Please enable JavaScript to use CodeHS

Rhode Island 6-8 Standards Mapping

to

Computing Ideas (Lovelace)

31 Standards in this Framework 16 Standards Mapped 51% Mapped to Course


Standard Lessons
2-CT-A-1 Use diagrams and/or pseudocode to plan, analyze, solve and/or code complex problems as algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.13 Control Structures Example
  3. 1.14 More Karel Examples and Testing
  4. 1.16 Karel Challenges
  5. 14.10 Top Down Design
  6. 14.11 Variables
  7. 14.19 Putting Together Control Structures
2-CT-V-1 Create clearly named variables that represent different data. Perform operations on data stored in variables.
  1. 14.11 Variables
  2. 14.12 User Input
  3. 14.13 Parameters
2-CT-D-1 Organize data into an appropriate data structure in a program.
2-CT-C-1 Design programs that combine control structures, including nested loops and compound conditionals.
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 14.19 Putting Together Control Structures
2-CT-M-1 Decompose computational problems to facilitate the design and implementation of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.7 Commenting Your Code
  3. 1.13 Control Structures Example
  4. 1.14 More Karel Examples and Testing
  5. 1.16 Karel Challenges
  6. 14.10 Top Down Design
  7. 14.19 Putting Together Control Structures
2-CT-M-2 Create procedures with parameters to organize code and make it easier to reuse.
  1. 14.13 Parameters
2-CT-CD-1 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-CT-CD-2 Test and debug a program to ensure it runs as intended.
2-CT-CD-3 Describe choices made during development of computational artifacts.
  1. 14.6 Comments
2-CSN-H-1 Identify improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CSN-HS-1 Design projects that combine hardware and software components to collect and use data to perform a function.
2-CSN-T-1 Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
2-CSN-N-1 Model the role of protocols in transmitting data across networks and the Internet.
  1. 7.6 Packets and Protocols
2-CY-R-1 Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
  3. 16.2 What is Cybersecurity?
2-CY-R-2 Describe social engineering attacks and the potential risks associated with them.
  1. 16.3 Impact of Cybersecurity
2-CY-R-3 Describe risks of using free and open services.
  1. 9.4 Privacy & Security
2-CY-S-1 Explain physical and digital security measures that protect electronic information.
  1. 9.4 Privacy & Security
2-CY-S-2 Demonstrate how multiple methods of encryption provide secure transmission of information.
2-CY-RP-1 Describe which actions to take and not to take when an application or device reports a problem or behaves unexpectedly.
2-DA-CVT-1 Collect data using computational tools or online sources and transform the data to make it more useful and reliable.
2-DA-IM-1 Create and refine computational models based on generated or gathered data.
2-DA-IM-2 Discuss potential visible biases that could exist in a dataset and how these biases could affect analysis conclusions.
2-DA-ST-1 Store, retrieve, and share data to collaborate, using a cloud-based system.
2-DA-ST-2 Describe various low-level data transformations and identify which result in a loss of information.
2-DL-CU-1 Use software tools to create artifacts that engage users over time.
2-DL-SDI-1 Conduct searches over multiple types of digital information.
  1. 9.5 Information Literacy
  2. 10.1 Project: Public Service Announcement
2-DL-US-1 Describe the different formats of software components that support common tasks in software tools.
2-RC-CU-1 Compare and contrast tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  1. 7.7 The Impact of the Internet
  2. 16.2 What is Cybersecurity?
2-RC-CU-2 Discuss issues of bias and accessibility in the design of existing technologies.
  1. 7.7 The Impact of the Internet
2-RC-SLE-1 Discuss how laws control use and access to intellectual property, and mandate broad access to information technologies.
  1. 9.6 Creative Credit & Copyright
2-RC-SI-1 Collaborate and strategize with many online contributors when creating a computational or digital artifact.
  1. 10.1 Project: Public Service Announcement