Please enable JavaScript to use CodeHS

Standards Mapping

for New Jersey 6-8 Computer Science


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Design and illustrate algorithms that solve complex problems using flowcharts and/or pseudocode.
  1. 1.10 Top Down Design
  2. 3.3 Comments & Pseudocode
  3. 3.4 Variables
  4. 11.6 Top Down Design and Decomposition in Karel
  5. 11.16 Karel Challenges
Create clearly named variables that represent different data types and perform operations on their values.
  1. 1.7 Naming Guidelines
  2. 1.11 Variables
  3. 3.4 Variables
  4. 14.3 Operators
Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 1.19 Putting Together Control Structures
  2. 11.13 Control Structures Example
  3. 11.14 More Karel Examples and Testing
  4. 11.16 Karel Challenges
  5. 14.1 For Loops
  6. 14.2 While Loops
  7. 14.3 Operators
  8. 14.4 If/Else Statements
  9. 15.1 micro:bit Challenges
Decompose problems and sub-problems into parts to facilitate the design, implementation, and review of programs.
  1. 1.10 Top Down Design
  2. 3.3 Comments & Pseudocode
  3. 11.6 Top Down Design and Decomposition in Karel
  4. 14.5 Functions
Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.13 Parameters
  2. 14.5 Functions
Refine a solution that meets users’ needs by incorporating feedback from team members and users.
  1. 7.6 Test
  2. 15.4 Final Project
Design programs, incorporating existing code, media, and libraries, and give attribution
  1. 6.6 Copyright
Systematically test and refine programs using a range of test cases and users.
  1. 1.12 User Input
  2. 1.16 If Statements
  3. 1.17 If/ Else Statements
  4. 1.18 While Loops
  5. 1.19 Putting Together Control Structures
  6. 11.11 If/Else Statements
  7. 11.12 While Loops in Karel
  8. 11.13 Control Structures Example
  9. 11.14 More Karel Examples and Testing
  10. 11.16 Karel Challenges
  11. 14.2 While Loops
  12. 14.4 If/Else Statements
  13. 15.1 micro:bit Challenges
Document programs in order to make them easier to follow, test, and debug.
  1. 1.6 Comments
  2. 3.3 Comments & Pseudocode
  3. 11.7 Commenting Your Code
  4. 11.15 How to Indent Your Code
Recommend improvements to computing devices in order to improve the ways users interact with the devices.
  1. 15.4 Final Project
Design a system that combines hardware and software components to process data.
  1. 14.2 While Loops
  2. 14.4 If/Else Statements
  3. 14.5 Functions
Justify design decisions and explain potential system trade-offs.
Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
  1. 2.6 Troubleshooting
Organize and transform data collected using computational tools to make it usable for a specific purpose.
  1. 15.3 Follow a Step-by-Step Project
Explain the difference between how the computer stores data as bits and how the data is displayed.
  1. 8.1 Intro to Digital Information
  2. 8.2 Number Systems
  3. 8.3 Encoding Text with Binary
  4. 8.4 Pixel Images
  5. 8.6 Pixel Colors!
Identify the appropriate tool to access data based on its file format.
Transform data to remove errors and improve the accuracy of the data for analysis.
Test, analyze, and refine computational models
Analyze climate change computational models and propose refinements.
Compare the trade-offs associated with computing technologies that affect individual’s everyday activities and career options.
  1. 4.1 Digital Footprint and Reputation
  2. 9.7 The Impact of the Internet
Describe issues of bias and accessibility in the design of existing technologies.
  1. 7.2 Empathy
Model how information is broken down into smaller pieces, transmitted as addressed packets through multiple devices over networks and the Internet, and reassembled at the destination.
  1. 6.9 Viewing Websites
  2. 9.6 Packets and Protocols
Model the role of protocols in transmitting data across networks and the Internet and how they enable secure and errorless communication.
  1. 9.3 Internet Addresses
  2. 9.6 Packets and Protocols
Explain how network security depends on a combination of hardware, software, and practices that control access to data and systems.
Explain how new security measures have been created in response to key malware events.