Please enable JavaScript to use CodeHS

Standards Mapping

for Wyoming 6-8

25

Standards in this Framework

17

Standards Mapped

68%

Mapped to Course

Standard Lessons
8.CS.D.01
Recommend improvements to the design of computing devices based on an analysis of how a variety of users interact with the device.
8.CS.HS.01
Design and refine a project that combines hardware and software components to collect and exchange data.
  1. 14.2 Game Events
  2. 14.4 Make a Shot!
  3. 14.6 Event Handlers
  4. 14.10 Make a Game!
8.CS.T.01
Systematically identify, resolve, and document increasingly complex software and hardware problems with computing devices and their components.
8.NI.NCO.01
Model the role of protocols in transmitting data across networks and the internet (e.g., explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered).
  1. 7.1 Intro to the Internet
  2. 7.3 Internet Addresses
  3. 7.4 DNS
  4. 7.5 Routing
  5. 7.6 Packets and Protocols
  6. 7.8 The Internet Quiz
8.NI.C.01
Critique physical and digital procedures that could be implemented to protect electronic data/information.
  1. 9.4 Privacy & Security
8.NI.C.02
Apply multiple methods of encryption to model the secure transmission of data.
8.DA.S.01
Represent data using multiple encoding schemes (e.g., ASCII, binary).
  1. 6.2 Number Systems
  2. 6.3 Encoding Text with Binary
  3. 6.4 Pixel Images
  4. 6.5 Hexadecimal
  5. 6.6 Pixel Colors!
  6. 6.8 Digital Information Quiz
8.DA.CVT.01
Using computational tools, transform collected data to make it more useful and reliable.
8.DA.IM.01
Refine computational models based on generated data.
8.AP.A.01
Create flowcharts and pseudocode to design algorithms to solve complex problems
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.14 More Karel Examples and Testing
  3. 1.16 Karel Challenges
  4. 13.10 Top Down Design
  5. 13.19 Putting Together Control Structures
  6. 13.20 Intro to Programming with Turtle Graphics Quiz
8.AP.V.01
Using grade appropriate content and complexity, create clearly named variables that represent different data types and perform operations on their values.
  1. 13.11 Variables
  2. 13.12 User Input
  3. 13.20 Intro to Programming with Turtle Graphics Quiz
8.AP.C.01
Using grade appropriate content and complexity, design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.10 If Statements
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 1.17 Intro to Programming with Karel the Dog Quiz
  8. 13.4 For Loops
  9. 13.17 If/ Else Statements
  10. 13.18 While Loops
  11. 13.19 Putting Together Control Structures
  12. 13.20 Intro to Programming with Turtle Graphics Quiz
8.AP.M.01
Using grade appropriate content and complexity, decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.13 Control Structures Example
  3. 1.14 More Karel Examples and Testing
  4. 1.16 Karel Challenges
  5. 13.8 Functions
  6. 13.10 Top Down Design
  7. 13.19 Putting Together Control Structures
8.AP.M.02
Using grade appropriate content and complexity, create procedures with parameters to organize code and make it easier to reuse.
  1. 13.13 Parameters
  2. 13.19 Putting Together Control Structures
  3. 13.20 Intro to Programming with Turtle Graphics Quiz
8.AP.PD.01
Using grade appropriate content and complexity, seek and incorporate feedback from team members and users to refine a solution to a problem.
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
8.AP.PD.03
Systematically test and refine programs using a range of test cases.
  1. 1.10 If Statements
  2. 1.11 If/Else Statements
  3. 1.12 While Loops in Karel
  4. 1.13 Control Structures Example
  5. 1.14 More Karel Examples and Testing
  6. 1.16 Karel Challenges
  7. 13.17 If/ Else Statements
  8. 13.18 While Loops
  9. 13.19 Putting Together Control Structures
  10. 14.4 Make a Shot!
  11. 14.6 Event Handlers
  12. 14.10 Make a Game!
8.AP.PD.04
Using grade appropriate content and complexity, document programs in order to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 1.15 How to Indent Your Code
  3. 1.17 Intro to Programming with Karel the Dog Quiz
  4. 13.6 Comments
  5. 13.20 Intro to Programming with Turtle Graphics Quiz
8.AP.PD.05
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 13.19 Putting Together Control Structures
8.IC.C.01
Describe impacts associated with computing technologies that affect people's everyday activities and career options.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 2.6 What is Computing? Quiz
  4. 9.1 Digital Footprint and Reputation
  5. 9.2 Cyberbullying
  6. 15.2 What is Cybersecurity?
8.IC.C.02
Describe issues of bias and accessibility in the design of technologies.
  1. 9.2 Cyberbullying
  2. 10.1 Project: Public Service Announcement
8.IC.SI.01
Using grade appropriate content and complexity, collaborate using tools to connect with peers when creating a computational artifact.
8.IC.SI.02
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 9.1 Digital Footprint and Reputation
  2. 9.2 Cyberbullying
  3. 9.3 Internet Safety
  4. 9.7 Digital Citizenship and Cybersecurity Quiz
8.IC.SLE.01
Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 9.1 Digital Footprint and Reputation
  2. 9.4 Privacy & Security
  3. 9.7 Digital Citizenship and Cybersecurity Quiz
  4. 15.3 Impact of Cybersecurity
  5. 15.4 The CIA Triad
8.IC.SLE.02
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 9.4 Privacy & Security
  2. 9.6 Creative Credit & Copyright
  3. 9.7 Digital Citizenship and Cybersecurity Quiz