Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 6

43

Standards in this Framework

24

Standards Mapped

55%

Mapped to Course

Standard Lessons
CS.D.6.a
Identify the benefits and limitations of a given computing device's functions (including individual components) to explain how the functions and components work together to create the computing system.
  1. 4.3 Hardware
CS.HS.6.a
Identify ways that hardware and software work together as a system to collect and exchange data.
  1. 4.2 Software
  2. 4.3 Hardware
  3. 8.8 Mouse Data
  4. 8.9 Keyboard Data
CS.T.6.a
Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
  1. 4.3 Hardware
NI.N.6.a
Identify the role of hardware components to understand the infrastructure of networks and the internet (including cloud servers).
NI.N.6.b
Identify protocols (i.e., rules) and explain why they are used to transmit data across networks and the internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
NI.C.6.a
Identify cybersecurity concerns and measures needed to protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
NI.C.6.b
Identify the different types of malware to understand threats to data security.
  1. 7.7 Hacking Ethics
NI.C.6.c
Identify ways to protect private information.
  1. 6.4 Cybersecurity
  2. 6.5 The CIA Triad
  3. 7.3 Internet Safety
  4. 7.4 Privacy & Security
NI.IOT.6.a
Define and explore aspects of embedded devices, smart devices and intelligent devices and the way they record, observe and mimic human habits.
  1. 4.5 Internet of Things
NI.IOT.6.b
Identify and define blockchains to recognize how every device made has unique identifiers and the weaknesses that allow programmers and hackers to see personally identifiable information.
DA.DCS.6.a
Identify and use an appropriate digital data collection tool to compile information.
DA.DCS.6.b
Select and utilize appropriate file formats to organize collected data.
DA.DCS.6.c
Utilize a file structure to logically organize data to support individual and collaborative work.
DA.VC.6.a
Identify and label patterns in models or representations to infer connections between data sets.
DA.VC.6.b
Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.6.a
Identify and utilize data sets to support or refute a hypothesis.
ATP.A.6.a
Compare and refine multiple algorithms for the same task to determine which is the most efficient.
  1. 5.8 While Loops
ATP.VDR.6.a
Identify unknown values that need to be represented by a variable within a multi-step process.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
ATP.VDR.6.b
Create variables and use them within a multi-step process.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
ATP.CS.6.a
Identify and trace decisions and loops that exist in a multi-step process within a program.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.5 For Loops
  5. 5.7 If/Else Statements
  6. 5.8 While Loops
ATP.M.6.a
Decompose problems into parts to facilitate the design, implementation and review of programs.
  1. 2.2 A Day at the Park
  2. 5.3 Functions
  3. 5.4 Multiple Functions
ATP.PD.6.a
Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 2.1 Quest for the Rosetta Stone
  2. 2.2 A Day at the Park
  3. 5.4 Multiple Functions
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 5.7 If/Else Statements
  7. 5.8 While Loops
  8. 5.9 Karel Challenges
  9. 8.3 Variables
  10. 8.4 The Draw Loop
  11. 8.5 Color Transitions
  12. 8.6 Shape Transformations
  13. 8.7 Direction
  14. 8.8 Mouse Data
  15. 8.9 Keyboard Data
  16. 8.10 Project: Animate an Emoji
ATP.PD.6.b
Test and trace to debug and refine code
  1. 1.2 Karel Error Messages
  2. 3.2 Debugging with Error Messages
  3. 5.4 Multiple Functions
  4. 5.8 While Loops
  5. 5.9 Karel Challenges
  6. 9.4 Intro to JavaScript
  7. 9.5 Variables
AI.P.6.a
Give examples of different types of computer perception that can extract meaning from sensory signals to understand how computers collect information from sensors.
AI.P.6.b
Give examples of how humans combine information from multiple modalities to understand how computers use sensors to collect data.
AI.P.6.c
Give examples of different types of computer perception that can extract meaning from sensory signals to show the connection between sensors and computer perception.
AI.P.6.d
Classify a given image (e.g., "traffic scene", "nature scene", "social gathering", etc.) and then describe the kinds of knowledge a computer would need in order to understand scenes of this type to utilize the image in an algorithm.
AI.RR.6.a
Illustrate how a computer can solve a maze, find a route on a map or reason about concepts in a knowledge graph by drawing a search tree.
AI.ML.6.a
Contrast the unique characteristics of human learning with the ways machine learning systems operate to identify the limitations of machine learning.
AI.ML.6.b
Illustrate the structure of a neural network to describe how its parts form a set of functions that compute an output.
AI.NI.6.a
Individually and collaboratively compare language processing algorithms to solve a problem based on a given criteria (e.g., time, resource, accessibility).
AI.NI.6.b
Identify and describe how computers mimic human behavior to better serve humans.
AI.SI.6.a
Identify and explain how humans have control in curating training datasets to identify bias in machine learning.
AI.SI.6.b
Identify and explain how algorithmic bias impacts artificial intelligence systems to prevent bias in future datasets.
  1. 4.6 Ethics and Legal Considerations
IC.Cu.6.a
Identify the change that current technologies have on people's everyday activities to understand the impact within a society.
  1. 4.7 The Future of Computing
  2. 6.3 Impact of the Internet
  3. 7.1 Digital Footprint and Reputation
  4. 8.1 Getting Started
IC.Cu.6.b
Identify issues of bias and accessibility in the design of existing technologies to address equality and equity in society.
  1. 4.6 Ethics and Legal Considerations
IC.Cu.6.c
Identify and explore careers related to the field of computer science.
  1. 4.7 The Future of Computing
IC.SI.6.a
Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions.
  1. 7.2 Cyberbullying
  2. 7.3 Internet Safety
  3. 7.7 Hacking Ethics
IC.SLE.6.a
Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making.
  1. 6.5 The CIA Triad
IC.SLE.6.b
Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas.
  1. 6.4 Cybersecurity
  2. 7.6 Creative Credit & Copyright
  3. 7.7 Hacking Ethics
IC.SLE.6.c
Evaluate the development of new technologies in communication, entertainment and business to understand the impact.
IC.SLE.6.d
Provide appropriate credit when using resources or artifacts that are not our own.
  1. 7.6 Creative Credit & Copyright
IC.SLE.6.e
Differentiate between the appropriate and inappropriate content on the internet and identify unethical and illegal online behavior.
  1. 4.6 Ethics and Legal Considerations
  2. 6.4 Cybersecurity
  3. 7.6 Creative Credit & Copyright
  4. 7.7 Hacking Ethics