# Oklahoma 6-8 Standards Mapping

to

## Tech Apps and Coding

63 Standards in this Framework 51 Standards Mapped 80% Mapped to Course

Standard Lessons
6.CS.D.01 Evaluate existing computing devices and recommend improvements to design based on analysis of personal interaction with the device.
6.CS.HS.01 Identify ways that hardware and software are combined to collect and exchange data.
1. 2.3 Software
2. 2.4 Hardware
3. 14.1 For Loops
4. 14.2 While Loops
5. 14.3 Operators
6. 14.4 If/Else Statements
7. 14.5 Functions
8. 15.1 micro:bit Challenges
9. 15.2 Explore a New Sensor
6.CS.T.01 Identify increasingly complex software and hardware problems with computing devices and their components.
6.NI.NCO.01 Model a simple protocol for transferring information using packets.
1. 9.6 Packets and Protocols
6.NI.C.01 Identify existing cybersecurity concerns with the Internet and systems it uses.
1. 13.2 What is Cybersecurity?
2. 13.3 Impact of Cybersecurity
6.NI.C.02 Explain the importance of secured websites and describe how one method of encryption works.
1. 5.1 Cryptography, Cryptology, Cryptanalysis
2. 5.3 Basic Crypto Systems: Caesar Cipher
3. 5.4 Basic Crypto Systems: Cracking Caesar
4. 5.5 Basic Crypto Systems: Vigenere Cipher
6.DA.S.01 Identify how the same data can be represented in multiple ways.
1. 8.1 Intro to Digital Information
2. 8.2 Number Systems
3. 8.3 Encoding Text with Binary
4. 8.4 Pixel Images
6.DA.CVT.01 Collect data using computational tools and transform the data to make it more useful.
1. 15.2 Explore a New Sensor
6.DA.IM.01 Use models and simulations to formulate, refine, and test hypotheses.
6.AP.A.01 Use an existing algorithm in natural language or pseudocode to solve complex problems.
1. 1.10 Top Down Design
2. 1.19 Putting Together Control Structures
4. 11.9 For Loops
5. 11.11 If/Else Statements
6. 11.12 While Loops in Karel
7. 11.13 Control Structures Example
8. 11.14 More Karel Examples and Testing
9. 11.16 Karel Challenges
6.AP.C.01 Develop programs that utilize combinations of repetition, conditionals, and the manipulation of variables representing different data types.
1. 1.4 For Loops
2. 1.11 Variables
3. 1.16 If Statements
4. 1.17 If/ Else Statements
5. 1.18 While Loops
6. 1.19 Putting Together Control Structures
7. 3.4 Variables
8. 11.9 For Loops
9. 11.11 If/Else Statements
10. 11.12 While Loops in Karel
11. 11.13 Control Structures Example
12. 11.14 More Karel Examples and Testing
13. 11.16 Karel Challenges
14. 14.1 For Loops
15. 14.2 While Loops
16. 14.4 If/Else Statements
17. 15.1 micro:bit Challenges
6.AP.M.01 Decompose problems into parts to facilitate the design, implementation, and review of programs.
1. 1.10 Top Down Design
3. 11.6 Top Down Design and Decomposition in Karel
6.AP.PD.01 Seek and incorporate feedback from team members to refine a solution to a problem.
1. 7.6 Test
2. 15.4 Final Project
6.AP.PD.02 Incorporate existing code, media, and libraries into original programs and give attribution.
1. 11.8 Super Karel
6.AP.PD.03 Test and refine programs using teacher provided inputs.
1. 1.4 For Loops
2. 1.8 Functions
3. 1.16 If Statements
4. 1.17 If/ Else Statements
5. 1.18 While Loops
6. 1.19 Putting Together Control Structures
7. 14.1 For Loops
8. 14.2 While Loops
9. 14.4 If/Else Statements
10. 15.1 micro:bit Challenges
6.AP.PD.04 Break down tasks and follow an individual timeline when developing a computational artifact.
1. 1.19 Putting Together Control Structures
2. 15.1 micro:bit Challenges
3. 15.2 Explore a New Sensor
4. 15.3 Follow a step-by-step project
5. 15.4 Final Project
6.AP.PD.05 Document text-based programs in order to make them easier to follow, test, and debug.
6.IC.C.01 Explain how computing impacts people's' everyday activities.
1. 9.7 The Impact of the Internet
6.IC.C.02 Identify and discuss the technology proficiencies needed in the classroom and the workplace, and how to meet the needs of diverse users.
1. 9.7 The Impact of the Internet
6.IC.SI.01 Individually and collaboratively develop and conduct an online survey that seeks input from a broad audience. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
6.IC.SLE.01 Differentiate between appropriate and inappropriate content on the Internet, and identify unethical and illegal online behavior.
1. 4.2 Cyberbullying
7.CS.D.01 Evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device.
7.CS.HS.01 Evaluate and recommend improvements to software and hardware combinations used to collect and exchange data.
7.CS.T.01 Identify and fix increasingly complex software and hardware problems with computing devices and their components.
7.NI.NCO.01 Explain how a system responds when a packet is lost and the effect it has on the transferred information.
1. 9.6 Packets and Protocols
7.NI.C.01 Explain how to protect electronic information, both physical (e.g. hard drive) and digital, identify cybersecurity concerns and options to address issues with the Internet and the systems it uses.
7.NI.C.02 Identify and explain two or more methods of encryption used to ensure and secure the transmission of information.
1. 5.1 Cryptography, Cryptology, Cryptanalysis
2. 5.3 Basic Crypto Systems: Caesar Cipher
3. 5.4 Basic Crypto Systems: Cracking Caesar
7.DA.S.01 Create multiple representations of data.
1. 8.1 Intro to Digital Information
