Please enable JavaScript to use CodeHS

Illinois 6-8 Standards Mapping

to

Computing Ideas (Lovelace)

29 Standards in this Framework 21 Standards Mapped 72% Mapped to Course


Standard Lessons
6-8.CS.01 Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 2.3 Software
  2. 2.4 Hardware
  3. 3.1 Computer Model
6-8.CS.02 Design projects that combine hardware and software components to collect and exchange data.
6-8.CS.03 Systematically identify and fix problems with computing devices and their components.
6-8.NI.04 Model the role of protocols in transmitting data across networks and the Internet.
  1. 7.1 Intro to the Internet
  2. 7.2 Internet Hardware
  3. 7.3 Internet Addresses
  4. 7.4 DNS
  5. 7.5 Routing
  6. 7.6 Packets and Protocols
6-8.NI.05 Explain how physical and digital security measures protect electronic information.
  1. 9.3 Internet Safety
  2. 9.4 Privacy & Security
  3. 10.1 Project: Public Service Announcement
  4. 15.2 What is Cybersecurity?
  5. 15.3 Impact of Cybersecurity
  6. 15.4 The CIA Triad
6-8.NI.06 Apply multiple methods of encryption to model the secure transmission of information.
  1. 6.3 Encoding Text with Binary
  2. 15.2 What is Cybersecurity?
6-8.DA.07 Represent data using multiple encoding schemes.
  1. 6.3 Encoding Text with Binary
  2. 6.5 Hexadecimal
  3. 6.6 Pixel Colors!
6-8.DA.08 Collect data using computational tools and transform the data to make it more useful and reliable.
6-8.DA.09 Refine computational models based on the data they have generated.
6-8.DA.10 Evaluate the misuse of data and impact of distorted outcomes.
  1. 9.1 Digital Footprint and Reputation
  2. 9.2 Cyberbullying
  3. 9.4 Privacy & Security
  4. 9.5 Information Literacy
  5. 9.6 Creative Credit & Copyright
  6. 15.2 What is Cybersecurity?
  7. 15.3 Impact of Cybersecurity
  8. 15.4 The CIA Triad
6-8.AP.11 Use flowcharts or pseudocode to address complex problems as algorithms.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.13 Control Structures Example
  3. 1.16 Karel Challenges
  4. 13.10 Top Down Design
  5. 13.19 Putting Together Control Structures
6-8.AP.12 Perform operations on student-created variables that possess descriptive names and represent different data types.
  1. 13.7 Naming Guidelines
  2. 13.11 Variables
6-8.AP.13 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.9 For Loops
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.16 Karel Challenges
  6. 13.14 Using i in For Loops
  7. 13.15 Extended Loop Control
  8. 13.16 If Statements
  9. 13.17 If/ Else Statements
  10. 13.18 While Loops
  11. 13.19 Putting Together Control Structures
6-8.AP.14 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.16 Karel Challenges
  3. 13.10 Top Down Design
6-8.AP.15 Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.4 Functions in Karel
  2. 1.5 The Start Function
  3. 13.8 Functions
  4. 13.13 Parameters
6-8.AP.16 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 5.1 Project: Your First Website
  2. 14.9 Final Touches
  3. 14.10 Make a Game!
6-8.AP.17 Incorporate existing code, media, and libraries into original programs and give attribution.
  1. 9.6 Creative Credit & Copyright
6-8.AP.18 Systematically test and refine programs using a range of test cases.
  1. 1.6 Top Down Design and Decomposition in Karel
  2. 1.10 If Statements
  3. 1.11 If/Else Statements
  4. 1.12 While Loops in Karel
  5. 1.13 Control Structures Example
  6. 1.16 Karel Challenges
  7. 13.10 Top Down Design
  8. 14.9 Final Touches
  9. 14.10 Make a Game!
6-8.AP.19 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.20 Document programs to make them easier to follow, test, and debug.
  1. 1.7 Commenting Your Code
  2. 1.15 How to Indent Your Code
  3. 13.6 Comments
  4. 13.7 Naming Guidelines
6-8.IC.21 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 2.1 History of Computers
  2. 2.2 Computer Organization
  3. 2.5 Future of Computing
  4. 7.7 The Impact of the Internet
6-8.IC.22 Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.23 Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
6-8.IC.24 Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 7.7 The Impact of the Internet
  2. 9.1 Digital Footprint and Reputation
  3. 9.3 Internet Safety
  4. 9.4 Privacy & Security
  5. 9.5 Information Literacy
6-8.ET.A Explain that the field of emerging technologies will be evolving and rapidly growing.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 3.1 Computer Model
  4. 7.7 The Impact of the Internet
6-8.ET.B Compare existing and emerging technologies, ideas, and concepts.
  1. 2.1 History of Computers
  2. 2.5 Future of Computing
  3. 7.1 Intro to the Internet
  4. 7.7 The Impact of the Internet
  5. 8.1 Project: The Effects of the Internet
6-8.ET.C Describe how emerging technologies are influencing current events at a local and global scale.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
6-8.ET.D Predict the positive and negative societal, cultural, and economic impacts that emerging and future technologies may generate.
  1. 2.5 Future of Computing
  2. 7.7 The Impact of the Internet
  3. 8.1 Project: The Effects of the Internet
6-8.ET.E Create new or original work by applying emerging technologies.