Please enable JavaScript to use CodeHS

Standards Mapping

for Tennessee Middle School


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Analyze the advantages and limitations of existing computing devices to improve user experience.
Demonstrate skills in identifying and solving hardware and software problems that can occur during regular usage.
  1. 2.6 Troubleshooting
Apply computational thinking to a variety of problems across multiple disciplines.
Understand how collaboration is essential to computer science and apply collaborative skills to develop computational solutions.
Use clearly named variables of various data types to create generalized algorithms.
  1. 1.11 Variables
  2. 3.4 Variables
Create algorithms which include methods of controlling the flow of computation using “if…then… else” type conditional statements to perform different operations depending on the values of inputs.
  1. 1.16 If Statements
  2. 1.17 If/ Else Statements
  3. 1.19 Putting Together Control Structures
Identify algorithms that make use of sequencing, selection, or iteration.
  1. 1.4 For Loops
  2. 1.14 Using i in For Loops
  3. 1.18 While Loops
  4. 1.19 Putting Together Control Structures
  5. 1.20 Using Data to Refine Game Mechanics
Describe how algorithmic processes and automation increase efficiency
  1. 1.8 Functions
  2. 1.14 Using i in For Loops
  3. 1.15 Extended Loop Control
Represent data using multiple encoding schemes, such as decimal, binary, Unicode, Morse code, Shorthand, student-created codes.
  1. 8.1 Intro to Digital Information
  2. 8.2 Number Systems
  3. 8.3 Encoding Text with Binary
  4. 8.4 Pixel Images
  5. 8.5 Hexadecimal
  6. 8.6 Pixel Colors!
Refine computational models based on the data they have generated.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
Collect, analyze, transform, and refine computational data to make it more useful and reliable.
  1. 7.2 Empathy
Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. 2.6 Troubleshooting
Differentiate between secure and non-secure websites and applications including how they affect and use personal data
  1. 4.4 Privacy & Security
Describe the causes and effects of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.
  1. 6.6 Copyright
Compare and contrast common methods of securing data and cybersecurity.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 13.4 The CIA Triad
Analyze different modes of social engineering and their effectiveness.
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.10 Top Down Design
Create procedures with parameters that hide the complexity of a task and can be reused to solve similar tasks.
  1. 1.13 Parameters
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
Provide proper attribution when incorporating existing code, media, and libraries into original programs.
  1. 6.6 Copyright
Use the iterative design process to systematically test and refine programs to improve performance and eliminate errors.
  1. 1.19 Putting Together Control Structures
  2. 1.20 Using Data to Refine Game Mechanics
  3. 7.1 Intro to Design Thinking
  4. 7.2 Empathy
  5. 7.4 Ideate
  6. 7.5 Prototype
  7. 7.6 Test
Document programs using comments and/or README files to make them easier to follow, test, and debug.
  1. 1.6 Comments
Design a function using a programming language.
  1. 1.8 Functions
Identify and evaluate the impacts computer science innovations have had on our society.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 9.7 The Impact of the Internet
Identify how computational systems are being used to collect and analyze information both public and private and understand the benefits and disadvantages of these systems for the user and developer
Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.
  1. 4.1 Digital Footprint and Reputation
Discuss digital globalization and Internet censorship.
Investigate a variety of education pathways and career options that utilize computational thinking and/or computer science skills across the state of Tennessee and the world.