Please enable JavaScript to use CodeHS

Standards Mapping

for North Dakota 6-8

66

Standards in this Framework

45

Standards Mapped

68%

Mapped to Course

Standard Lessons
6.NI.1
Explain how data is sent across networks.
  1. 7.6 Packets & Protocols
  2. 7.7 Viewing a Webpage
7.NI.1
Model how data is sent from one computer to another across networks.
  1. 7.6 Packets & Protocols
  2. 7.7 Viewing a Webpage
8.NI.1
Investigate how data is sent from one computer to another across networks.
  1. 7.6 Packets & Protocols
  2. 7.7 Viewing a Webpage
6.HS.1
Use hardware and/or software to complete a task.
  1. 7.2 Internet Hardware and Sending Information
7.HS.1
Compare and contrast hardware and/or software options to complete a task.
8.HS.1
Choose appropriate device/hardware/software to complete a task.
6.HS.2
Use software features to accomplish a goal.
6.HS.3
Organize, store, and retrieve digital information with guidance.
7.HS.3
Organize, store, and retrieve digital information with minimal guidance.
8.HS.3
Organize, store, and retrieve digital information efficiently.
6.HS.4
Identify threats to technology systems.
  1. 2.4 The CIA Triad
  2. 3.4 Privacy & Security
  3. 6.9 Common Security Problems
  4. 6.10 SQL Injection Overview
  5. 6.11 Types of SQLi and Prevention
  6. 6.12 Cross-site Scripting
  7. 7.9 Network Attacks
  8. 7.10 Network Administration
  9. 7.11 Project: Secure the Company's Network
7.HS.4
Describe threats to technology systems.
  1. 2.4 The CIA Triad
  2. 3.4 Privacy & Security
  3. 6.9 Common Security Problems
  4. 6.10 SQL Injection Overview
  5. 6.11 Types of SQLi and Prevention
  6. 6.12 Cross-site Scripting
  7. 7.9 Network Attacks
  8. 7.10 Network Administration
  9. 7.11 Project: Secure the Company's Network
8.HS.4
Describe ways to protect against threats to technology systems.
  1. 3.4 Privacy & Security
  2. 6.9 Common Security Problems
  3. 6.10 SQL Injection Overview
  4. 6.11 Types of SQLi and Prevention
  5. 6.12 Cross-site Scripting
  6. 7.9 Network Attacks
  7. 7.10 Network Administration
  8. 7.11 Project: Secure the Company's Network
6.HS.5
Identify security measures to protect technology systems.
  1. 6.9 Common Security Problems
  2. 6.10 SQL Injection Overview
  3. 6.11 Types of SQLi and Prevention
  4. 6.12 Cross-site Scripting
  5. 7.9 Network Attacks
7.HS.5
Explain how security measures protect technology systems.
  1. 6.9 Common Security Problems
  2. 6.10 SQL Injection Overview
  3. 6.11 Types of SQLi and Prevention
  4. 6.12 Cross-site Scripting
  5. 7.9 Network Attacks
8.HS.5
Compare and contrast security measures used to protect technology systems.
  1. 6.9 Common Security Problems
  2. 6.10 SQL Injection Overview
  3. 7.9 Network Attacks
6.T.1
Apply basic troubleshooting strategies.
  1. 10.1 Project: Security Assessment Report
6.PSA.1
Identify and test an algorithm to solve a problem.
7.PSA.1
Modify and test an algorithm to solve a problem.
8.PSA.1
Create and test an algorithm to solve a problem across disciplines.
6.PSA.2
Debug a program that includes sequencing, loops, or conditionals.
6.PSA.3
Compare and contrast the efficiencies of multiple solutions to a task.
6.DCA.1
Collect and analyze data to support a claim.
7.DCA.1
Represent data, in more than one way, to defend your claim.
8.DCA.1
Represent data from multiple sources in order to defend or refute a claim.
6.DD.1
Use programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
7.DD.1
Modify programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
8.DD.1
Create programs that utilize combinations of loops, conditionals, and the manipulation of variables representing different data types.
6.A.1
Use a variety of strategies to refine and revise search results.
  1. 3.5 Information Literacy
