Please enable JavaScript to use CodeHS

Standards Mapping

for Rhode Island 6-8

31

Standards in this Framework

20

Standards Mapped

64%

Mapped to Course

Standard Lessons
2-CT-A-1
Use diagrams and/or pseudocode to plan, analyze, solve and/or code complex problems as algorithms.
  1. 4.6 Organizational Techniques
2-CT-V-1
Create clearly named variables that represent different data. Perform operations on data stored in variables.
  1. 4.1 Programming Concepts
2-CT-D-1
Organize data into an appropriate data structure in a program.
  1. 4.5 Arrays and Objects
2-CT-C-1
Design programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 22.7 For Loop Practice
  3. 22.10 Loop and a Half
2-CT-M-1
Decompose computational problems to facilitate the design and implementation of programs.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
2-CT-M-2
Create procedures with parameters to organize code and make it easier to reuse.
2-CT-CD-1
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-CT-CD-2
Test and debug a program to ensure it runs as intended.
  1. 4.3 Looping
  2. 4.4 Branching
2-CT-CD-3
Describe choices made during development of computational artifacts.
  1. 4.6 Organizational Techniques
2-CSN-H-1
Identify improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CSN-HS-1
Design projects that combine hardware and software components to collect and use data to perform a function.
2-CSN-T-1
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
  1. 12.1 Methodology
  2. 12.2 Support Practice
2-CSN-N-1
Model the role of protocols in transmitting data across networks and the Internet.
  1. 10.8 Packets & Protocols
2-CY-R-1
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 1.2 What is Cybersecurity?
  2. 2.1 Digital Footprint and Reputation
  3. 2.4 Privacy & Security
2-CY-R-2
Describe social engineering attacks and the potential risks associated with them.
  1. 1.3 Impact of Cybersecurity
2-CY-R-3
Describe risks of using free and open services.
  1. 2.4 Privacy & Security
2-CY-S-1
Explain physical and digital security measures that protect electronic information.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 8.10 SQL Injection Overview
  4. 8.11 Types of SQLi and Prevention
  5. 11.6 Network Communication
  6. 11.7 Network Management
2-CY-S-2
Demonstrate how multiple methods of encryption provide secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
2-CY-RP-1
Describe which actions to take and not to take when an application or device reports a problem or behaves unexpectedly.
2-DA-CVT-1
Collect data using computational tools or online sources and transform the data to make it more useful and reliable.
2-DA-IM-1
Create and refine computational models based on generated or gathered data.
2-DA-IM-2
Discuss potential visible biases that could exist in a dataset and how these biases could affect analysis conclusions.
2-DA-ST-1
Store, retrieve, and share data to collaborate, using a cloud-based system.
2-DA-ST-2
Describe various low-level data transformations and identify which result in a loss of information.
2-DL-CU-1
Use software tools to create artifacts that engage users over time.
2-DL-SDI-1
Conduct searches over multiple types of digital information.
  1. 2.5 Information Literacy
  2. 3.1 Project: Public Service Announcement
2-DL-US-1
Describe the different formats of software components that support common tasks in software tools.
  1. 7.4 Software and Applications
2-RC-CU-1
Compare and contrast tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  1. 1.2 What is Cybersecurity?
  2. 10.11 Impact of the Internet
2-RC-CU-2
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 10.11 Impact of the Internet
2-RC-SLE-1
Discuss how laws control use and access to intellectual property, and mandate broad access to information technologies.
  1. 2.6 Creative Credit & Copyright
  2. 10.9 Viewing a Webpage
  3. 10.10 Creative Credit & Copyright
2-RC-SI-1
Collaborate and strategize with many online contributors when creating a computational or digital artifact.
  1. 3.1 Project: Public Service Announcement