Please enable JavaScript to use CodeHS

Montana 6-8 Framework


Standard Description
CS.AP.6-8.1 use algorithms to address complex problems; Lessons
CS.AP.6-8.2 create clearly named variables that represent different data types and perform operations on their values; Lessons
CS.AP.6-8.3 develop programs that combine control structures, including nested loops and compound conditionals; Lessons
CS.AP.6-8.4 decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs; Lessons
CS.AP.6-8.5 create procedures with parameters to organize code and make it easier to reuse; Lessons
CS.AP.6-8.6 seek and incorporate feedback from team members and users to refine a solution that meets user needs; Lessons
CS.AP.6-8.7 incorporate existing code, media, and libraries into original programs, and give attribution; Lessons
CS.AP.6-8.8 systematically test and refine programs using a range of test cases; Lessons
CS.AP.6-8.9 distribute tasks and maintain a project timeline when collaboratively developing computational artifacts; and Lessons
CS.AP.6-8.10 document programs in order to make them easier to follow, test, and debug. Lessons
CS.CS.6-8.1 recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices; Lessons
CS.CS.6-8.2 design projects that combine hardware and software components to collect and exchange data; and Lessons
CS.CS.6-8.3 systematically identify and fix problems with computing devices and their components. Lessons
CS.DA.6-8.1 collect data using computational tools and transform the data to make it more useful and reliable; Lessons
CS.DA.6-8.2 represent data using multiple formats; and Lessons
CS.DA.6-8.3 refine computational models based on the data they have generated. Lessons
CS.IC.6-8.1 compare tradeoffs associated with computing technologies that affect people's everyday activities and career options in Montana and the world, urban, rural, and reservation communities; Lessons
CS.IC.6-8.2 discuss issues of bias and accessibility in the design of existing technologies; Lessons
CS.IC.6-8.3 collaborate with other contributors when creating a computational artifact; and Lessons
CS.IC.6-8.4 describe tradeoffs between allowing information, personal or intellectual, to be public and keeping information private and secure. Lessons
CS.NI.6-8.1 explain how physical and digital security measures protect electronic information; Lessons
CS.NI.6-8.2 apply multiple methods of encryption to demonstrate how to securely transmit information; and Lessons
CS.NI.6-8.3 demonstrate how information is broken down and transmitted through multiple devices over networks and the internet and reassembled at the destination. Lessons