Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming 6-8

25

Standards in this Framework

10

Standards Mapped

40%

Mapped to Course

Standard Lessons
8.CS.D.01
Recommend improvements to the design of computing devices based on an analysis of how a variety of users interact with the device.
8.CS.HS.01
Design and refine a project that combines hardware and software components to collect and exchange data.
  1. 3.5 Internet of Things
8.CS.T.01
Systematically identify, resolve, and document increasingly complex software and hardware problems with computing devices and their components.
  1. 3.3 Hardware
8.NI.NCO.01
Model the role of protocols in transmitting data across networks and the internet (e.g., explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered).
8.NI.C.01
Critique physical and digital procedures that could be implemented to protect electronic data/information.
8.NI.C.02
Apply multiple methods of encryption to model the secure transmission of data.
8.DA.S.01
Represent data using multiple encoding schemes (e.g., ASCII, binary).
8.DA.CVT.01
Using computational tools, transform collected data to make it more useful and reliable.
8.DA.IM.01
Refine computational models based on generated data.
8.AP.A.01
Create flowcharts and pseudocode to design algorithms to solve complex problems
  1. 4.7 If/Else Statements
  2. 4.8 While Loops
  3. 4.9 Karel Challenges
8.AP.V.01
Using grade appropriate content and complexity, create clearly named variables that represent different data types and perform operations on their values.
8.AP.C.01
Using grade appropriate content and complexity, design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 4.5 For Loops
  4. 4.6 Conditional Statements
  5. 4.7 If/Else Statements
  6. 4.8 While Loops
  7. 4.9 Karel Challenges
8.AP.M.01
Using grade appropriate content and complexity, decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 4.3 Functions
  3. 4.4 Multiple Functions
  4. 4.8 While Loops
  5. 4.9 Karel Challenges
8.AP.M.02
Using grade appropriate content and complexity, create procedures with parameters to organize code and make it easier to reuse.
8.AP.PD.01
Using grade appropriate content and complexity, seek and incorporate feedback from team members and users to refine a solution to a problem.
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
8.AP.PD.03
Systematically test and refine programs using a range of test cases.
  1. 1.3 The Rabbit Chase
  2. 1.4 Lost in Space
  3. 4.8 While Loops
  4. 4.9 Karel Challenges
8.AP.PD.04
Using grade appropriate content and complexity, document programs in order to make them easier to follow, test, and debug.
  1. 4.4 Multiple Functions
  2. 4.7 If/Else Statements
8.AP.PD.05
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
8.IC.C.01
Describe impacts associated with computing technologies that affect people's everyday activities and career options.
  1. 3.7 The Future of Computing
8.IC.C.02
Describe issues of bias and accessibility in the design of technologies.
  1. 3.6 Ethics and Legal Considerations
8.IC.SI.01
Using grade appropriate content and complexity, collaborate using tools to connect with peers when creating a computational artifact.
8.IC.SI.02
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
8.IC.SLE.01
Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
8.IC.SLE.02
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 3.6 Ethics and Legal Considerations