Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia 8

Clear selection Print / Download

13

Standards in this Framework

12

Standards Mapped

92%

Mapped to Course

Standard Lessons
8.1
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 5.1 Introduction to Karel
  4. 5.2 Karel's World
  5. 5.3 Functions
  6. 5.4 Multiple Functions
  7. 5.5 For Loops
  8. 5.6 Conditional Statements
  9. 5.7 If/Else Statements
  10. 5.8 While Loops
  11. 5.9 Karel Challenges
  12. 8.7 Direction
  13. 8.8 Mouse Data
  14. 8.9 Keyboard Data
  15. 8.10 Project: Animate an Emoji
8.2
The student will systematically test and refine programs using a range of test cases.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 9.4 Intro to JavaScript
  5. 9.5 Variables
8.3
The student will explain how effective communication between participants is required for successful collaboration when developing programs.
  1. 8.10 Project: Animate an Emoji
8.4
The student will use flowcharts and/or pseudo code to address complex problems as algorithms.
  1. 5.4 Multiple Functions
  2. 5.7 If/Else Statements
  3. 5.8 While Loops
  4. 5.9 Karel Challenges
  5. 8.10 Project: Animate an Emoji
8.5
The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system.
  1. 4.3 Hardware
  2. 15.3 Hardware (Duplicate)
8.6
The student will identify physical and digital security measures used protect electronic information.
  1. 6.4 Cybersecurity
  2. 7.3 Internet Safety
  3. 7.4 Privacy & Security
  4. 7.7 Hacking Ethics
8.7
The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 7.7 Hacking Ethics
8.8
The student will explain the difference between a model and a simulation, and create computational models to conduct simulations.
8.9
The student will describe tradeoffs between allowing information to be public, and keeping information private.
  1. 4.6 Ethics and Legal Considerations
  2. 6.5 The CIA Triad
  3. 7.1 Digital Footprint and Reputation
  4. 7.4 Privacy & Security
  5. 15.6 Ethics and Legal Considerations (Duplicate)
8.10
The student will evaluate online and print sources for appropriateness and credibility.
  1. 7.6 Creative Credit & Copyright
8.11
The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity.
  1. 6.4 Cybersecurity
  2. 7.7 Hacking Ethics
8.12
The student will explore careers related to the field of cybersecurity.
  1. 4.7 The Future of Computing
  2. 15.7 The Future of Computing (Duplicate)
8.13
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 7.8 Project: Public Service Announcement