Please enable JavaScript to use CodeHS

Wisconsin 6-8 Standards Mapping

to

Computing Ideas (Lovelace)

46 Standards in this Framework 29 Standards Mapped 63% Mapped to Course


Standard Lessons
AP1.a.6.m Decompose (break down) a computational problem into parts and create solutions for one or more parts.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 14.10 Top Down Design
  3. 14.19 Putting Together Control Structures
AP1.a.7.m Identify how sub-problems could be recombined to create something new (e.g., break down the individual parts that would be needed to program a certain type of game and then show how the parts could be reused in other types of games).
  1. 1.6 Top Down Design and Decomposition in Karel
AP2.a.6.m Develop programs, both independently and collaboratively, which include sequencing with nested loops and multiple branches [Clarification At this level, students may use block-based and/or text- based languages].
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 14.17 If/ Else Statements
  5. 14.19 Putting Together Control Structures
AP2.a.7.m Produce computational artifacts with broad accessibility and usability through careful consideration of diverse needs and wants of the community.
AP2.a.8.m Use an iterative design process (e.g., define the problem; generate ideas; build, test, and improve solutions) to solve computational problems, both independently and collaboratively.
  1. 14.10 Top Down Design
  2. 14.19 Putting Together Control Structures
AP2.a.9.m Create variables that represent different types of data and manipulate their values.
  1. 14.11 Variables
  2. 14.12 User Input
  3. 14.13 Parameters
  4. 14.14 Using i in For Loops
  5. 14.16 If Statements
  6. 14.17 If/ Else Statements
  7. 14.18 While Loops
  8. 14.19 Putting Together Control Structures
AP3.a.3.m Provide proper attribution when code is borrowed or built upon.
AP3.b.5.m Discuss how algorithms have impacted society— both the beneficial and harmful effects.
  1. 7.7 The Impact of the Internet
AP3.b.6.m Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size (e.g., different algorithms solve the same problem, but one might be faster than the other). [Clarification Students are not expected to quantify these differences].
  1. 14.4 For Loops
AP3.b.7.m Modify existing code to change its functionality and discuss the variety of ways in which to do this.
  1. 14.10 Top Down Design
  2. 14.17 If/ Else Statements
AP3.c.1.m Interpret the flow of execution of algorithms and predict their outcomes. [Clarification Algorithms can be expressed using natural language, flow and control diagrams, comments within code, and pseudocode].
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 14.4 For Loops
  5. 14.8 Functions
  6. 14.13 Parameters
  7. 14.14 Using i in For Loops
  8. 14.16 If Statements
  9. 14.17 If/ Else Statements
  10. 14.18 While Loops
  11. 14.19 Putting Together Control Structures
AP3.c.2.m Use documentation regarding code to modify programs.
  1. 14.6 Comments
AP4.a.3.m Define and use functions/ procedures that hide the complexity of a task and can be reused to solve similar tasks. [Clarification Students use and modify, but do not necessarily create, functions or procedures with parameters].
  1. 1.13 Control Structures Example
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 14.8 Functions
  5. 14.13 Parameters
AP5.a.5.m Solicit and integrate peer feedback as appropriate to develop or refine a program.
AP5.b.2.m Analyze team members’ strengths and use them to foster an inclusive computing culture.
AP6.a.3.m Use testing and debugging methods to ensure program correctness and completeness.
  1. 1.14 More Karel Examples and Testing
  2. 14.19 Putting Together Control Structures
AP6.b.2.m Apply a rubric to determine if and how well a program meets objectives.
CS1.a.5.m Justify the suitability of hardware and software chosen to accomplish a task (e.g., comparison of the features of a tablet vs. desktop, selecting which sensors and platform to use in building a robot or developing a mobile app).
  1. 2.3 Software
  2. 2.4 Hardware
CS2.a.3.m Use a systematic process to identify the source of a problem within individual and connected devices (e.g., follow a troubleshooting flow diagram, make changes to software to see if hardware will work, restart device, check connections, swap in working components).
CS3.a.1.m Analyze the relationship between a device's computational components and its capabilities. (e.g., computing systems include not only computers, but also cars, microwaves, smartphones, traffic lights, and flash drives).
