Please enable JavaScript to use CodeHS

Standards Mapping

for New York 7-8

34

Standards in this Framework

24

Standards Mapped

70%

Mapped to Course

Standard Lessons
7-8.CT.1
Compare the results of alternative models or simulations to determine and evaluate how the input data and assumptions change the results.
  1. 1.12 User Input
7-8.CT.10
Document the iterative design process of developing a computational artifact that incorporates user feedback and preferences.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
7-8.CT.2
Collect and use digital data in a computational artifact.
  1. 7.2 Empathy
7-8.CT.3
Refine and visualize a data set in order to persuade an audience.
7-8.CT.4
Write a program using functions or procedures whose names or other documentation convey their purpose within the larger task.
  1. 1.8 Functions
  2. 1.10 Top Down Design
  3. 1.11 Variables
  4. 1.19 Putting Together Control Structures
  5. 11.4 Functions in Karel
  6. 11.6 Top Down Design and Decomposition in Karel
7-8.CT.5
Identify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences.
  1. 1.8 Functions
  2. 1.10 Top Down Design
  3. 1.13 Parameters
  4. 1.19 Putting Together Control Structures
7-8.CT.6
Design, compare and refine algorithms for a specific task or within a program.
  1. 1.19 Putting Together Control Structures
  2. 11.6 Top Down Design and Decomposition in Karel
  3. 11.14 More Karel Examples and Testing
7-8.CT.7
Design or remix a program that uses a variable to maintain the current value of a key piece of information.
  1. 1.11 Variables
  2. 1.19 Putting Together Control Structures
7-8.CT.8
Develop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem.
  1. 1.13 Parameters
  2. 1.14 Using i in For Loops
  3. 1.15 Extended Loop Control
  4. 1.16 If Statements
  5. 1.17 If/ Else Statements
  6. 1.18 While Loops
  7. 1.19 Putting Together Control Structures
  8. 11.10 If Statements
  9. 11.11 If/Else Statements
  10. 11.12 While Loops in Karel
  11. 11.13 Control Structures Example
  12. 11.14 More Karel Examples and Testing
  13. 11.16 Karel Challenges
7-8.CT.9
Read and interpret code to predict the outcome of various programs that involve conditionals and repetition for the purposes of debugging.
  1. 1.19 Putting Together Control Structures
  2. 1.20 Using Data to Refine Game Mechanics
  3. 11.16 Karel Challenges
7-8.CY.1
Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
  1. 4.4 Privacy & Security
7-8.CY.2
Describe physical, digital, and behavioral safeguards that can be employed in different situations.
  1. 4.3 Internet Safety
  2. 4.4 Privacy & Security
7-8.CY.3
Describe trade-offs of implementing specific security safeguards.
  1. 4.4 Privacy & Security
7-8.CY.4
Describe the limitations of cryptographic methods.
  1. 5.4 Basic Crypto Systems: Cracking Caesar
7-8.CY.5
Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly.
7-8.DL.1
Type on a keyboard while demonstrating proper keyboarding technique, with increased speed and accuracy.
7-8.DL.2
Communicate and collaborate with others using a variety of digital tools to create and revise a collaborative product.
  1. 10.1 Project: The Effects of the Internet
7-8.DL.3
Compare types of search tools, choose a search tool for effectiveness and efficiency, and evaluate the quality of search tools based on returned results.
7-8.DL.4
Select and use digital tools to create, revise, and publish digital artifacts.
  1. 4.5 Project: Public Service Announcement
  2. 10.1 Project: The Effects of the Internet
7-8.DL.5
Transfer knowledge of technology in order to explore new technologies.
7-8.DL.6
Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.
  1. 4.1 Digital Footprint and Reputation
7-8.DL.7
Describe safe, appropriate, positive, and responsible online behavior and identify strategies to combat negative online behavior.
  1. 4.2 Cyberbullying
  2. 4.3 Internet Safety
7-8.IC.1
Compare and contrast tradeoffs associated with computing technologies that affect individuals and society.
  1. 9.1 Intro to the Internet
  2. 9.7 The Impact of the Internet
7-8.IC.2
Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
7-8.IC.3
Identify and discuss issues of ethics surrounding computing technologies and current events.
  1. 2.5 Future of Computing
  2. 9.7 The Impact of the Internet
7-8.IC.4
Identify and discuss issues related to the collection and use of public and private data.
7-8.IC.5
Analyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals.
7-8.IC.6
Assess the accessibility of a computing device or software application in terms of user needs.
  1. 7.2 Empathy
7-8.IC.7
Explore a range of computer sciencerelated career paths.
7-8.NSD.1
Design a user interface for a computing technology that considers usability, accessibility, and desirability.
  1. 7.7 Build Your Website!
7-8.NSD.2
Design a project that combines hardware and software components.
  1. 3.2 Setting Up your micro:bit
  2. 3.3 Comments & Pseudocode
  3. 3.4 Variables
7-8.NSD.3
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
  1. 2.6 Troubleshooting
7-8.NSD.4
Design a protocol for transmitting data through a multi-point network.
  1. 9.5 Routing
  2. 9.6 Packets and Protocols
7-8.NSD.5
Summarize how remote data is stored and accessed in a network.