Please enable JavaScript to use CodeHS

Standards Mapping

for Tennessee Middle School

28

Standards in this Framework

21

Standards Mapped

75%

Mapped to Course

Standard Lessons
MS.FC.1
Analyze the advantages and limitations of existing computing devices to improve user experience.
MS.FC.2
Demonstrate skills in identifying and solving hardware and software problems that can occur during regular usage.
  1. 2.6 Troubleshooting
MS.FC.3
Apply computational thinking to a variety of problems across multiple disciplines.
MS.FC.4
Understand how collaboration is essential to computer science and apply collaborative skills to develop computational solutions.
MS.AT.1
Use clearly named variables of various data types to create generalized algorithms.
  1. 1.11 Variables
  2. 3.4 Variables
MS.AT.2
Create algorithms which include methods of controlling the flow of computation using “if…then… else” type conditional statements to perform different operations depending on the values of inputs.
  1. 1.16 If Statements
  2. 1.17 If/ Else Statements
  3. 1.19 Putting Together Control Structures
MS.AT.3
Identify algorithms that make use of sequencing, selection, or iteration.
  1. 1.4 For Loops
  2. 1.14 Using i in For Loops
  3. 1.18 While Loops
  4. 1.19 Putting Together Control Structures
  5. 1.20 Using Data to Refine Game Mechanics
MS.AT.4
Describe how algorithmic processes and automation increase efficiency
  1. 1.8 Functions
  2. 1.14 Using i in For Loops
  3. 1.15 Extended Loop Control
MS.DA.1
Represent data using multiple encoding schemes, such as decimal, binary, Unicode, Morse code, Shorthand, student-created codes.
  1. 8.1 Intro to Digital Information
  2. 8.2 Number Systems
  3. 8.3 Encoding Text with Binary
  4. 8.4 Pixel Images
  5. 8.5 Hexadecimal
  6. 8.6 Pixel Colors!
MS.DA.2
Refine computational models based on the data they have generated.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
MS.DA.3
Collect, analyze, transform, and refine computational data to make it more useful and reliable.
  1. 7.2 Empathy
MS.NI.1
Identify and employ appropriate troubleshooting techniques used to solve computing or connectivity issues.
  1. 2.6 Troubleshooting
MS.NI.2
Differentiate between secure and non-secure websites and applications including how they affect and use personal data
  1. 4.4 Privacy & Security
MS.NI.3
Describe the causes and effects of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.
  1. 6.6 Copyright
MS.NI.4
Compare and contrast common methods of securing data and cybersecurity.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 13.4 The CIA Triad
MS.NI.5
Analyze different modes of social engineering and their effectiveness.
MS.PC.1
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.10 Top Down Design
MS.PC.2
Create procedures with parameters that hide the complexity of a task and can be reused to solve similar tasks.
  1. 1.13 Parameters
MS.PC.3
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
MS.PC.4
Provide proper attribution when incorporating existing code, media, and libraries into original programs.
  1. 6.6 Copyright
MS.PC.5
Use the iterative design process to systematically test and refine programs to improve performance and eliminate errors.
  1. 1.19 Putting Together Control Structures
  2. 1.20 Using Data to Refine Game Mechanics
  3. 7.1 Intro to Design Thinking
  4. 7.2 Empathy
  5. 7.4 Ideate
  6. 7.5 Prototype
  7. 7.6 Test
MS.PC.6
Document programs using comments and/or README files to make them easier to follow, test, and debug.
  1. 1.6 Comments
MS.PC.7
Design a function using a programming language.
  1. 1.8 Functions
MS.IC.1
Identify and evaluate the impacts computer science innovations have had on our society.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 9.7 The Impact of the Internet
MS.IC.2
Identify how computational systems are being used to collect and analyze information both public and private and understand the benefits and disadvantages of these systems for the user and developer
MS.IC.3
Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.
  1. 4.1 Digital Footprint and Reputation
MS.IC.4
Discuss digital globalization and Internet censorship.
MS.IC.5
Investigate a variety of education pathways and career options that utilize computational thinking and/or computer science skills across the state of Tennessee and the world.