Please enable JavaScript to use CodeHS

Standards Mapping

for Arizona 6

Clear selection Print / Download

23

Standards in this Framework

17

Standards Mapped

73%

Mapped to Course

Standard Lessons
6.CS.D.1
Compare computing device designs based on how humans interact with them.
  1. 4.1 History of Computing
  2. 15.1 History of Computing
6.CS.HS.1
Explain how hardware and software can be used to collect and exchange data.
  1. 4.2 Software
  2. 8.8 Mouse Data
  3. 8.9 Keyboard Data
  4. 15.2 Software
6.CS.T.1
Identify problems that can occur in computing devices and their components within a system.
  1. 4.3 Hardware
  2. 15.3 Hardware (Duplicate)
6.NI.C.1
Identify multiple methods of encryption to secure the transmission of information.
6.NI.C.2
Identify different physical and digital security measures that protect electronic information.
  1. 6.4 Cybersecurity
  2. 6.6 Encryption
6.NI.NCO.1
Discuss how protocols are used in transmitting data across networks and the Internet.
  1. 6.1 What is the Internet?
  2. 6.2 The Need for Protocols
6.DA.CVT.1
Compare different computational tools used to collect, analyze and present data that is meaningful and useful.
6.DA.S.1
Identify multiple encoding schemes used to represent data, including binary and ASCII.
  1. 8.2 Color
6.DA.IM.1
Discuss the validity of a computational model based on the reliability of the data.
6.AP.A.1
Identify planning strategies such as flowcharts or pseudocode, to simulate algorithms that solve problems.
  1. 5.7 If/Else Statements
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 8.10 Project: Animate an Emoji
6.AP.V.1
Identify variables that represent different data types and perform operations on their values.
  1. 3.4 Under the Sea
  2. 8.3 Variables
  3. 9.5 Variables
  4. 9.9 Your First Sprites
6.AP.C.1
Design programs that combine control structures, including nested loops and compound conditionals.
  1. 1.4 Lost in Space
  2. 2.1 Quest for the Rosetta Stone
  3. 2.2 A Day at the Park
  4. 5.5 For Loops
  5. 5.6 Conditional Statements
  6. 8.4 The Draw Loop
  7. 8.5 Color Transitions
  8. 8.6 Shape Transformations
  9. 8.7 Direction
  10. 8.8 Mouse Data
  11. 8.9 Keyboard Data
  12. 8.10 Project: Animate an Emoji
6.AP.M.1
Decompose problems into parts to facilitate the design, implementation, and review of programs.
  1. 2.2 A Day at the Park
  2. 5.2 Karel's World
  3. 5.3 Functions
  4. 5.4 Multiple Functions
  5. 13.4 Let's Add Pages!
  6. 13.5 Creating a Sitemap
6.AP.M.2
Use procedures to organize code and make it easier to reuse.
  1. 2.2 A Day at the Park
  2. 3.3 A Day at the Carnival
  3. 3.4 Under the Sea
  4. 5.4 Multiple Functions
  5. 5.5 For Loops
6.AP.PD.1
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6.AP.PD.2
Incorporate existing code into programs and give attribution.
  1. 9.7 Program Structure
  2. 9.9 Your First Sprites
  3. 9.10 The Physics of Sprites
6.AP.PD.3
Test programs using a range of inputs and identify expected outputs.
  1. 3.4 Under the Sea
  2. 5.8 While Loops
  3. 5.9 Karel Challenges
  4. 9.4 Intro to JavaScript
  5. 9.5 Variables
  6. 9.9 Your First Sprites
  7. 9.10 The Physics of Sprites
6.AP.PD.4
Maintain a timeline with specific tasks while collaboratively developing computational artifacts.
6.AP.PD.5
Document programs in order to make them easier to follow, test, and debug
  1. 5.4 Multiple Functions
  2. 5.9 Karel Challenges
  3. 8.10 Project: Animate an Emoji
6.IC.C.1
Identify some of the tradeoffs associated with computing technologies that can affect people's everyday activities and career options.
  1. 6.3 Impact of the Internet
6.IC.C.2
Identify issues of bias and accessibility in the design of existing technologies.
  1. 4.6 Ethics and Legal Considerations
  2. 4.7 The Future of Computing
  3. 15.6 Ethics and Legal Considerations
  4. 15.7 The Future of Computing (Duplicate)
6.IC.SI.1
Identify the advantages of creating a computational product by collaborating with others using digital technologies.
6.IC.SLE.1
Describe how some digital information can be public or can be kept private and secure.
  1. 6.5 The CIA Triad