Please enable JavaScript to use CodeHS

Ohio 6 Standards Mapping

to

Computing Ideas (Lovelace)

30 Standards in this Framework 23 Standards Mapped 76% Mapped to Course


Standard Lessons
CS.D.6.a Identify the benefits and limitations of a given computing device's functions (including individual components) to explain how the functions and components work together to create the computing system.
  1. 2.3 Software
  2. 2.5 Future of Computing
CS.HS.6.a Identify ways that hardware and software work together as a system to collect and exchange data.
  1. 2.3 Software
  2. 2.4 Hardware
  3. 4.13 Viewing Websites
CS.T.6.a Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
NI.N.6.a Identify the role of hardware components to understand the infrastructure of networks and the internet (including cloud servers).
  1. 2.4 Hardware
  2. 7.5 Routing
NI.N.6.b Identify protocols (i.e., rules) and explain why they are used to transmit data across networks and the internet.
  1. 7.6 Packets and Protocols
NI.C.6.a Identify cybersecurity concerns and measures needed to protect electronic information.
  1. 9.4 Privacy & Security
  2. 16.2 What is Cybersecurity?
NI.C.6.b Identify the different types of malware to understand threats to data security.
  1. 16.2 What is Cybersecurity?
  2. 16.3 Impact of Cybersecurity
NI.C.6.c Identify ways to protect private information.
  1. 9.4 Privacy & Security
DA.DCS.6.a Identify and use an appropriate digital data collection tool to compile information.
DA.DCS.6.b Select and utilize appropriate file formats to organize collected data.
DA.DCS.6.c Utilize a file structure to logically organize data to support individual and collaborative work.
DA.VC.6.a Identify and label patterns in models or representations to infer connections between data sets.
DA.VC.6.b Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.6.a Identify and utilize data sets to support or refute a hypothesis.
ATP.A.6.a Compare and refine multiple algorithms for the same task to determine which is the most efficient.
  1. 1.9 For Loops
  2. 1.13 Control Structures Example
  3. 1.16 Karel Challenges
  4. 14.4 For Loops
  5. 14.8 Functions
  6. 14.10 Top Down Design
  7. 14.13 Parameters
  8. 14.14 Using i in For Loops
  9. 14.16 If Statements
  10. 14.17 If/ Else Statements
  11. 14.18 While Loops
ATP.VDR.6.a Identify unknown values that need to be represented by a variable within a multi-step process.
  1. 14.11 Variables
  2. 14.12 User Input
  3. 14.13 Parameters
  4. 14.16 If Statements
  5. 14.17 If/ Else Statements
  6. 14.18 While Loops
  7. 14.19 Putting Together Control Structures
ATP.VDR.6.b Create variables and use them within a multi-step process.
  1. 14.11 Variables
  2. 14.12 User Input
  3. 14.13 Parameters
  4. 14.16 If Statements
  5. 14.17 If/ Else Statements
  6. 14.18 While Loops
  7. 14.19 Putting Together Control Structures
ATP.CS.6.a Identify and trace decisions and loops that exist in a multi-step process within a program.
  1. 1.9 For Loops
  2. 1.12 While Loops in Karel
  3. 1.13 Control Structures Example
  4. 14.4 For Loops
  5. 14.14 Using i in For Loops
  6. 14.15 Extended Loop Control
  7. 14.16 If Statements
  8. 14.17 If/ Else Statements
  9. 14.18 While Loops
  10. 14.19 Putting Together Control Structures
ATP.M.6.a Decompose problems into parts to facilitate the design, implementation and review of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 14.8 Functions
  3. 14.10 Top Down Design
  4. 14.19 Putting Together Control Structures
ATP.PD.6.a Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 14.4 For Loops
  4. 14.11 Variables
  5. 14.13 Parameters
  6. 14.14 Using i in For Loops
  7. 14.15 Extended Loop Control
  8. 14.16 If Statements
  9. 14.17 If/ Else Statements
  10. 14.18 While Loops
  11. 14.19 Putting Together Control Structures
ATP.PD.6.b Test and trace to debug and refine code
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 14.4 For Loops
  4. 14.10 Top Down Design
  5. 14.13 Parameters
  6. 14.16 If Statements
  7. 14.17 If/ Else Statements
  8. 14.18 While Loops
IC.Cu.6.a Identify the change that current technologies have on people's everyday activities to understand the impact within a society.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
IC.Cu.6.b Identify issues of bias and accessibility in the design of existing technologies to address equality and equity in society.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
IC.Cu.6.c Identify and explore careers related to the field of computer science.
  1. 16.3 Impact of Cybersecurity
IC.SI.6.a Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
  3. 16.3 Impact of Cybersecurity
IC.SLE.6.a Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making.
  1. 9.4 Privacy & Security
  2. 9.6 Creative Credit & Copyright
IC.SLE.6.b Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
IC.SLE.6.c Evaluate the development of new technologies in communication, entertainment and business to understand the impact.
  1. 8.1 Project: The Effects of the Internet
IC.SLE.6.d Provide appropriate credit when using resources or artifacts that are not our own.
  1. 9.6 Creative Credit & Copyright
IC.SLE.6.e Differentiate between the appropriate and inappropriate content on the internet and identify unethical and illegal online behavior.
  1. 9.1 Digital Footprint and Reputation
  2. 9.2 Cyberbullying
  3. 9.3 Internet Safety
  4. 9.6 Creative Credit & Copyright