Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Middle School Technology Applications Grade 8

38

Standards in this Framework

14

Standards Mapped

36%

Mapped to Course

Standard Lessons
126.19.c.1A
decompose real-world problems into structured parts using pseudocode
126.19.c.1B
analyze the patterns and sequences found in pseudocode and identify its variables
126.19.c.1C
practice abstraction by developing a generalized algorithm that can solve different types of problems
126.19.c.1D
design a plan collaboratively using pseudocode to document a problem, possible solutions, and an expected timeline for the development of a coded solution
126.19.c.1E
develop, compare, and improve algorithms for a specific task to solve a problem
126.19.c.1F
analyze the benefits of using iteration (code and sequence repetition) in algorithms
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 5.5 For Loops
  4. 5.8 While Loops
126.19.c.2A
construct named variables with multiple data types and perform operations on their values
  1. 3.4 Under the Sea
  2. 9.5 Variables
  3. 9.9 Your First Sprites
126.19.c.2B
use a software design process to create text-based programs with nested loops that address different subproblems within a real-world context
126.19.c.2C
modify and implement previously written code to develop improved programs
  1. 9.10 The Physics of Sprites
126.19.c.3A
demonstrate innovation in a design process using goal setting and personal character traits, including demonstrating calculated risk-taking and tolerance
126.19.c.3B
discuss and implement a design process that includes planning, selecting digital tools to develop, test, and evaluate design limitations, and refining a prototype or model
126.19.c.3C
identify how the design process is used in various industries
  1. 9.2 Unpacking a Game
126.19.c.4A
evaluate how changes in technology throughout history have impacted various areas of study
  1. 4.1 History of Computing
  2. 4.7 The Future of Computing
  3. 6.3 Impact of the Internet
  4. 15.1 History of Computing
  5. 15.7 The Future of Computing (Duplicate)
126.19.c.4B
evaluate and predict how global trends impact the development of technology
126.19.c.4C
transfer current knowledge to the learning of newly encountered technologies
  1. 4.7 The Future of Computing
  2. 15.7 The Future of Computing (Duplicate)
126.19.c.5A
compare and contrast data types, including binary, integers, real numbers, Boolean data, and text-based representations
126.19.c.5B
apply appropriate search strategies, including keywords, Boolean operators, and limiters, to achieve a specified outcome that includes a variety of file formats
126.19.c.6
use digital tools in order to transform data, analyze trends, and predict possibilities and develop steps for the creation of an innovative process or product
126.19.c.7
use digital tools to communicate and publish data from a product or process to persuade an intended audience
  1. 7.8 Project: Public Service Announcement
126.19.c.8A
analyze the importance of managing a digital footprint and how a digital footprint can affect the future
  1. 7.1 Digital Footprint and Reputation
126.19.c.8B
create and publish a formal digital communication for a global audience using appropriate digital etiquette
126.19.c.8C
collaborate and publish for a global audience on digital platforms such as recording and editing videos using appropriate formal and informal digital etiquette
126.19.c.9A
adhere to local acceptable use policy (AUP) and practice and advocate for safe, ethical, and positive online behaviors
126.19.c.9B
adhere to appropriate intellectual property law when creating digital products
  1. 7.6 Creative Credit & Copyright
126.19.c.9C
create citations and cite sources for a variety of digital forms of intellectual property
  1. 7.6 Creative Credit & Copyright
126.19.c.9D
evaluate the bias of digital information sources, including websites
  1. 7.5 Information Literacy
126.19.c.10A
analyze real-world scenarios to identify cybersecurity threats and propose ways to prevent harm
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
126.19.c.10B
evaluate scenarios or case studies to identify warning signs of a cyberbullying victim such as withdrawal or lack of sleep and predict the outcomes for both the victim and the bully
126.19.c.11A
combine various file formats for a specific project or audience
126.19.c.11B
share and seek feedback on files in various formats, including text, raster and vector graphics, video, and audio files
126.19.c.12A
integrate use of appropriate technology terminology in scholarly inquiry and dialogue such as classroom discussion and written samples
126.19.c.12B
implement effective file management strategies independently, including file naming conventions, local and remote locations, backup, hierarchy, folder structure, file conversion, tags, and emerging digital organizational strategies
126.19.c.12C
select and use appropriate platform and tools, including selecting and using software or hardware to transfer data
126.19.c.12D
demonstrate improvement in speed and accuracy as measured by words per minute when applying correct keyboarding techniques
126.19.c.12E
select and use appropriate shortcuts within applications
126.19.c.12F
apply appropriate troubleshooting techniques and seek technical assistance as needed
  1. 9.4 Intro to JavaScript
  2. 9.5 Variables
126.19.c.12G
compare types of local and remote data storage such as cloud architecture or local server and select the appropriate type of storage to store and share data
  1. 4.4 Cloud Computing
  2. 15.4 Cloud Computing (Duplicate)
126.19.c.12H
select and use productivity tools found in spread sheet, word processing, and publication applications to create digital artifacts, including reports, graphs, and charts, with increasing complexity