Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 8

46

Standards in this Framework

23

Standards Mapped

50%

Mapped to Course

Standard Lessons
CS.D.8.a
Evaluate the advantages and limitations of existing computing devices to recommend design improvements based on analysis of how users interact with the device.
  1. 4.8 Project: Design the Computer of Tomorrow
CS.HS.8.a
Design projects that combine hardware and software components that could complete a task.
  1. 8.8 Mouse Data
  2. 8.9 Keyboard Data
CS.T.8.a
Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
  1. 4.3 Hardware
NI.N.8.a
Model the role of hardware components to diagram the infrastructure of networks and the internet (including cloud servers).
NI.N.8.b
Model protocols (i.e., rules) and explain why they are used to transmit data across networks and the internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
NI.N.8.c
Explain how a system responds when information is lost to understand the effect it has on the transferred information.
NI.C.8.a
Explain how physical and digital security measures are used to protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
NI.C.8.b
Compare and contrast the effects of different types of malware to determine strategies for how to protect devices.
  1. 6.4 Cybersecurity
NI.C.8.c
Compare and contrast examples of various threat actors, such as nation-states, cyber terrorist groups, organized crime or hacktivists.
NI.C.8.d
Explore and differentiate examples of complex encryption methods, e.g., Vigenère, Bacon’s cipher and Enigma.
NI.IOT.8.a
Explore career pathways related to IoT to identify careers associated with the computer science field.
  1. 4.7 The Future of Computing
NI.IOT.8.b
Model the lifecycle of information in the IoT including data gathering, transmission, reception and analysis to recreate a realworld scenario.
  1. 4.5 Internet of Things
DA.DCS.8.a
Interpret digital data collection tools to manage information effectively.
DA.DCS.8.b
Identify data storage systems to define how data is stored and accessed.
DA.DCS.8.c
Create a logical file structure to organize data in different storage systems to support individual and collaborative work.
  1. 13.4 Let's Add Pages!
  2. 13.5 Creating a Sitemap
DA.VC.8.a
Evaluate data to construct a model or representation.
DA.VC.8.b
Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.8.a
Create and analyze models and simulations to accurately hypothesize a real-world situation.
ATP.A.8.a
Create multiple pseudocode to solve a multi-step process and justify the most efficient solution.
  1. 5.3 Functions
  2. 5.4 Multiple Functions
  3. 5.7 If/Else Statements
ATP.VDR.8.a
Analyze test cases and determine the range of valid solutions.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
ATP.VDR.8.b
Use a data structure to represent a collection.
ATP.CS.8.a
Use and apply decisions and loops in a program to solve a problem.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.6 Conditional Statements
  5. 5.7 If/Else Statements
  6. 5.8 While Loops
  7. 5.9 Karel Challenges
  8. 8.4 The Draw Loop
  9. 8.5 Color Transitions
  10. 8.6 Shape Transformations
  11. 8.7 Direction
  12. 8.8 Mouse Data
  13. 8.9 Keyboard Data
  14. 8.10 Project: Animate an Emoji
ATP.M.8.a
Decompose problems and subproblems into parts to facilitate the design, implementation and review of complex programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
ATP.PD.8.a
Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 5.7 If/Else Statements
  4. 5.8 While Loops
  5. 5.9 Karel Challenges
  6. 8.4 The Draw Loop
  7. 8.5 Color Transitions
  8. 8.6 Shape Transformations
  9. 8.7 Direction
  10. 8.8 Mouse Data
  11. 8.9 Keyboard Data
  12. 8.10 Project: Animate an Emoji
ATP.PD.8.b
Systematically test and refine programs using a range of test cases.
  1. 5.8 While Loops
  2. 5.9 Karel Challenges
  3. 9.4 Intro to JavaScript
  4. 9.5 Variables
ATP.PD.8.c
Use procedures that utilize parameters to pass values.
  1. 3.4 Under the Sea
  2. 8.1 Getting Started
  3. 8.2 Color
  4. 8.3 Variables
  5. 8.4 The Draw Loop
  6. 8.5 Color Transitions
  7. 8.6 Shape Transformations
  8. 8.7 Direction
  9. 8.8 Mouse Data
  10. 8.9 Keyboard Data
  11. 8.10 Project: Animate an Emoji
AI.P.8.a
Explain how sounds and images are represented digitally in a computer to explain how sensor data is stored in a computer.
AI.P.8.b
Describe how a vision system might exhibit cultural bias if it lacked knowledge of objects not found in the culture of the people who created it to create inclusive and equitable data sets.
AI.P.8.c
Illustrate how sequences of words can be recognized as phrases, even if some of the words are unclear, by looking at how the words fit together to create a text recognition program.
AI.RR.8.a
Model the process of solving a graph-search problem using breadth-first search to draw a search tree.
AI.ML.8.a
Explain the difference between training and using a reasoning model to identify how a machine learns.
AI.ML.8.b
Illustrate how objects in an image can be segmented and labeled to construct a training set for object recognition.
AI.ML.8.c
Explain how the choice of training data shapes the behavior of the classifier to identify how bias can be introduced if the training set is not properly balanced.
AI.NI.8.a
Create a program, individually and collaboratively, that implements a language processing algorithm to create a functional chatbot.
AI.NI.8.b
Critically analyze and discuss features that make an entity “intelligent,” including discussing differences between human, animal and machine intelligence to identify how machine intelligence varies from natural intelligence.
AI.SI.8.a
Identify and explain how the composition of training data affects the outcome of a supervised artificial intelligence system to identify bias in data sets.
AI.SI.8.b
Identify bias potential in the design of artificial intelligence systems and describe how to utilize inclusive AI design to prevent algorithmic bias.
IC.Cu.8.a
Compare current technologies and how they affect the current economy.
IC.Cu.8.b
Propose potential guidelines/standards/criteria to positively impact bias and accessibility in the design of future technologies.
IC.Cu.8.c
Identify and explore careers related to the field of computer science.
  1. 4.7 The Future of Computing
IC.Cu.8.d
Explain how computing impacts innovation in other fields.
  1. 6.3 Impact of the Internet
IC.SI.8.a
Evaluate the impacts of electronic communication on personal relationships to be able to evaluate differences between face-to-face and electronic communication.
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
IC.SLE.8.a
Explain user privacy concerns related to the collection and generation of data that may not be evident through automated processes.
  1. 4.6 Ethics and Legal Considerations
  2. 7.4 Privacy & Security
  3. 7.7 Hacking Ethics
IC.SLE.8.b
Describe the social and economic implications of privacy in the context of safety, law or ethics to be global digital citizens.
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
IC.SLE.8.c
Identify ethical and legal security measures used to protect electronic information.
  1. 4.6 Ethics and Legal Considerations
  2. 6.4 Cybersecurity
  3. 6.5 The CIA Triad
  4. 7.3 Internet Safety
  5. 7.4 Privacy & Security
  6. 7.7 Hacking Ethics
IC.SLE.8.d
Provide appropriate credit when using resources or artifacts that are not our own.
  1. 7.6 Creative Credit & Copyright