Please enable JavaScript to use CodeHS

California 6-8 Framework

Standards

Standard Description
6-8.AP.10 Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems. Lessons
6-8.AP.11 Create clearly named variables that store data, and perform operations on their contents. Lessons
6-8.AP.12 Design and iteratively develop programs that combine control structures and use compound conditions. Lessons
6-8.AP.13 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. Lessons
6-8.AP.14 Create procedures with parameters to organize code and make it easier to reuse. Lessons
6-8.AP.15 Seek and incorporate feedback from team members and users to refine a solution that meets user needs. Lessons
6-8.AP.16 Incorporate existing code, media, and libraries into original programs, and give attribution. Lessons
6-8.AP.17 Systematically test and refine programs using a range of test cases. Lessons
6-8.AP.18 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts. Lessons
6-8.AP.19 Document programs in order to make them easier to use, read, test, and debug. Lessons
6-8.CS.1 Design modifications to computing devices in order to improve the ways users interact with the devices. Lessons
6-8.CS.2 Design a project that combines hardware and software components to collect and exchange data. Lessons
6-8.CS.3 Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems. Lessons
6-8.DA.7 Represent data in multiple ways. Lessons
6-8.DA.8 Collect data using computational tools and transform the data to make it more useful. Lessons
6-8.DA.9 Test and analyze the effects of changing variables while using computational models. Lessons
6-8.IC.20 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options. Lessons
6-8.IC.21 Discuss issues of bias and accessibility in the design of existing technologies. Lessons
6-8.IC.22 Collaborate with many contributors when creating a computational artifact. Lessons
6-8.IC.23 Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts. Lessons
6-8.IC.24 Compare tradeoffs between allowing information to be public and keeping information private and secure. Lessons
6-8.NI.4 Model the role of protocols in transmitting data across networks and the Internet. Lessons
6-8.NI.5 Explain potential security threats and security measures to mitigate threats. Lessons
6-8.NI.6 Apply multiple methods of information protection to model the secure transmission of information. Lessons