Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Middle School Technology Applications Grade 7

36

Standards in this Framework

19

Standards Mapped

52%

Mapped to Course

Standard Lessons
126.18.c.1A
decompose real-world problems into structured parts using flowcharts;
126.18.c.1B
analyze the patterns and sequences found in flowcharts
  1. 5.7 If/Else Statements
  2. 5.9 Karel Challenges
126.18.c.1C
identify abstraction and analyze how an algorithm the student created can be generalized to solve additional problems
126.18.c.1D
design a plan collaboratively using flowcharts to document a problem, possible solutions, and an expected timeline for the development of a coded solution
126.18.c.1E
analyze different techniques used in debugging and apply them to an algorithm
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.1 Introduction to Karel
126.18.c.1F
analyze the benefits of using iteration (code and sequence repetition) in algorithms
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 5.5 For Loops
  4. 8.4 The Draw Loop
  5. 9.7 Program Structure
126.18.c.2A
manipulate and rename variables and describe different data types
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
126.18.c.2B
use a software design process to create text-based programs with nested loops that address different subproblems within a real-world contex
126.18.c.3A
resolve challenges in design processes independently using goal setting and personal character traits such as demonstrating responsibility and advocating for self appropriately;
126.18.c.3B
discuss and implement a design process that includes planning and selecting digital tools to develop and refine a prototype or model through trial and error
126.18.c.3C
identify how the design process is used in various industries
126.18.c.4A
explain how changes in technology throughout history have impacted various areas of study
  1. 4.1 History of Computing
  2. 4.7 The Future of Computing
  3. 6.3 Impact of the Internet
126.18.c.4B
explain how global trends impact the development of technology
126.18.c.4C
transfer current knowledge to the learning of newly encountered technologies
  1. 4.7 The Future of Computing
126.18.c.5A
demonstrate how data can be represented in a binary number systems
126.18.c.5B
evaluate advanced search strategies, including keywords, Boolean operators, and limiters
  1. 7.5 Information Literacy
126.18.c.6
use digital tools in order to transform data to analyze trends and make inferences and predictions
126.18.c.7
use digital tools to communicate and display data from a product or process to inform or persuade an intended audience
  1. 7.8 Project: Public Service Announcement
126.18.c.8A
classify actions as having a positive or negative effect on a digital footprint
  1. 7.1 Digital Footprint and Reputation
126.18.c.8B
create and revise formal and informal communications using a feedback process and appropriate digital etiquette
126.18.c.8C
collaborate on digital platforms such as recording a video conference presentation using appropriate formal and informal digital etiquette
  1. 7.8 Project: Public Service Announcement
126.18.c.9A
adhere to local acceptable use policy (AUP) and practice and model safe, ethical, and positive online behaviors
  1. 7.1 Digital Footprint and Reputation
  2. 7.2 Cyberbullying
  3. 7.3 Internet Safety
126.18.c.9B
explain the importance of intellectual property laws, including the benefits of protection for content owners, and the consequences of violating these laws
  1. 7.6 Creative Credit & Copyright
126.18.c.9C
create citations and cite sources for a variety of digital forms of intellectual property
  1. 7.6 Creative Credit & Copyright
126.18.c.9D
evaluate how various types of media, including social media, and technology can be used to exaggerate and misrepresent information
  1. 7.5 Information Literacy
126.18.c.10A
describe and model ways to protect oneself from real-world cybersecurity attacks;
  1. 6.4 Cybersecurity
  2. 7.4 Privacy & Security
126.18.c.10B
analyze the negative impacts of cyberbullying on the victim and the bully
  1. 7.2 Cyberbullying
126.18.c.11
choose a variety of digital tools to create, share, and communicate digital artifacts.
  1. 7.8 Project: Public Service Announcement
126.18.c.12A
demonstrate proficiency in the appropriate use of technology terminology in projects through team collaboration and communication
  1. 6.7 Project: Steganography
126.18.c.12B
demonstrate effective file management strategies such as file naming conventions, local and remote locations, backup, hierarchy, folder structure, file conversion, tags, and emerging digital organizational strategies with assistance
126.18.c.12C
select and use appropriate platform and tools, including selecting and using software or hardware for a defined task
126.18.c.12D
demonstrate improvement in speed and accuracy as measured by words per minute when applying correct keyboarding techniques
126.18.c.12E
select and use appropriate shortcuts within applications
126.18.c.12F
research and test potential solutions to solve hardware and software problems
  1. 4.3 Hardware
126.18.c.12G
use a variety of types of local and remote data storage to store or share data such as cloud architecture or local server
126.18.c.12H
select and use productivity tools found in spread sheet, word processing, and publication applications to create digital artifacts such as reports, graphs, and charts with increasing complexity