Please enable JavaScript to use CodeHS

Standards Mapping

for Kansas 6-8


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device. (CSTA Practice - P3)
Model a computing system involving multiple considerations and potential tradeoffs of software and hardware, such as functionality, cost, size, speed, accessibility, and aesthetics (CSTA Practice - P5)
  1. 10.1 Internal Components
  2. 10.2 Peripheral Devices
Know and apply grade-level appropriate skills with input and output devices. (CSTA Practice - P7)
  1. 10.2 Peripheral Devices
Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.(CSTA Practice - P6)
  1. 11.1 Methodology
  2. 11.2 Support Practice
Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.(CSTA Practice - P4)
  1. 9.8 Packets & Protocols
Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7)
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.11 Types of SQLi and Prevention
Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.(CSTA Practice - P4)
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
Analyze multiple methods of representing data and choose the most appropriate method for representing data.(CSTA Practice - P4)
  1. 9.3 Data Representation
Develop, implement, and refine a process that utilizes computational tools to collect meaningful data. (CSTA Practice - P6)
Develop, implement, and refine a process to make data more useful and reliable.(CSTA Practice - P6)
Refine computational models based on the data generated by the models.(CSTA Practice - P5, P4)
Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems. (CSTA Practice - P4)
  1. 4.6 Organizational Techniques
Create programs using variables with purposeful and thoughtful naming conventions for identifiers to improve program readability. (CSTA Practice - P5)
  1. 4.1 Programming Concepts
Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.(CSTA Practice - P5)
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.(CSTA Practice - P3)
Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.(CSTA Practice - P2, P1)
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution. (CSTA Practice - P4, P5, P7)
Systematically test and refine programs using a range of student created inputs.(CSTA Practice - P6)
Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.(CSTA Practice - P2)
Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.(CSTA Practice - P7)
  1. 4.6 Organizational Techniques
Describe the trade-offs associated with computing technologies (e.g. automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.(CSTA Practice - P7)
  1. 9.10 Impact of the Internet
Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability (CSTA Practice - P1)
Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).(CSTA Practice - P2, P5)
  1. 2.3 Internet Safety
  2. 3.1 Project: Public Service Announcement
Identify and describe how the prominent figures in computer science have impacted and/or progressed the field. (CSTA Practice - P3)
Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.(CSTA Practice - P7)
  1. 2.7 Hacking Ethics
Formulate a computer-science based solution for a problem or issue by gathering input from local / regional industry members (CSTA Practice - P2, P5)