Please enable JavaScript to use CodeHS

Virginia 6 Standards Mapping

to

Fundamentals of Cybersecurity

13 Standards in this Framework 7 Standards Mapped 53% Mapped to Course


Standard Lessons
6.1 The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively, a) combining control structures such as if-statements and loops; and b) creating clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 21.1 Challenge Problems
  5. 22.1 Booleans
  6. 22.2 Logical Operators
  7. 22.3 Comparison Operators
  8. 22.4 If Statements
  9. 22.5 For Loops in JavaScript
  10. 22.6 General For Loops
  11. 22.7 For Loop Practice
  12. 22.8 Random Numbers
  13. 22.9 While Loops
  14. 22.10 Loop and a Half
6.2 The student will trace programs to predict outcomes and debug (correct and improve) for correctness.
  1. 4.6 Organizational Techniques
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 21.1 Challenge Problems
  6. 22.4 If Statements
  7. 22.5 For Loops in JavaScript
  8. 22.6 General For Loops
  9. 22.7 For Loop Practice
  10. 22.9 While Loops
6.3 The student will seek and incorporate feedback from team members and users to refine a program that meets user needs.
6.4 The student will incorporate existing code, media, and libraries into original programs, and give attribution.
6.5 The student will design projects that combine hardware and software components to collect and exchange data.
6.6 The student will identify physical and digital security measures used protect electronic information.
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
6.7 The student will explain how binary sequences are used to represent digital data. Exclusion: Conversions between binary and base-ten numbers are beyond the scope of these standards.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6.8 The student will collect data using computational tools then clean and organize to make it more useful and reliable.
6.9 The student will explain the insight and knowledge gained from digitally processed data by using appropriate visualizations.
6.10 The student will use models and simulations to formulate, refine, and test hypotheses.
6.11 The student will explain how computing has impacted innovations in other fields.
  1. 10.10 Impact of the Internet
6.12 The student will explore careers related to data.
  1. 8.4 Databases
6.13 The student will explain why the speed of data transmission across the Internet can vary depending on the type of data being transmitted.
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
  4. 11.5 Network Options