Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 7

42

Standards in this Framework

24

Standards Mapped

57%

Mapped to Course

Standard Lessons
CS.D.7.a
Develop and implement a process to evaluate existing computing devices capabilities based on personal interaction with the device.
  1. 2.3 Software
CS.HS.7.a
Evaluate hardware and software combinations used to accomplish a task.
  1. 2.3 Software
  2. 2.4 Hardware
  3. 4.13 Viewing Websites
CS.T.7.a
Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
NI.N.7.a
Explain the role of hardware components and diagram the infrastructure of networks and the internet (including cloud servers).
  1. 2.4 Hardware
  2. 7.5 Routing
NI.N.7.b
Explain the protocols (i.e., rules) and why they are used to transmit data across networks and the internet.
  1. 7.6 Packets and Protocols
NI.C.7.a
Identify and apply introductory methods of encryption to model the secure transmission of information.
NI.C.7.b
Describe the types of malware to show how malware affects information.
  1. 9.4 Privacy & Security
  2. 15.2 What is Cybersecurity?
  3. 15.3 Impact of Cybersecurity
NI.C.7.c
Identify cybersecurity concerns and measures needed to protect electronic information.
  1. 9.4 Privacy & Security
  2. 15.2 What is Cybersecurity?
  3. 15.3 Impact of Cybersecurity
  4. 15.4 The CIA Triad
NI.IOT.7.a
Explain the positive and negative impacts of IoT as it applies to daily life and create ways to mitigate the negative impacts on society.
  1. 15.2 What is Cybersecurity?
DA.DCS.7.a
Compare and contrast digital data collection tools to make them more useful and reliable.
DA.DCS.7.b
Evaluate various file formats to understand data storage capabilities.
DA.DCS.7.c
Create a logical file structure to organize data to support individual and collaborative work.
DA.VC.7.a
Communicate relations between data sets to interpret results.
DA.VC.7.b
Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.7.a
Create and analyze models and simulations to accurately hypothesize a real-world situation.
ATP.A.7.a
Select and modify pseudocode for a multi-step process to solve a problem.
  1. 1.9 For Loops
  2. 1.13 Control Structures Example
  3. 1.16 Karel Challenges
  4. 13.10 Top Down Design
ATP.VDR.7.a
Use test cases to trace variable values to determine the result.
  1. 13.11 Variables
  2. 13.14 Using i in For Loops
  3. 13.15 Extended Loop Control
  4. 13.16 If Statements
  5. 13.17 If/ Else Statements
  6. 13.18 While Loops
  7. 13.19 Putting Together Control Structures
ATP.CS.7.a
Use and apply decisions and loops in a program to solve a problem.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 13.4 For Loops
  4. 13.14 Using i in For Loops
  5. 13.15 Extended Loop Control
  6. 13.16 If Statements
  7. 13.17 If/ Else Statements
  8. 13.18 While Loops
  9. 13.19 Putting Together Control Structures
ATP.M.7.a
Decompose problems into parts to facilitate the design, implementation and review of increasingly complex programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.8 Functions
  3. 13.10 Top Down Design
  4. 13.19 Putting Together Control Structures
ATP.PD.7.a
Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 13.4 For Loops
  4. 13.11 Variables
  5. 13.13 Parameters
  6. 13.14 Using i in For Loops
  7. 13.15 Extended Loop Control
  8. 13.16 If Statements
  9. 13.17 If/ Else Statements
  10. 13.18 While Loops
  11. 13.19 Putting Together Control Structures
ATP.PD.7.b
Test, trace and debug to refine code.
  1. 1.13 Control Structures Example
  2. 1.16 Karel Challenges
  3. 13.4 For Loops
  4. 13.10 Top Down Design
  5. 13.13 Parameters
  6. 13.16 If Statements
  7. 13.17 If/ Else Statements
  8. 13.18 While Loops
ATP.PD.7.c
Identify procedures that utilize parameters.
  1. 13.13 Parameters
AI.P.7.a
Give examples of how intelligent agents combine information from multiple sensors to react to an input.
AI.P.7.b
Describe how edge detectors can be composed to form more complex feature detectors, e.g., for letters or shapes.
AI.P.7.c
Illustrate the concept of feature extraction from images by simulating an edge detector.
AI.RR.7.a
Compare several algorithms that could be used to solve a specific type of reasoning problem.
AI.ML.7.a
Model how unsupervised learning finds patterns in unlabeled data to identify how machine learning takes place.
AI.ML.7.b
Create a dataset for training a decision tree classifier or predictor to explore the impact that different feature encodings have on the decision tree.
AI.NI.7.a
Curate a dataset to train a language-processing algorithm to create a program that incorporates voice commands.
AI.NI.7.b
Identify the components of a chatbot and explain how each component contributes to the chatbot’s human-like responses.
AI.SI.7.a
Identify and explain the effect training data has on the accuracy of an artificial intelligence system to uncover bias in training data.
AI.SI.7.b
Identify and explain the problems of classification in the supervised artificial intelligence context to create data sets that are inclusive and accurate.
IC.Cu.7.a
Compare current technologies from the present to the past to evaluate the effect on people's everyday activities.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
IC.Cu.7.b
Evaluate various technologies to identify issues of bias and accessibility.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
IC.Cu.7.c
Identify and explore careers related to the field of computer science.
  1. 15.3 Impact of Cybersecurity
IC.Cu.7.d
Explain how computing impacts innovation in other fields.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
IC.SI.7.a
Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
  3. 9.1 Digital Footprint and Reputation
  4. 9.2 Cyberbullying
  5. 15.3 Impact of Cybersecurity
IC.SLE.7.a
Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
  3. 15.4 The CIA Triad
IC.SLE.7.b
Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
IC.SLE.7.c
Evaluate the development of new technologies in communication, entertainment and business to understand the impact.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
IC.SLE.7.d
Provide appropriate credit when using resources or artifacts that are not our own.
  1. 9.6 Creative Credit & Copyright
IC.SLE.7.e
Explain the connection between the longevity of data on the internet, personal online identity and personal privacy.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security