CS4.a.1.m Extend or modify existing programs to add simple features and behaviors using different forms of inputs and outputs (e.g., inputs such as sensors, mouse clicks, data sets; outputs such as text, graphics, sounds).
  1. 14.12 User Input
  2. 14.19 Putting Together Control Structures
DA1.a.3.m Represent data using different encoding schemes (e.g., binary, Unicode, Morse code, shorthand, student-created codes).
  1. 6.2 Number Systems
  2. 6.3 Encoding Text with Binary
  3. 6.4 Pixel Images
  4. 6.5 Hexadecimal
DA2.a.3.m Gather and organize multiple quantitative data elements using a computational tool (e.g., spreadsheet software).
DA2.b.3.m Develop a strategy to answer a question by using a computer to manipulate (e.g., sort, total and/or average, chart, graph) and analyze data that has been collected by the class or student.
DA3.a.4.m Describe how different formats of stored data represent tradeoffs between quality and size. [Clarification compare examples of music, text and/or image formats].
DA3.a.5.m Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools (e.g., use an app or spreadsheet form to collect data, decide which data to use or ignore, and choose a visualization method).
DA4.a.4.m Revise computational models to more accurately reflect real-world systems (e.g., ecosystems, epidemics, spread of ideas).
DA4.a.5.m Modify an existing computational model to emphasize key features and relationships within a system. (A model can be used to simulate events, examine theories and inferences, or make predictions).
IC1.a.4.m Provide examples of how computational artifacts and devices impact health and wellbeing, both positively and negatively, locally and globally (e.g., effects of globalization, and automation).
  1. 7.7 The Impact of the Internet
IC1.a.5.m Explain how computer science fosters innovation and can enhance careers and disciplines.
  1. 7.7 The Impact of the Internet
IC1.b.3.m Analyze and present beneficial and harmful effects of personal electronic communication and social electronic communication.
  1. 7.7 The Impact of the Internet
  2. 9.1 Digital Footprint and Reputation
  3. 9.2 Cyberbullying
  4. 9.3 Internet Safety
IC1.b.4.m Describe ways in which the internet impacts global communication and collaborating.
  1. 7.7 The Impact of the Internet
IC2.a.2.m Explain the impact of the digital divide (i.e., uneven access to computing, computing education, and interfaces) on access to critical information.
  1. 7.7 The Impact of the Internet
IC2.b.2.m Critically evaluate and redesign a computational artifact to remove barriers to universal access (e.g., using captions on images, high contrast colors, and/or larger font sizes).
IC2.c.4.m Use the internet ethically and safely to work with a group of people who are not physically near to solve a problem or reach a goal.
IC3.a.2.m Understand laws associated with digital information (e.g., intellectual property, fair use, and Creative Commons).
  1. 9.6 Creative Credit & Copyright
IC3.a.3.m Describe ethical issues that relate to computing devices and networks (e.g., equity of access, security, hacking, intellectual property, copyright, Creative Commons licensing, and plagiarism).
  1. 9.6 Creative Credit & Copyright
IC3.b.4.m Analyze and summarize negative and positive impacts of using data and information to categorize people, predict behavior, and make recommenda- tions based on those predictions (e.g., customizing search results or targeted advertising based on previous browsing history can save search time and limit options at the same time).
NI1.a.4.m Analyze and summarize security risks associated with weak passwords, lack of encryption, insecure transactions, and persistence of data.
  1. 9.4 Privacy & Security
NI1.a.5.m Understand security issues with general computer use.
  1. 9.4 Privacy & Security
NI1.b.2.m Understand security issues with general computer use.
  1. 9.4 Privacy & Security
NI2.a.6.m Simulate how information is transmitted as packets through multiple devices over the internet and networks.
  1. 7.6 Packets and Protocols
NI2.a.7.m Explain, using basic terms, how a wireless or cellular network allows internet information to be transmitted from a server to a user device.
  1. 7.5 Routing
NI2.b.2.m Define the term protocol, provide an example of protocols in daily life, and explain their use on the internet.
  1. 7.6 Packets and Protocols
NI2.c.3.m Explain the hierarchical structure of the Internet Domain Name System (IDNS).
  1. 7.4 DNS
NI2.d.2.m Encode and decode text- based messages using basic algorithms (e.g., shift cipher, substitution cipher).