Please enable JavaScript to use CodeHS

Standards Mapping

for California 6-8

24

Standards in this Framework

Standard Lessons
6-8.AP.10
Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
6-8.AP.11
Create clearly named variables that store data, and perform operations on their contents.
6-8.AP.12
Design and iteratively develop programs that combine control structures and use compound conditions.
6-8.AP.13
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
6-8.AP.14
Create procedures with parameters to organize code and make it easier to reuse.
6-8.AP.15
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6-8.AP.16
Incorporate existing code, media, and libraries into original programs, and give attribution.
6-8.AP.17
Systematically test and refine programs using a range of test cases.
6-8.AP.18
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.19
Document programs in order to make them easier to use, read, test, and debug.
6-8.CS.1
Design modifications to computing devices in order to improve the ways users interact with the devices.
6-8.CS.2
Design a project that combines hardware and software components to collect and exchange data.
6-8.CS.3
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
6-8.DA.7
Represent data in multiple ways.
6-8.DA.8
Collect data using computational tools and transform the data to make it more useful.
6-8.DA.9
Test and analyze the effects of changing variables while using computational models.
6-8.IC.20
Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
6-8.IC.21
Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.22
Collaborate with many contributors when creating a computational artifact.
6-8.IC.23
Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
6-8.IC.24
Compare tradeoffs between allowing information to be public and keeping information private and secure.
6-8.NI.4
Model the role of protocols in transmitting data across networks and the Internet.
6-8.NI.5
Explain potential security threats and security measures to mitigate threats.
6-8.NI.6
Apply multiple methods of information protection to model the secure transmission of information.