8.A.1
Use advanced search strategies to locate information online.
  1. 3.5 Information Literacy
6.E.1
Evaluate information and its sources.
  1. 3.5 Information Literacy
7.E.1
Independently, evaluate information and its sources using student selected processes and strategies.
  1. 3.5 Information Literacy
6.C.1
Repurpose or remix original works following fair use guidelines.
  1. 3.6 Creative Credit & Copyright
6.IP.1
With guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 3.6 Creative Credit & Copyright
7.IP.1
With minimal guidance, properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 3.6 Creative Credit & Copyright
8.IP.1
Properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 3.6 Creative Credit & Copyright
6.IP.2
Cite a variety of sources using the appropriate format.
  1. 3.6 Creative Credit & Copyright
6.IP.3
Describe negative consequences of piracy and plagiarism.
  1. 3.6 Creative Credit & Copyright
7.IP.3
Identify strategies to avoid personal works and the works of others from being pirated and plagiarized.
  1. 3.6 Creative Credit & Copyright
8.IP.3
Debate the risks and benefits of sharing personal works online.
  1. 3.6 Creative Credit & Copyright
  2. 7.8 Impact of the Internet
6.IC.1
Identify the positive and negative impacts of past, present, and future technology, including bias and accessibility.
  1. 7.8 Impact of the Internet
7.IC.1
Compare and contrast the impacts of technology, including bias and accessibility.
  1. 7.8 Impact of the Internet
8.IC.1
Explore and create solutions for the negative impacts of technology, including bias and accessibility.
  1. 7.8 Impact of the Internet
6.SI.1
Use collaborative technology.
7.SI.1
Use collaborative technology to gather and share information.
8.SI.1
Use collaborative technology to communicate information to a specific audience.
6.SI.2
Identify how social interactions can impact a person’s self-image.
  1. 3.2 Cyberbullying
6.SE.1
Identify steps for responding to uncomfortable situations when interacting online.
  1. 3.2 Cyberbullying
  2. 3.3 Internet Safety
6.SE.2
Identify basic methods to maintain digital privacy and security.
  1. 3.3 Internet Safety
  2. 3.4 Privacy & Security
7.SE.2
Identify a variety of methods to maintain digital privacy and security.
  1. 3.4 Privacy & Security
8.SE.2
Identify advanced methods to maintain digital privacy and security.
  1. 3.4 Privacy & Security
6.SE.3
Recognize that data-collection technology can be used to track navigation online.
  1. 3.4 Privacy & Security
6.SE.4
Identify threats to personal cybersecurity.
  1. 3.4 Privacy & Security
  2. 7.9 Network Attacks
7.SE.4
Describe how to respond to threats to personal cybersecurity.
  1. 3.4 Privacy & Security
  2. 7.9 Network Attacks
8.SE.4
Discuss the consequences of identity theft.
6.RU.1
Identify different forms of cyberbullying.
  1. 3.2 Cyberbullying
7.RU.1
Describe different forms of cyberbullying and the effects on all parties involved.
  1. 3.2 Cyberbullying
6.RU.2
Identify strategies to stop cyberbullying.
  1. 3.2 Cyberbullying
7.RU.2
Identify strategies to prevent and stop cyberbullying.
  1. 3.2 Cyberbullying
8.RU.2
Identify strategies to prevent and stop cyberbullying.
  1. 3.2 Cyberbullying
6.RU.3
Use approprite digital etiquette in a variety of situations.
  1. 3.1 Digital Footprint and Reputation
6.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
7.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
8.RU.4
Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
6.DI.1
Describe personal online usage and determine how it affects identity on- and offline.
  1. 3.1 Digital Footprint and Reputation
7.DI.1
Evaluate how digital identity can impact a person now and in the future.
  1. 3.1 Digital Footprint and Reputation