Please enable JavaScript to use CodeHS

Virginia 8 Standards Mapping

to

Creative Computing (HS)

13 Standards in this Framework 8 Standards Mapped 61% Mapped to Course


Standard Lessons
8.1 The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters.
  1. 2.9 For Loops
  2. 2.10 If Statements
  3. 2.11 If/Else Statements
  4. 2.12 While Loops in Karel
  5. 2.13 Control Structures Example
  6. 2.14 More Karel Examples and Testing
  7. 2.16 Karel Challenges
  8. 3.2 Variables
  9. 3.3 User Input
  10. 3.4 Basic Math in JavaScript
  11. 3.5 Using Graphics in JavaScript
  12. 6.4 For Loops
  13. 6.13 Parameters
  14. 6.14 Using i in For Loops
  15. 6.15 Extended Loop Control
  16. 6.16 If Statements
  17. 6.17 If/ Else Statements
  18. 6.18 While Loops
  19. 6.19 Putting Together Control Structures
8.2 The student will systematically test and refine programs using a range of test cases.
  1. 2.9 For Loops
  2. 2.10 If Statements
  3. 2.11 If/Else Statements
  4. 2.12 While Loops in Karel
  5. 2.13 Control Structures Example
  6. 2.16 Karel Challenges
  7. 3.3 User Input
  8. 3.4 Basic Math in JavaScript
  9. 6.12 User Input
  10. 6.13 Parameters
  11. 6.16 If Statements
  12. 6.17 If/ Else Statements
  13. 6.18 While Loops
  14. 6.19 Putting Together Control Structures
8.3 The student will explain how effective communication between participants is required for successful collaboration when developing programs.
  1. 6.19 Putting Together Control Structures
8.4 The student will use flowcharts and/or pseudo code to address complex problems as algorithms.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 6.10 Top Down Design
8.5 The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system.
  1. 10.2 Computer Organization
  2. 10.3 Software
  3. 10.4 Hardware
8.6 The student will identify physical and digital security measures used protect electronic information.
  1. 13.7 Network Attacks
8.7 The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions.
  1. 13.7 Network Attacks
8.8 The student will explain the difference between a model and a simulation, and create computational models to conduct simulations.
8.9 The student will describe tradeoffs between allowing information to be public, and keeping information private.
8.10 The student will evaluate online and print sources for appropriateness and credibility.
8.11 The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity.
8.12 The student will explore careers related to the field of cybersecurity.
8.13 The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.
  1. 13.7 Network Attacks