.9 Karel Challenges
  10. 5.3 Variables
  11. 5.4 The Draw Loop
  12. 5.5 Color Transitions
  13. 5.6 Shape Transformations
  14. 5.7 Direction
  15. 5.8 Mouse Data
  16. 5.9 Keyboard Data
7-8.CT.7
Design or remix a program that uses a variable to maintain the current value of a key piece of information.
  1. 5.3 Variables
  2. 5.5 Color Transitions
  3. 5.7 Direction
  4. 5.8 Mouse Data
  5. 5.9 Keyboard Data
7-8.CT.8
Develop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem.
  1. 2.6 Conditional Statements
  2. 2.7 If/Else Statements
  3. 2.8 While Loops
  4. 2.9 Karel Challenges
  5. 5.8 Mouse Data
  6. 5.9 Keyboard Data
7-8.CT.9
Read and interpret code to predict the outcome of various programs that involve conditionals and repetition for the purposes of debugging.
  1. 2.6 Conditional Statements
  2. 2.7 If/Else Statements
  3. 2.8 While Loops
  4. 5.8 Mouse Data
  5. 5.9 Keyboard Data
7-8.CY.1
Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
  1. 4.4 Cybersecurity
  2. 4.5 The CIA Triad
7-8.CY.2
Describe physical, digital, and behavioral safeguards that can be employed in different situations.
  1. 4.4 Cybersecurity
  2. 4.5 The CIA Triad
  3. 4.6 Encryption
7-8.CY.3
Describe trade-offs of implementing specific security safeguards.
  1. 4.4 Cybersecurity
  2. 4.5 The CIA Triad
  3. 4.6 Encryption
7-8.CY.4
Describe the limitations of cryptographic methods.
  1. 4.6 Encryption
  2. 4.7 Project: Steganography
7-8.CY.5
Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly.
  1. 4.4 Cybersecurity
  2. 4.5 The CIA Triad
7-8.DL.1
Type on a keyboard while demonstrating proper keyboarding technique, with increased speed and accuracy.
  1. 1.5 Information Literacy
7-8.DL.2
Communicate and collaborate with others using a variety of digital tools to create and revise a collaborative product.
  1. 1.8 Project: Public Service Announcement
7-8.DL.3
Compare types of search tools, choose a search tool for effectiveness and efficiency, and evaluate the quality of search tools based on returned results.
  1. 1.5 Information Literacy
7-8.DL.4
Select and use digital tools to create, revise, and publish digital artifacts.
  1. 1.8 Project: Public Service Announcement
7-8.DL.5
Transfer knowledge of technology in order to explore new technologies.
  1. 1.8 Project: Public Service Announcement
7-8.DL.6
Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.
  1. 1.1 Digital Footprint and Reputation
  2. 1.3 Internet Safety
  3. 1.4 Privacy & Security
7-8.DL.7
Describe safe, appropriate, positive, and responsible online behavior and identify strategies to combat negative online behavior.
  1. 1.2 Cyberbullying
7-8.IC.1
Compare and contrast tradeoffs associated with computing technologies that affect individuals and society.
  1. 3.4 Cloud Computing
7-8.IC.2
Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
  1. 3.6 Ethics and Legal Considerations
7-8.IC.3
Identify and discuss issues of ethics surrounding computing technologies and current events.
  1. 3.6 Ethics and Legal Considerations
7-8.IC.4
Identify and discuss issues related to the collection and use of public and private data.
  1. 3.5 Internet of Things
7-8.IC.5
Analyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals.
  1. 3.6 Ethics and Legal Considerations
7-8.IC.6
Assess the accessibility of a computing device or software application in terms of user needs.
  1. 3.8 Project: Design the Computer of Tomorrow
7-8.IC.7
Explore a range of computer sciencerelated career paths.
  1. 3.7 The Future of Computing
7-8.NSD.1
Design a user interface for a computing technology that considers usability, accessibility, and desirability.
  1. 3.8 Project: Design the Computer of Tomorrow
7-8.NSD.2
Design a project that combines hardware and software components.
  1. 3.5 Internet of Things
7-8.NSD.3
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
  1. 3.3 Hardware
7-8.NSD.4
Design a protocol for transmitting data through a multi-point network.
  1. 4.2 The Need for Protocols
7-8.NSD.5
Summarize how remote data is stored and accessed in a network.
  1. 4.4 Cybersecurity