Please enable JavaScript to use CodeHS

Standards Mapping

for New York 7-8

34

Standards in this Framework

28

Standards Mapped

82%

Mapped to Course

Standard Lessons
7-8.CT.1
Compare the results of alternative models or simulations to determine and evaluate how the input data and assumptions change the results.
  1. 1.12 User Input
  2. 1.17 If/ Else Statements
  3. 1.18 While Loops
  4. 1.20 Using Data to Refine Game Mechanics
  5. 14.4 If/Else Statements
  6. 15.1 micro:bit Challenges
  7. 15.2 Explore a New Sensor
7-8.CT.10
Document the iterative design process of developing a computational artifact that incorporates user feedback and preferences.
  1. 1.20 Using Data to Refine Game Mechanics
  2. 7.6 Test
  3. 15.3 Follow a Step-by-Step Project
  4. 15.4 Final Project
7-8.CT.2
Collect and use digital data in a computational artifact.
  1. 7.2 Empathy
  2. 15.2 Explore a New Sensor
7-8.CT.3
Refine and visualize a data set in order to persuade an audience.
  1. 15.2 Explore a New Sensor
7-8.CT.4
Write a program using functions or procedures whose names or other documentation convey their purpose within the larger task.
  1. 1.7 Naming Guidelines
  2. 1.8 Functions
  3. 1.10 Top Down Design
  4. 1.11 Variables
  5. 1.19 Putting Together Control Structures
  6. 11.4 Functions in Karel
  7. 11.6 Top Down Design and Decomposition in Karel
  8. 11.7 Commenting Your Code
  9. 11.16 Karel Challenges
  10. 14.5 Functions
7-8.CT.5
Identify multiple similar concrete computations in a program, then create a function to generalize over them using parameters to accommodate their differences.
  1. 1.8 Functions
  2. 1.10 Top Down Design
  3. 1.13 Parameters
  4. 1.19 Putting Together Control Structures
  5. 14.5 Functions
7-8.CT.6
Design, compare and refine algorithms for a specific task or within a program.
  1. 1.19 Putting Together Control Structures
  2. 1.20 Using Data to Refine Game Mechanics
  3. 11.6 Top Down Design and Decomposition in Karel
  4. 11.14 More Karel Examples and Testing
7-8.CT.7
Design or remix a program that uses a variable to maintain the current value of a key piece of information.
  1. 1.11 Variables
  2. 1.19 Putting Together Control Structures
  3. 3.4 Variables
7-8.CT.8
Develop or remix a program that effectively combines one or more control structures for creative expression or to solve a problem.
  1. 1.13 Parameters
  2. 1.14 Using i in For Loops
  3. 1.15 Extended Loop Control
  4. 1.16 If Statements
  5. 1.17 If/ Else Statements
  6. 1.18 While Loops
  7. 1.19 Putting Together Control Structures
  8. 1.20 Using Data to Refine Game Mechanics
  9. 11.10 If Statements
  10. 11.11 If/Else Statements
  11. 11.12 While Loops in Karel
  12. 11.13 Control Structures Example
  13. 11.14 More Karel Examples and Testing
  14. 11.16 Karel Challenges
  15. 14.1 For Loops
  16. 14.2 While Loops
  17. 14.3 Operators
  18. 14.4 If/Else Statements
  19. 14.5 Functions
  20. 15.1 micro:bit Challenges
7-8.CT.9
Read and interpret code to predict the outcome of various programs that involve conditionals and repetition for the purposes of debugging.
  1. 1.19 Putting Together Control Structures
  2. 1.20 Using Data to Refine Game Mechanics
  3. 11.16 Karel Challenges
7-8.CY.1
Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
  1. 4.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 13.4 The CIA Triad
7-8.CY.2
Describe physical, digital, and behavioral safeguards that can be employed in different situations.
  1. 4.3 Internet Safety
  2. 4.4 Privacy & Security
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 13.4 The CIA Triad
7-8.CY.3
Describe trade-offs of implementing specific security safeguards.
  1. 4.4 Privacy & Security
  2. 13.4 The CIA Triad
7-8.CY.4
Describe the limitations of cryptographic methods.
  1. 5.4 Basic Crypto Systems: Cracking Caesar
7-8.CY.5
Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly.
  1. 13.4 The CIA Triad
7-8.DL.1
Type on a keyboard while demonstrating proper keyboarding technique, with increased speed and accuracy.
7-8.DL.2
Communicate and collaborate with others using a variety of digital tools to create and revise a collaborative product.
  1. 10.1 Project: The Effects of the Internet
  2. 15.4 Final Project
7-8.DL.3
Compare types of search tools, choose a search tool for effectiveness and efficiency, and evaluate the quality of search tools based on returned results.
7-8.DL.4
Select and use digital tools to create, revise, and publish digital artifacts.
  1. 4.5 Project: Public Service Announcement
  2. 6.10 Project: Your First Website, Pt 1
  3. 6.16 Project: Your First Website, Pt 2
  4. 7.7 Build Your Website!
  5. 10.1 Project: The Effects of the Internet
  6. 15.3 Follow a Step-by-Step Project
7-8.DL.5
Transfer knowledge of technology in order to explore new technologies.
  1. 2.5 Future of Computing
7-8.DL.6
Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.
  1. 4.1 Digital Footprint and Reputation
7-8.DL.7
Describe safe, appropriate, positive, and responsible online behavior and identify strategies to combat negative online behavior.
  1. 4.2 Cyberbullying
  2. 4.3 Internet Safety
7-8.IC.1
Compare and contrast tradeoffs associated with computing technologies that affect individuals and society.
  1. 4.1 Digital Footprint and Reputation
  2. 9.1 Intro to the Internet
  3. 9.7 The Impact of the Internet
  4. 13.2 What is Cybersecurity?
7-8.IC.2
Evaluate the impact of laws or regulations on the development and use of computing technologies and digital information.
  1. 6.6 Copyright
7-8.IC.3
Identify and discuss issues of ethics surrounding computing technologies and current events.
  1. 2.5 Future of Computing
  2. 4.1 Digital Footprint and Reputation
  3. 9.7 The Impact of the Internet
7-8.IC.4
Identify and discuss issues related to the collection and use of public and private data.
7-8.IC.5
Analyze potential sources of bias that could be introduced to complex computer systems and the potential impact of these biases on individuals.
7-8.IC.6
Assess the accessibility of a computing device or software application in terms of user needs.
  1. 7.2 Empathy
  2. 15.3 Follow a Step-by-Step Project
  3. 15.4 Final Project
7-8.IC.7
Explore a range of computer sciencerelated career paths.
7-8.NSD.1
Design a user interface for a computing technology that considers usability, accessibility, and desirability.
  1. 7.1 Intro to Design Thinking
  2. 7.7 Build Your Website!
7-8.NSD.2
Design a project that combines hardware and software components.
  1. 3.2 Setting Up your micro:bit
  2. 3.3 Comments & Pseudocode
  3. 3.4 Variables
  4. 14.1 For Loops
  5. 14.2 While Loops
  6. 14.3 Operators
  7. 14.4 If/Else Statements
  8. 14.5 Functions
  9. 15.1 micro:bit Challenges
  10. 15.2 Explore a New Sensor
  11. 15.3 Follow a Step-by-Step Project
  12. 15.4 Final Project
7-8.NSD.3
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
  1. 2.6 Troubleshooting
7-8.NSD.4
Design a protocol for transmitting data through a multi-point network.
  1. 9.5 Routing
  2. 9.6 Packets and Protocols
7-8.NSD.5
Summarize how remote data is stored and accessed in a network.