Please enable JavaScript to use CodeHS

Standards Mapping

for Natrona CS in the Virtual World

15

Standards in this Framework

9

Standards Mapped

60%

Mapped to Course

Standard Lessons
8.CS.D.01
Recommend improvements to the design of computing devices based on an analysis of how a variety of users interact with the device.
8.NI.NCO.01
Model the role of protocols in transmitting data across networks and the internet (e.g., explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered).
  1. 9.4 Internet Hardware and Sending Information
  2. 9.6 Domain Name System (DNS)
  3. 9.7 Routing
  4. 9.8 Packets & Protocols
8.NI.C.01
Critique physical and digital procedures that could be implemented to protect electronic data/information.
  1. 1.4 The CIA Triad
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
8.NI.C.02
Apply multiple methods of encryption to model the secure transmission of data.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
8.IC.SLE.01
Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
8.IC.SLE.02
Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.6 Creative Credit & Copyright
  4. 2.7 Hacking Ethics
8.IC.C.01
Describe impacts associated with computing technologies that affect people's everyday activities and career options.
  1. 1.2 What is Cybersecurity?
  2. 2.1 Digital Footprint and Reputation
  3. 9.10 Impact of the Internet
8.IC.C.02
Describe issues of bias and accessibility in the design of technologies.
8.IC.SI.01
Using grade appropriate content and complexity, collaborate using tools to connect with peers when creating a computational artifact.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
8.IC.SI.02
Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
8.DA.CVT.01
Using computational tools, transform collected data to make it more useful and reliable.
8.DA.IM.01
Refine computational models based on generated data.
8.AP.PD.01
Using grade appropriate content and complexity, seek and incorporate feedback from team members and users to refine a solution to a problem.
8.AP.PD.02
Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
8.AP.PD.05
Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
  1. 6.1 Project: Classic Cipher Newscast