Please enable JavaScript to use CodeHS

Standards Mapping

for Tennessee 6-8

33

Standards in this Framework

25

Standards Mapped

75%

Mapped to Course

Standard Lessons
CCP.1
Identify the advantages, disadvantages and unintended consequences of computing devices.
  1. 9.7 The Impact of the Internet
  2. 15.4 Final Project
CCP.2
Analyze the relationship between human and computer interactions to improve the device. For example, student A watches student B use a simple communication device. Student A updates the tool for improved use.
  1. 7.6 Test
  2. 15.3 Follow a step-by-step project
CCP.3
Identify and describe multiple considerations and tradeoffs when designing or selecting computing system, such as functionality, cost, size, speed, accessibility, and aesthetics.
CCP.4
Construct optimized models of computing systems.
CCP.5
Create structured processes to troubleshoot problems with computing systems.
  1. 2.6 Troubleshooting
CCP.6
Define protocols in relation to a set of rules.
  1. 9.3 Internet Addresses
  2. 9.4 DNS
  3. 9.6 Packets and Protocols
CCP.7
Construct protocols that can be used to share information between people or devices. For example: a binary communication protocol using lights.
  1. 8.3 Encoding Text with Binary
CCP.8
Compare the relative strengths and weaknesses of unique protocols considering security, speed, and reliability.
CCP.9
Create models of networks that include packets and domain name server (DNS).
  1. 9.4 DNS
  2. 9.5 Routing
  3. 9.6 Packets and Protocols
CCP.10
Identify steps to ensure security measures are in place to safeguard online information.
  1. 4.4 Privacy & Security
CCP.11
Create cyphers to encrypt data that can be transferred between users.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
CCP.12
Explain how encryption can be used to safeguard data that is sent across a network.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
CCP.13
Evaluate the accuracy and precision of various forms of data collection.
CCP.14
Identify and define the limiting factors to specific forms of data collection.
CCP.15
Describe how different formats of stored data represent tradeoffs between quality and size.
CCP.16
Represent data using different encoding schemes, such as binary, Unicode, Morse code, shorthand, studentcreated codes.
  1. 8.2 Number Systems
  2. 8.3 Encoding Text with Binary
  3. 8.4 Pixel Images
  4. 8.5 Hexadecimal
CCP.17
Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools.
  1. 15.2 Explore a New Sensor
CCP.18
Revise variables and constants in computational models to more accurately reflect real-world systems. For example in an ecosystem model, introducing predators as a new variable.
CCP.19
Solicit and integrate peer feedback as appropriate to develop or refine a program.
  1. 7.6 Test
  2. 15.4 Final Project
CCP.20
Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size.
  1. 1.4 For Loops
  2. 1.8 Functions
  3. 1.10 Top Down Design
  4. 11.4 Functions in Karel
  5. 11.6 Top Down Design and Decomposition in Karel
  6. 11.9 For Loops
  7. 11.12 While Loops in Karel
  8. 11.14 More Karel Examples and Testing
  9. 11.16 Karel Challenges
CCP.21
Provide proper attribution when code is borrowed or built upon.
CCP.22
Interpret the flow of execution of algorithms and predict their outcomes.
  1. 1.4 For Loops
  2. 1.8 Functions
  3. 1.14 Using i in For Loops
  4. 1.15 Extended Loop Control
  5. 1.16 If Statements
  6. 1.17 If/ Else Statements
  7. 1.18 While Loops
  8. 1.19 Putting Together Control Structures
  9. 11.9 For Loops
  10. 11.11 If/Else Statements
  11. 11.12 While Loops in Karel
  12. 11.13 Control Structures Example
  13. 11.14 More Karel Examples and Testing
  14. 11.16 Karel Challenges
  15. 14.1 For Loops
  16. 14.2 While Loops
  17. 14.4 If/Else Statements
CCP.23
Design, develop, and present computational artifacts such as mobile applications that address social problems both independently and collaboratively
  1. 4.5 Project: Public Service Announcement
  2. 15.4 Final Project
CCP.24
Develop programs, both independently and collaboratively, that include sequences with nested loops and multiple branches. (Clarification: At this level, students may use block- based and/or text-based programming languages.)
  1. 1.19 Putting Together Control Structures
  2. 11.9 For Loops
  3. 11.11 If/Else Statements
  4. 11.12 While Loops in Karel
  5. 11.13 Control Structures Example
  6. 11.14 More Karel Examples and Testing
  7. 11.16 Karel Challenges
  8. 15.1 micro:bit Challenges
  9. 15.4 Final Project
CCP.25
Identify the purpose of variables in relation to programming
  1. 1.11 Variables
  2. 1.13 Parameters
  3. 3.4 Variables
  4. 11.9 For Loops
CCP.26
Create variables that represent different types of data and manipulate their values.
  1. 1.11 Variables
  2. 1.13 Parameters
  3. 3.4 Variables
  4. 14.3 Operators
CCP.27
Define and use procedures that hide the complexity of a task and can be reused to solve similar tasks. (Clarification: Students use and modify, but do not necessarily create, procedures with parameters.)
  1. 1.8 Functions
  2. 1.13 Parameters
  3. 11.4 Functions in Karel
  4. 11.8 Super Karel
  5. 11.14 More Karel Examples and Testing
  6. 11.16 Karel Challenges
  7. 14.5 Functions
CCP.28
Decompose a problem into parts and create solutions for each part.
  1. 1.10 Top Down Design
  2. 3.3 Comments & Pseudocode
  3. 11.6 Top Down Design and Decomposition in Karel
  4. 14.5 Functions
CCP.29
Use an iterative design process (e.g., define the problem, generate ideas, build, test, and improve solutions) to solve problems, both independently and collaboratively.
  1. 1.10 Top Down Design
  2. 3.3 Comments & Pseudocode
  3. 7.3 Define
  4. 7.5 Prototype
  5. 7.6 Test
  6. 15.4 Final Project
CCP.30
Analyze the positive and negative impacts of computing technology.
  1. 9.7 The Impact of the Internet
  2. 15.4 Final Project
CCP.31
Recognize there are tradeoffs in computing.
  1. 9.7 The Impact of the Internet
CCP.32
Explain how social interactions can allow for multiple viewpoints.
  1. 7.6 Test
CCP.33
Demonstrate an understanding of digital security.
  1. 4.3 Internet Safety
  2. 4.4 Privacy & Security
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 13.2 What is Cybersecurity?