Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming 6-8

25

Standards in this Framework

14

Standards Mapped

56%

Mapped to Course

Standard Lessons
8.CS.D.01
Recommend improvements to the design of computing devices based on an analysis of how a variety of users interact with the device.
  1. 10.4 Final Project
8.CS.HS.01
Design and refine a project that combines hardware and software components to collect and exchange data.
  1. 7.1 For Loops
  2. 7.2 While Loops
  3. 7.3 Operators
  4. 7.4 If/Else Statements
  5. 7.5 Functions
  6. 10.1 micro:bit Challenges
  7. 10.2 Explore a New Sensor
  8. 10.3 Follow a Step-by-Step Project
  9. 10.4 Final Project
8.CS.T.01
Systematically identify, resolve, and document increasingly complex software and hardware problems with computing devices and their components.
8.NI.NCO.01
Model the role of protocols in transmitting data across networks and the internet (e.g., explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered).
8.NI.C.01
Critique physical and digital procedures that could be implemented to protect electronic data/information.
8.NI.C.02
Apply multiple methods of encryption to model the secure transmission of data.
8.DA.S.01
Represent data using multiple encoding schemes (e.g., ASCII, binary).
8.DA.CVT.01
Using computational tools, transform collected data to make it more useful and reliable.
  1. 10.2 Explore a New Sensor
8.DA.IM.01
Refine computational models based on generated data.
  1. 10.2 Explore a New Sensor
8.AP.A.01
Create flowcharts and pseudocode to design algorithms to solve complex problems
  1. 2.3 Comments & Pseudocode
8.AP.V.01
Using grade appropriate content and complexity, create clearly named variables that represent different data types and perform operations on their values.
  1. 2.4 Variables
  2. 7.3 Operators
8.AP.C.01
Using grade appropriate content and complexity, design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 7.1 For Loops
  2. 7.2 While Loops
  3. 7.3 Operators
  4. 7.4 If/Else Statements
  5. 10.1 micro:bit Challenges
8.AP.M.01
Using grade appropriate content and complexity, decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 2.3 Comments & Pseudocode
8.AP.M.02
Using grade appropriate content and complexity, create procedures with parameters to organize code and make it easier to reuse.
  1. 7.5 Functions
8.AP.PD.01
Using grade appropriate content and complexity, seek and incorporate feedback from team members and users to refine a solution to a problem.
  1. 10.4 Final Project
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
8.AP.PD.03
Systematically test and refine programs using a range of test cases.
  1. 7.2 While Loops
  2. 7.4 If/Else Statements
  3. 10.1 micro:bit Challenges
8.AP.PD.04
Using grade appropriate content and complexity, document programs in order to make them easier to follow, test, and debug.
  1. 2.3 Comments & Pseudocode
  2. 10.3 Follow a Step-by-Step Project
8.AP.PD.05
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 10.1 micro:bit Challenges
  2. 10.4 Final Project
8.IC.C.01
Describe impacts associated with computing technologies that affect people's everyday activities and career options.
8.IC.C.02
Describe issues of bias and accessibility in the design of technologies.
8.IC.SI.01
Using grade appropriate content and complexity, collaborate using tools to connect with peers when creating a computational artifact.
  1. 10.1 micro:bit Challenges
  2. 10.4 Final Project
8.IC.SI.02
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
8.IC.SLE.01
Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
8.IC.SLE.02
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.