Please enable JavaScript to use CodeHS

Standards Mapping

for Rhode Island 6-8

31

Standards in this Framework

22

Standards Mapped

70%

Mapped to Course

Standard Lessons
2-CT-A-1
Use diagrams and/or pseudocode to plan, analyze, solve and/or code complex problems as algorithms.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 8.1 Getting Started
  5. 8.2 Color
  6. 8.3 Variables
  7. 8.4 The Draw Loop
  8. 8.5 Color Transitions
  9. 8.6 Shape Transformations
  10. 8.7 Direction
  11. 8.8 Mouse Data
  12. 8.9 Keyboard Data
  13. 8.10 Project: Animate an Emoji
2-CT-V-1
Create clearly named variables that represent different data. Perform operations on data stored in variables.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
  4. 9.9 Your First Sprites
  5. 9.10 The Physics of Sprites
2-CT-D-1
Organize data into an appropriate data structure in a program.
  1. 8.3 Variables
  2. 8.4 The Draw Loop
  3. 8.5 Color Transitions
  4. 8.6 Shape Transformations
  5. 8.7 Direction
  6. 8.8 Mouse Data
  7. 8.9 Keyboard Data
  8. 8.10 Project: Animate an Emoji
2-CT-C-1
Design programs that combine control structures, including nested loops and compound conditionals.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 8.4 The Draw Loop
  10. 8.5 Color Transitions
  11. 8.6 Shape Transformations
  12. 8.7 Direction
  13. 8.8 Mouse Data
  14. 8.9 Keyboard Data
  15. 8.10 Project: Animate an Emoji
2-CT-M-1
Decompose computational problems to facilitate the design and implementation of programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 9.4 Intro to JavaScript
  10. 9.5 Variables
  11. 9.7 Program Structure
2-CT-M-2
Create procedures with parameters to organize code and make it easier to reuse.
  1. 3.4 Under the Sea
2-CT-CD-1
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-CT-CD-2
Test and debug a program to ensure it runs as intended.
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.2 Karel's World
  4. 5.3 Functions
  5. 5.4 Multiple Functions
  6. 5.6 Conditional Statements
  7. 5.7 If/Else Statements
  8. 5.8 While Loops
  9. 5.9 Karel Challenges
  10. 9.4 Intro to JavaScript
  11. 9.5 Variables
  12. 9.10 The Physics of Sprites
2-CT-CD-3
Describe choices made during development of computational artifacts.
  1. 5.4 Multiple Functions
2-CSN-H-1
Identify improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 4.8 Project: Design the Computer of Tomorrow
2-CSN-HS-1
Design projects that combine hardware and software components to collect and use data to perform a function.
  1. 4.5 Internet of Things
  2. 8.8 Mouse Data
  3. 8.9 Keyboard Data
2-CSN-T-1
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
  1. 4.3 Hardware
2-CSN-N-1
Model the role of protocols in transmitting data across networks and the Internet.
  1. 6.2 The Need for Protocols
2-CY-R-1
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 7.4 Privacy & Security
2-CY-R-2
Describe social engineering attacks and the potential risks associated with them.
2-CY-R-3
Describe risks of using free and open services.
  1. 7.2 Cyberbullying
  2. 7.7 Hacking Ethics
2-CY-S-1
Explain physical and digital security measures that protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.6 Encryption
  3. 7.3 Internet Safety
  4. 7.4 Privacy & Security
2-CY-S-2
Demonstrate how multiple methods of encryption provide secure transmission of information.
  1. 6.6 Encryption
2-CY-RP-1
Describe which actions to take and not to take when an application or device reports a problem or behaves unexpectedly.
2-DA-CVT-1
Collect data using computational tools or online sources and transform the data to make it more useful and reliable.
2-DA-IM-1
Create and refine computational models based on generated or gathered data.
2-DA-IM-2
Discuss potential visible biases that could exist in a dataset and how these biases could affect analysis conclusions.
  1. 4.6 Ethics and Legal Considerations
2-DA-ST-1
Store, retrieve, and share data to collaborate, using a cloud-based system.
2-DA-ST-2
Describe various low-level data transformations and identify which result in a loss of information.
2-DL-CU-1
Use software tools to create artifacts that engage users over time.
2-DL-SDI-1
Conduct searches over multiple types of digital information.
  1. 7.5 Information Literacy
2-DL-US-1
Describe the different formats of software components that support common tasks in software tools.
  1. 4.2 Software
2-RC-CU-1
Compare and contrast tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  1. 4.7 The Future of Computing
  2. 6.3 Impact of the Internet
  3. 7.1 Digital Footprint and Reputation
2-RC-CU-2
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 4.6 Ethics and Legal Considerations
  2. 4.8 Project: Design the Computer of Tomorrow
2-RC-SLE-1
Discuss how laws control use and access to intellectual property, and mandate broad access to information technologies.
  1. 4.6 Ethics and Legal Considerations
  2. 7.6 Creative Credit & Copyright
2-RC-SI-1
Collaborate and strategize with many online contributors when creating a computational or digital artifact.