Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia 7

15

Standards in this Framework

12

Standards Mapped

80%

Mapped to Course

Standard Lessons
7.1
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively, a) combining control structures such as if-statements and loops including compound conditionals; and b) creating clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values.
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 13.4 For Loops
  8. 13.11 Variables
  9. 13.12 User Input
  10. 13.14 Using i in For Loops
  11. 13.15 Extended Loop Control
  12. 13.16 If Statements
  13. 13.17 If/ Else Statements
  14. 13.18 While Loops
  15. 13.19 Putting Together Control Structures
7.2
The student will document programs to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 1.15 How to Indent Your Code
  3. 4.2 Structure of an HTML Page
  4. 13.6 Comments
7.3
The student will distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 13.19 Putting Together Control Structures
7.4
The student will decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 13.10 Top Down Design
7.5
The student will describe how the Internet connects devices and networks all over the world. Exclusion: Specific devices used to implement the Internet are beyond the scope of these standards.
  1. 7.2 Internet Hardware
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
7.6
The student will explain how physical and digital security measures protect electronic information.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
  3. 15.4 The CIA Triad
7.7
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
  3. 15.2 What is Cybersecurity?
  4. 15.3 Impact of Cybersecurity
  5. 15.4 The CIA Triad
7.8
The student will discuss the correctness of a model representing a system by comparing the model’s generated results with data that were observed in the system being modeled.
7.9
The student will refine computational models based on the data they have generated.
7.10
The student will explain how advances in technology have contributed to Virginia’s prosperity and role in the global economy.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
7.11
The student will describe the development of new technologies in communication, entertainment, and business and their impact on American life.
  1. 7.7 The Impact of the Internet
  2. 8.1 Project: The Effects of the Internet
7.12
The student will explore careers related to the Internet.
7.13
The student will outline the advantages and disadvantages of transmitting information over the Internet, including speed, reliability, cost and security.
  1. 7.5 Routing
  2. 7.6 Packets and Protocols
  3. 7.7 The Impact of the Internet
  4. 9.4 Privacy & Security
7.14
The student will explain why protocols are necessary in data transmission. Model the role of protocols in transmitting data across networks and the Internet.
  1. 7.6 Packets and Protocols
7.15
The student will model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination.
  1. 4.13 Viewing Websites
  2. 7.6 Packets and Protocols