Please enable JavaScript to use CodeHS

Standards Framework

for North Dakota 6-8

66

Standards in this Framework

Standard Description
6.NI.1 Explain how data is sent across networks.
7.NI.1 Model how data is sent from one computer to another across networks.
8.NI.1 Investigate how data is sent from one computer to another across networks.
6.HS.1 Use hardware and/or software to complete a task.
7.HS.1 Compare and contrast hardware and/or software options to complete a task.
8.HS.1 Choose appropriate device/hardware/software to complete a task.
6.HS.2 Use software features to accomplish a goal.
6.HS.3 Organize, store, and retrieve digital information with guidance.
7.HS.3 Organize, store, and retrieve digital information with minimal guidance.
8.HS.3 Organize, store, and retrieve digital information efficiently.
6.HS.4 Identify threats to technology systems.
7.HS.4 Describe threats to technology systems.
8.HS.4 Describe ways to protect against threats to technology systems.
6.HS.5 Identify security measures to protect technology systems.
7.HS.5 Explain how security measures protect technology systems.
8.HS.5 Compare and contrast security measures used to protect technology systems.
6.T.1 Apply basic troubleshooting strategies.
6.PSA.1 Identify and test an algorithm to solve a problem.
7.PSA.1 Modify and test an algorithm to solve a problem.
8.PSA.1 Create and test an algorithm to solve a problem across disciplines.
6.PSA.2 Debug a program that includes sequencing, loops, or conditionals.
6.PSA.3 Compare and contrast the efficiencies of multiple solutions to a task.
6.DCA.1 Collect and analyze data to support a claim.
7.DCA.1 Represent data, in more than one way, to defend your claim.
8.DCA.1 Represent data from multiple sources in order to defend or refute a claim.
6.DD.1 Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
7.DD.1 Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
8.DD.1 Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
6.A.1 Use a variety of strategies to refine and revise search results.
8.A.1 Use advanced search strategies to locate information online.
6.E.1 Evaluate information and its sources.
7.E.1 Independently, evaluate information and its sources using student selected processes and strategies.
6.C.1 Repurpose or remix original works following fair use guidelines.
6.IP.1 With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
7.IP.1 With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
8.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain.
6.IP.2 Cite a variety of sources using the appropriate format.
6.IP.3 Describe negative consequences of piracy and plagiarism.
7.IP.3 Identify strategies to avoid personal works and the works of others from being pirated and plagiarized.
8.IP.3 Debate the risks and benefits of sharing personal works online.
6.IC.1 Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility.
7.IC.1 Compare and contrast the impacts of technology, including bias and accessibility.
8.IC.1 Explore and create solutions for the negative impacts of technology, including bias and accessibility.
6.SI.1 Use collaborative technology.
7.SI.1 Use collaborative technology to gather and share information.
8.SI.1 Use collaborative technology to communicate information to a specific audience.
6.SI.2 Identify how social interactions can impact a person’s self-image.
6.SE.1 Identify steps for responding to uncomfortable situations when interacting online.
6.SE.2 Identify basic methods to maintain digital privacy and security.
7.SE.2 Identify a variety of methods to maintain digital privacy and security.
8.SE.2 Identify advanced methods to maintain digital privacy and security.
6.SE.3 Recognize that data-collection technology can be used to track navigation online.
6.SE.4 Identify threats to personal cybersecurity.
7.SE.4 Describe how to respond to threats to personal cybersecurity.
8.SE.4 Discuss the consequences of identity theft.
6.RU.1 Identify different forms of cyberbullying.
7.RU.1 Describe different forms of cyberbullying and the effects on all parties involved.
6.RU.2 Identify strategies to stop cyberbullying.
7.RU.2 Identify strategies to prevent and stop cyberbullying.
8.RU.2 Identify strategies to prevent and stop cyberbullying.
6.RU.3 Use approprite digital etiquette in a variety of situations.
6.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
7.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
8.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
6.DI.1 Describe personal online usage and determine how it affects identity on- and offline.
7.DI.1 Evaluate how digital identity can impact a person now and in the future.