2. 8.2 Number Systems
3. 8.3 Encoding Text with Binary
4. 8.4 Pixel Images
7.DA.CVT.01 Collect data using computational tools and transform the data to make it more useful and reliable.
1. 15.2 Explore a New Sensor
7.DA.IM.01 Discuss the correctness of a model representing a system by comparing the modelâ€™ s generated results with observed data from the modeled system.
7.AP.A.01 Select and modify an existing algorithm in natural language or pseudocode to solve complex problems.
1. 1.10 Top Down Design
2. 1.19 Putting Together Control Structures
7.AP.C.01 Develop programs that utilize combinations of repetition, compound conditionals, and the manipulation of variables representing different data types.
1. 1.11 Variables
2. 1.17 If/ Else Statements
3. 1.18 While Loops
4. 1.19 Putting Together Control Structures
5. 3.4 Variables
6. 11.9 For Loops
7. 11.11 If/Else Statements
8. 11.12 While Loops in Karel
9. 11.13 Control Structures Example
10. 14.1 For Loops
11. 14.2 While Loops
12. 14.4 If/Else Statements
13. 15.1 micro:bit Challenges
7.AP.M.01 Decompose problems into parts to facilitate the design, implementation, and review of increasingly complex programs.
1. 1.10 Top Down Design
4. 11.13 Control Structures Example
7.AP.PD.01 Seek and incorporate feedback from team members and users to refine a solution to a problem.
1. 7.6 Test
2. 15.4 Final Project
7.AP.PD.02 Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
1. 11.8 Super Karel
7.AP.PD.03 Test and refine programs using a variety of student created inputs.
1. 1.19 Putting Together Control Structures
2. 15.1 micro:bit Challenges
3. 15.2 Explore a New Sensor
4. 15.4 Final Project
7.AP.PD.04 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
1. 1.19 Putting Together Control Structures
2. 15.1 micro:bit Challenges
3. 15.4 Final Project
7.AP.PD.05 Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.
7.IC.C.01 Explain how computing impacts innovation in other fields.
1. 2.5 Future of Computing
2. 9.7 The Impact of the Internet
7.IC.C.02 Relate the distribution of computing resources in a global society to issues of equity, access, and power.
1. 9.7 The Impact of the Internet
7.IC.SI.01 Individually and collaboratively use advanced tools to design and create online content (e.g., digital portfolio, multimedia, blog, web page). Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
1. 4.1 Digital Footprint and Reputation
7.IC.SLE.01 Explain the connection between the longevity of data on the Internet, personal online identity, and personal privacy.
1. 4.1 Digital Footprint and Reputation
2. 4.4 Privacy & Security
8.CS.D.01 Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device.
8.CS.HS.01 Design and refine projects that combine hardware and software components to collect and exchange data.
1. 15.1 micro:bit Challenges
2. 15.2 Explore a New Sensor
3. 15.3 Follow a step-by-step project
4. 15.4 Final Project
8.CS.T.01 Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.
8.NI.NCO.01 Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.
1. 9.6 Packets and Protocols
8.NI.C.01 Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.
1. 4.4 Privacy & Security
2. 13.2 What is Cybersecurity?
3. 13.3 Impact of Cybersecurity
8.NI.C.02 Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.
1. 5.1 Cryptography, Cryptology, Cryptanalysis
8.DA.S.01 Analyze multiple methods of representing data and choose the most appropriate method for representing data.
1. 8.1 Intro to Digital Information
2. 8.2 Number Systems
3. 8.3 Encoding Text with Binary
4. 8.4 Pixel Images
6. 15.2 Explore a New Sensor
8.DA.CVT.01 Develop, implement, and refine a process that utilizes computational tools to collect and transform data to make it more useful and reliable.
1. 15.2 Explore a New Sensor
8.DA.IM.01 Refine computational models based on the data generated by the models.
8.AP.A.01 Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems.
2. 1.10 Top Down Design
4. 11.9 For Loops
5. 11.11 If/Else Statements
6. 11.12 While Loops in Karel
7. 11.13 Control Structures Example
8. 11.14 More Karel Examples and Testing
9. 11.16 Karel Challenges
8.AP.C.01 Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.
1. 1.8 Functions
2. 1.11 Variables
3. 1.19 Putting Together Control Structures
4. 3.4 Variables
5. 11.9 For Loops
6. 11.11 If/Else Statements
7. 11.12 While Loops in Karel
8. 11.13 Control Structures Example
9. 11.14 More Karel Examples and Testing
10. 11.16 Karel Challenges
11. 14.1 For Loops
12. 14.2 While Loops
13. 14.4 If/Else Statements
14. 14.5 Functions
15. 15.1 micro:bit Challenges
8.AP.M.01 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.
1. 1.10 Top Down Design
3. 11.6 Top Down Design and Decomposition in Karel
8.AP.PD.01 Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.
1. 7.6 Test
2. 15.4 Final Project
8.AP.PD.02 Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
1. 11.8 Super Karel
8.AP.PD.03 Systematically test and refine programs using a range of student created inputs.
1. 1.19 Putting Together Control Structures
2. 15.1 micro:bit Challenges
3. 15.4 Final Project
8.AP.PD.04 Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.
1. 15.1 micro:bit Challenges
2. 15.4 Final Project
8.AP.PD.05 Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.