Please enable JavaScript to use CodeHS

Standards Mapping

for New York 7-8


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Compare the results of alternative models or simulations to determine and evaluate how the input data and assumptions change the results.
  1. 13.12 User Input
  2. 13.17 If/ Else Statements
  3. 13.18 While Loops
Document the iterative design process of developing a computational artifact that incorporates user feedback and preferences.
Collect and use digital data in a computational artifact.
Refine and visualize a data set in order to persuade an audience.
Write a program using functions or procedures whose names or other documentation convey their purpose within the larger task.
  1. 1.4 Functions in Karel
  2. 1.6 Top Down Design and Decomposition in Karel
  3. 1.7 Commenting Your Code
  4. 1.16 Karel Challenges
  5. 13.7 Naming Guidelines
  6. 13.8 Functions
  7. 13.10 Top Down Design
  8. 13.11 Variables
  9. 13.19 Putting Together Control Structures
Identify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences.
  1. 13.8 Functions
  2. 13.10 Top Down Design
  3. 13.13 Parameters
  4. 13.19 Putting Together Control Structures
Design, compare and refine algorithms for a specific task or within a program.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.14 More Karel Examples and Testing
  3. 13.19 Putting Together Control Structures
Design or remix a program that uses a variable to maintain the current value of a key piece of information.
  1. 13.11 Variables
  2. 13.19 Putting Together Control Structures
Develop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem.
  1. 1.10 If Statements
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 13.13 Parameters
  8. 13.14 Using i in For Loops
  9. 13.15 Extended Loop Control
  10. 13.16 If Statements
  11. 13.17 If/ Else Statements
  12. 13.18 While Loops
  13. 13.19 Putting Together Control Structures
Read and interpret code to predict the outcome of various programs that involve conditionals and repetition for the purposes of debugging.
  1. 1.16 Karel Challenges
  2. 13.19 Putting Together Control Structures
Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
  1. 9.4 Privacy & Security
  2. 15.4 The CIA Triad
Describe physical, digital, and behavioral safeguards that can be employed in different situations.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
  3. 15.4 The CIA Triad
Describe trade-offs of implementing specific security safeguards.
  1. 9.4 Privacy & Security
  2. 15.4 The CIA Triad
Describe the limitations of cryptographic methods.
Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly.
  1. 15.4 The CIA Triad
Type on a keyboard while demonstrating proper keyboarding technique, with increased speed and accuracy.
Communicate and collaborate with others using a variety of digital tools to create and revise a collaborative product.
Compare types of search tools, choose a search tool for effectiveness and efficiency, and evaluate the quality of search tools based on returned results.
  1. 9.5 Information Literacy
Select and use digital tools to create, revise, and publish digital artifacts.
  1. 5.1 Project: Your First Website
  2. 8.1 Project: The Effects of the Internet
  3. 10.1 Project: Public Service Announcement
  4. 14.1 Sports Research
  5. 14.2 Game Events
  6. 14.3 Sound Effects
  7. 14.4 Make a Shot!
  8. 14.5 Air Horn App
  9. 14.6 Event Handlers
  10. 14.7 Putting Game
  11. 14.8 Level Up!
  12. 14.9 Final Touches
  13. 14.10 Make a Game!
Transfer knowledge of technology in order to explore new technologies.
  1. 2.5 Future of Computing
Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.
  1. 9.1 Digital Footprint and Reputation
Describe safe, appropriate, positive, and responsible online behavior and identify strategies to combat negative online behavior.
  1. 9.2 Cyberbullying
  2. 9.3 Internet Safety
Compare and contrast tradeoffs associated with computing technologies that affect individuals and society.
  1. 7.1 Intro to the Internet
  2. 7.7 The Impact of the Internet
  3. 9.1 Digital Footprint and Reputation
  4. 15.2 What is Cybersecurity?
Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
  1. 9.6 Creative Credit & Copyright
Identify and discuss issues of ethics surrounding computing technologies and current events.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 9.1 Digital Footprint and Reputation
Identify and discuss issues related to the collection and use of public and private data.
Analyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals.
Assess the accessibility of a computing device or software application in terms of user needs.
Explore a range of computer sciencerelated career paths.
Design a user interface for a computing technology that considers usability, accessibility, and desirability.
Design a project that combines hardware and software components.
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
Design a protocol for transmitting data through a multi-point network.
  1. 7.5 Routing
  2. 7.6 Packets and Protocols
Summarize how remote data is stored and accessed in a network.