Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 7

42

Standards in this Framework

24

Standards Mapped

57%

Mapped to Course

Standard Lessons
CS.D.7.a
Develop and implement a process to evaluate existing computing devices capabilities based on personal interaction with the device.
CS.HS.7.a
Evaluate hardware and software combinations used to accomplish a task.
  1. 8.8 Mouse Data
  2. 8.9 Keyboard Data
CS.T.7.a
Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
  1. 4.3 Hardware
NI.N.7.a
Explain the role of hardware components and diagram the infrastructure of networks and the internet (including cloud servers).
NI.N.7.b
Explain the protocols (i.e., rules) and why they are used to transmit data across networks and the internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
NI.C.7.a
Identify and apply introductory methods of encryption to model the secure transmission of information.
  1. 6.6 Encryption
NI.C.7.b
Describe the types of malware to show how malware affects information.
NI.C.7.c
Identify cybersecurity concerns and measures needed to protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
NI.IOT.7.a
Explain the positive and negative impacts of IoT as it applies to daily life and create ways to mitigate the negative impacts on society.
  1. 4.5 Internet of Things
DA.DCS.7.a
Compare and contrast digital data collection tools to make them more useful and reliable.
DA.DCS.7.b
Evaluate various file formats to understand data storage capabilities.
DA.DCS.7.c
Create a logical file structure to organize data to support individual and collaborative work.
  1. 13.4 Let's Add Pages!
  2. 13.5 Creating a Sitemap
DA.VC.7.a
Communicate relations between data sets to interpret results.
DA.VC.7.b
Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.7.a
Create and analyze models and simulations to accurately hypothesize a real-world situation.
ATP.A.7.a
Select and modify pseudocode for a multi-step process to solve a problem.
  1. 5.3 Functions
  2. 5.7 If/Else Statements
  3. 8.10 Project: Animate an Emoji
ATP.VDR.7.a
Use test cases to trace variable values to determine the result.
  1. 5.5 For Loops
  2. 8.3 Variables
ATP.CS.7.a
Use and apply decisions and loops in a program to solve a problem.
  1. 1.4 Lost in Space
  2. 5.5 For Loops
  3. 5.6 Conditional Statements
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
  7. 8.4 The Draw Loop
  8. 8.5 Color Transitions
  9. 8.6 Shape Transformations
  10. 8.7 Direction
  11. 8.8 Mouse Data
  12. 8.9 Keyboard Data
  13. 8.10 Project: Animate an Emoji
ATP.M.7.a
Decompose problems into parts to facilitate the design, implementation and review of increasingly complex programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.7 If/Else Statements
  5. 5.9 Karel Challenges
  6. 13.4 Let's Add Pages!
  7. 13.5 Creating a Sitemap
ATP.PD.7.a
Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 8.5 Color Transitions
  10. 8.6 Shape Transformations
  11. 8.7 Direction
  12. 8.8 Mouse Data
  13. 8.9 Keyboard Data
  14. 8.10 Project: Animate an Emoji
ATP.PD.7.b
Test, trace and debug to refine code.
  1. 1.2 Karel Error Messages
  2. 5.2 Karel's World
  3. 5.4 Multiple Functions
  4. 5.7 If/Else Statements
  5. 5.8 While Loops
  6. 5.9 Karel Challenges
  7. 9.4 Intro to JavaScript
  8. 9.5 Variables
  9. 9.9 Your First Sprites
  10. 9.10 The Physics of Sprites
ATP.PD.7.c
Identify procedures that utilize parameters.
  1. 3.4 Under the Sea
  2. 8.1 Getting Started
  3. 8.2 Color
  4. 8.3 Variables
  5. 8.4 The Draw Loop
  6. 8.5 Color Transitions
  7. 8.6 Shape Transformations
  8. 8.7 Direction
  9. 8.8 Mouse Data
  10. 8.9 Keyboard Data
  11. 8.10 Project: Animate an Emoji
AI.P.7.a
Give examples of how intelligent agents combine information from multiple sensors to react to an input.
AI.P.7.b
Describe how edge detectors can be composed to form more complex feature detectors, e.g., for letters or shapes.
AI.P.7.c
Illustrate the concept of feature extraction from images by simulating an edge detector.
AI.RR.7.a
Compare several algorithms that could be used to solve a specific type of reasoning problem.
AI.ML.7.a
Model how unsupervised learning finds patterns in unlabeled data to identify how machine learning takes place.
AI.ML.7.b
Create a dataset for training a decision tree classifier or predictor to explore the impact that different feature encodings have on the decision tree.
AI.NI.7.a
Curate a dataset to train a language-processing algorithm to create a program that incorporates voice commands.
AI.NI.7.b
Identify the components of a chatbot and explain how each component contributes to the chatbot’s human-like responses.
AI.SI.7.a
Identify and explain the effect training data has on the accuracy of an artificial intelligence system to uncover bias in training data.
AI.SI.7.b
Identify and explain the problems of classification in the supervised artificial intelligence context to create data sets that are inclusive and accurate.
IC.Cu.7.a
Compare current technologies from the present to the past to evaluate the effect on people's everyday activities.
  1. 8.1 Getting Started
IC.Cu.7.b
Evaluate various technologies to identify issues of bias and accessibility.
  1. 4.6 Ethics and Legal Considerations
IC.Cu.7.c
Identify and explore careers related to the field of computer science.
  1. 4.7 The Future of Computing
IC.Cu.7.d
Explain how computing impacts innovation in other fields.
  1. 8.1 Getting Started
IC.SI.7.a
Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions.
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
  3. 7.3 Internet Safety
IC.SLE.7.a
Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making.
  1. 4.6 Ethics and Legal Considerations
  2. 6.4 Cybersecurity
  3. 6.5 The CIA Triad
  4. 7.1 Digital Footprint and Reputation
  5. 7.4 Privacy & Security
IC.SLE.7.b
Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas.
  1. 4.6 Ethics and Legal Considerations
  2. 6.4 Cybersecurity
  3. 7.4 Privacy & Security
  4. 7.7 Hacking Ethics
IC.SLE.7.c
Evaluate the development of new technologies in communication, entertainment and business to understand the impact.
  1. 7.8 Project: Public Service Announcement
IC.SLE.7.d
Provide appropriate credit when using resources or artifacts that are not our own.
  1. 7.6 Creative Credit & Copyright
IC.SLE.7.e
Explain the connection between the longevity of data on the internet, personal online identity and personal privacy.
  1. 7.1 Digital Footprint and Reputation
  2. 7.3 Internet Safety
  3. 7.4 Privacy & Security