Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Middle School Technology Applications Grade 6

36

Standards in this Framework

20

Standards Mapped

55%

Mapped to Course

Standard Lessons
126.17.c.1A
decompose real-world problems into structured parts by using visual representation
126.17.c.1B
analyze the patterns and sequences found in visual representations such as learning maps, concept maps, or other representations of data
  1. 2.2 A Day at the Park
126.17.c.1C
define abstraction and distinguish between generalized information and specific information in the context of solving a problem or completing a task
126.17.c.1D
design a plan collaboratively using visual representation to document a problem, possible solutions, and an expected timeline for the development of a coded solution
126.17.c.1E
analyze different techniques used in debugging and apply them to an algorithm
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.1 Introduction to Karel
126.17.c.1F
analyze the benefits of using iteration (code and sequence repetition) in algorithms
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 5.5 For Loops
  4. 5.8 While Loops
126.17.c.2A
define and label variables that relate to their programming or algorithm
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
126.17.c.2B
use a design process to create block-based and text-based programs that include sequences, loops, conditionals, and events to solve an everyday problem
  1. 8.10 Project: Animate an Emoji
126.17.c.3A
resolve challenges in design processes independently using goal setting and personal character traits such as demonstrating courage and confidence
126.17.c.3B
discuss and implement a design process using digital tools to compare, contrast, and evaluate student-generated outcomes;
126.17.c.3C
identify how the design process is used in various industries
126.17.c.4A
discuss how changes in technology throughout history have impacted various areas of study
  1. 4.1 History of Computing
  2. 6.3 Impact of the Internet
126.17.c.4B
discuss how global trends impact the development of technology
126.17.c.4C
transfer current knowledge to the learning of newly encountered technologies
  1. 4.7 The Future of Computing
126.17.c.5A
demonstrate how data can be represented in Boolean expression
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 5.6 Conditional Statements
126.17.c.5B
discuss and use advanced search strategies, including keywords, Boolean operators, and limiters
  1. 7.5 Information Literacy
126.17.c.6
use digital tools to transform data in order to identify and discuss trends and make inferences
126.17.c.7
use digital tools to communicate and display data from a product or process to inform an intended audience
  1. 7.8 Project: Public Service Announcement
126.17.c.8A
identify the impact of a digital footprint
  1. 7.1 Digital Footprint and Reputation
126.17.c.8B
create formal and informal digital communications using appropriate digital etiquette
126.17.c.8C
collaborate on digital platforms such as recording a video conference presentation using appropriate formal and informal digital etiquette
  1. 7.8 Project: Public Service Announcement
126.17.c.9A
adhere to local acceptable use policy (AUP) and practice safe, ethical, and positive online behaviors
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
  3. 7.3 Internet Safety
126.17.c.9B
discuss and define intellectual property and associated terms, including copyright law, permission, fair use, creative commons, open source, and public domain
  1. 4.6 Ethics and Legal Considerations
  2. 7.6 Creative Credit & Copyright
126.17.c.9C
create citations and cite sources for a variety of digital forms of intellectual property
  1. 7.6 Creative Credit & Copyright
  2. 7.8 Project: Public Service Announcement
126.17.c.9D
describe how information can be exaggerated or misrepresented online
  1. 7.5 Information Literacy
126.17.c.10A
identify real-world cybersecurity problems such as phishing, malware, password attacks, identity theft, and hacking
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
126.17.c.10B
identify various methods of cyberbullying such as harassment, impersonation, and cyberstalking
126.17.c.11
create and design files in various formats such as text, graphics, video, and audio files
126.17.c.12A
apply appropriate technology terminology such as cloud applications, input, output, and basic programming
  1. 1.1 Karel's Coding Environment
  2. 3.1 Intro to Tracy's Grid World
  3. 4.3 Hardware
  4. 4.4 Cloud Computing
126.17.c.12B
identify effective file management strategies such as file naming conventions, local and remote locations, backup, hierarchy, folder structure, file conversion, tags, and emerging digital organizational strategies
126.17.c.12C
select and use the appropriate platform and tools to complete a specific task or project
  1. 7.8 Project: Public Service Announcement
126.17.c.12D
demonstrate improvement in speed and accuracy as measured by words per minute when applying correct keyboarding techniques
126.17.c.12E
select and use appropriate shortcuts within applications
126.17.c.12F
use help sources to research application features and solve software issues
126.17.c.12G
identify types of local and remote data storage such as cloud architecture or local server
  1. 4.4 Cloud Computing
126.17.c.12H
use productivity tools found in spread sheet, word processing, and publication applications to create digital artifacts such as reports, graphs, and charts